lightscription

joined 5 months ago
[–] [email protected] 0 points 3 hours ago* (last edited 3 hours ago)

I am sure you are trying to be funny, but I am serious. They won't let me reproduce in the US.

I am not gay or bi. I don't like men. When priests molest little boys (or the FD and PD for that matter; I have verified the convictions) or men get anally raped in prisons (or by the Chicago PD or IDF: also fact) are you still pro-gay?

Fascists use gay to be homophobic against straights. There are violent and abusive gay men. This clown f-ed little boys and young men ---> https://en.wikipedia.org/wiki/John_Wayne_Gacy

[–] [email protected] 6 points 17 hours ago (5 children)

Unfortunately, Tinder doesn't work and that is helpful to get in touch with the ladies. That app is too hell bent on location data which GOS handles more privately.

NFC should work, it is just scheduled to be deactivated after 3 months if not used for security reasons.

I think GOS is very user friendly and has many positive privacy and security enhancements. I would like to see if they can surpass sandboxed Google Play and officially support other repositories and updaters like Accrescent. Also, a standard way of securing traffic beyond encrypted DNS would be good such as a tor client like Orbot.

Looking into the Veilid ecosystem might also be a source for further development ideas.

[–] [email protected] 4 points 1 week ago* (last edited 1 week ago)

Don't use Discord. That is a major vector for attack. Seen it happen myself.

Even Sandboxed Google Play has problems.

I don't think there is any equivalent of Graphene for Mac hardware. With Pegasus and Predator software around, phones are very hard to secure.

Rely on tor browser and torrifying where you can with Orbot (Guardian Project).

Instead of Telegram, how about Signal and Briar? We just heard about how Telegram's executive got hit and may now have to bow to pressure. Signal has kept its design integrity as far as we know.

Minimal apps are better than many to reduce attack surface. Maybe try accessing some of those services on other devices instead of on your personal tracking device.

[–] [email protected] 1 points 2 weeks ago* (last edited 2 weeks ago)

Yep. They all pretty much just jack with the flag.

Especially if it is at someone else's expense so they can get a rush off of subjugating defenseless civilians and leading off sadistically with the enslaved, risking nothing in their hidden-bunker cowardice.

"guard against the impostures of pretended patriotism"

[–] [email protected] 7 points 1 month ago

Silver fox with perfect aim! Bond cannot fail!

[–] [email protected] 0 points 1 month ago

Ah, that must be it. 2FA is still a very good security feature to have.

But there is nothing only you know that is still useful because a secret must be shared in order to be useful (unless you just have full disk encryption and then when it is unlocked and network connected, it is still vulnerable). In short, admins could change your password since you are not the sole admin of your own server but then you would have to have mass appeal to be "useful", i.e. popular.

In theory, Tim Cook might have a keybearer who could usurp the throne with all the proprietary OEM crypto keys that only the Company knows, but everyone knows who the CEO is and the keybearer could get in big trouble unless he had an army...

Things can be changed on the server side and the network is not the same as the device: these are technology truths some people refuse to ever understand.

 

Do you know how 2FA is disabled without your consent on Lemmy.world?

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago)

Do you want to show us what that looks like in assembly, ASCII from machine code? ...ha, ha, ha, no!

Depends on the device, I know. Such a pain without the higher level languages.

What would it look like for ARM android touch screens? Just for one character...

But if some characters go missing or are exchanged for others for no discernable reason, then might that be an exploit on a EC or assembly level?

[–] [email protected] 1 points 1 month ago

Best still rare even though potentially very user friendly and accessible.

[–] [email protected] 0 points 3 months ago

I thought these stills from Paglen recent CCC talk were pretty funny.

 

https://paglen.studio/2020/04/09/autonomy-cube/

Does anyone know what the technical design model of this project might entail? Its last iteration was a tor exit node, which is straightforward enough, but how would you design a gateway router accessible via WiFi that would direct all traffic over tor? This is not idea. The client (or full OS like TAILS or Whonix) is ideal and many common sites block tor (like this one). There must be a design for combining proxies with tor to get this AP to work practically for conventional use, as it seems to be advertised. Maybe early on, before tor got blocked so much, it did work as simply as it sounds.

Has anyone read the book or theories that inspired this work? Probably perfect for this community. I want to see if I can get a hold of a copy.