Melody Fwygon

  • 0 Posts
  • 142 Comments
Joined 1 year ago
cake
Cake day: June 1st, 2023

help-circle



  • I mean; there’s nothing stopping you from using a car from an earlier era; and bodging in an Android Tablet into your dashboard as an infotainment system.

    The thing doesn’t need to be concerned with your climate controls or anything else on your CAN bus for security reasons anyways. So you can leave those controls as they are and just let the tablet replace your Radio effectively for 100% DRM free media enjoyment with your favorite fully rooted and flashed tablet running whatever FLOSS version of Android firmware you like.




  • I’m going to be bold enough to say we don’t have as wide of an AI/LLM issue on the Fediverse as the other platforms will have.

    I’m certain that if someone did collect data from the Fediverse; it would become a hot topic and it might not be enough data anyways as the Fediverse is not mainstream enough normally. So the data and language collected here might skew in a few imaginable ways that one might find undesirable for a general model of word frequencies.

    Also the fact that people might not appreciate that data being collected. Let’s be real. It’s too soon for such a project to begin. The AI TREND MUST DIE as it currently lives and it’s corpse must be rotted away completely. Now, in internet time that may not be all that long…a few to several years…the memory of the internet can be short-lived at times. It must, however, fade from the public conscience into some obscurity first.

    Once the technology no longer lies in greedy hands again; new development can begin anew.


  • Now we wait for someone to build an absolutely wonderful chat app on top of this wonderful bit of PoC code…

    I genuinely hope someone does. Imagine what this could do if this was routed over Tor using Private Services.

    Run this over that; and you’d have a bullet-proof text chat. Wrap a nice GUI client around all of that and you have a proper secure, anonymous messenger with no problems. With a little more build-out; you could even implement the Matrix protocol over this wire-line and basically have full inter-federation and moderation over a secure wire protocol; allowing for complete privacy and client integration.

    TL;DR: Matrix over PQChat over Tor. Think about it. A Post-Quantum Dark-Matrix web.


  • Can it? Maybe. It’s not impossible; but it isn’t practical and most ISPs limit their shenanigans to grabbing your unencrypted DNS requests.

    Will it? Probably no; aside from the previously mentioned DNS redirections; they’re not interested in most people’s packets, only in how many they deliver.

    Should you care? I won’t tell you not to take precaution, but I do urge you to consider your threat model carefully and consider the tradeoffs. When Security & Privacy goes up, Convenience and Functionality WILL go down. Balance your needs. Don’t put yourself in a state of Privacy fatigue.

    Are there easy fixes? Maybe. I think a VPN or using Tor would solve your concerns here anyways; it’s not required that your modem be running OSS that you can control. If you can achieve it; that’s still good for you; but it’s not something to be sweating if your modem isn’t capable and your invasive ISP is the only effective option.


  • It feels like this vulnerability isn’t notable for the majority of users who don’t typically include “Being compromised by a Nation-State-Level Actor.”

    That being said; I do hope they get it fixed; and it looks like there’s already mitigations in place like protecting the authentication by another factor such as a PIN. That helps; for people who do have the rare threat model issue in play.

    The complexity of the attack also seems clearly difficult to achieve in any time frame; and would require likely hundreds of man-hours of work to pull off.

    If we assume they’re funded enough to park a van of specialty equipment close enough to you; steal your key and clone it; then return it before you notice…nothing you can do can defend against them.


  • (As if spoken by the King to Simba:)

    Rust: Everything from the bottom of this cliff to the acacia tree there is ours. Make sure you ask permission before you take something, take nothing you are not permitted to take. We don’t go beyond that tree; and if you even think about the elephant graveyard beyond it; I’ll kill you myself.

    C: Everything the sun touches is yours. I caution you to not venture into the shadows; but I will not stop you, for you are a king, and nothing a king can do is unnecessary if it is for his people.


  • I think there’s a problem with the ‘C only’ devs refusing to be accomodating to the Rust developers. Instead of being stubborn; why not provide them what is needed and help the Rust team learn how to maintain what is needed themselves?

    None of the reasons I’ve seen mentioned are legitimate reasons for refusing to at least help them a few times, and helping them to learn how to do the onerous task themselves so they can keep it off the main plate for too long.

    C devs do not need to learn Rust to provide critical information; they need only be present and cooperative with Rust devs to help them find, convert, and localize data structures for Rust use. They can stand to sit and pair code with their Rust Dev counterparts long enough to teach a Rust Dev counterpart how and what they need to look for in C code. It’s not that big of an ask, and it’s not something that really is a large ask. Provide the bindings for a short period of time, and work on training a team of Rust Devs to maintain the bindings.

    That way both sides are stepping up to meet the others and the data isn’t being sat on by the C-only Devs.



  • Typically, using your own VPN should suffice. Depending on your situation you can do other things as well. If you are unable to download these tools on the school network in question; do not attempt to do so again. Use a public or other network connection elsewhere to obtain the tools you need to bypass their crap.

    For example, NextDNS could be helpful. By running their client app; ( https://github.com/nextdns/nextdns/wiki/Windows ) you can make sure all your DNS requests are encrypted. Similarly you could simply set up a local DNS server that you point Windows at which can redirect those requests over DNS-Over-(HTTPS or TLS) to a DNS provider of your choosing.



  • Melody Fwygon@lemmy.onetomemes@lemmy.worldHa ha take that tea drinkers
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    2 months ago

    No shade on tea drinkers; but I prefer coffee. Iced. With cream and sugar. Yum.

    Tea; if that’s what you prefer, should be iced and sweetened to taste; unless you live above a certain latitude or are experiencing weather that is no warmer than (10 Celsius/50 Fahrenheit/283.15 Kelvin/509.67 Rankine/8 Réaumur/12.75 Rømer) in an 8 to 24 hour period



  • Honestly, there are low-touch/low-fuss distributions that exist that can be installed with some assistance from a more techy person in one’s life.

    But I will admit that Apple is more usable across the board.

    However, not everyone can really afford the extra cost of an Apple system; which genuinely does require re-buying a lot of other devices in order to get basic compatibility.

    For some, yes, Apple does solve the problem. For others, Linux can be accessible and easy to use; particularly if hardware being used is older, and the workflows are common enough.



  • The problem with PPA wasn’t anything to do with the method it uses. Given enough announcement, discourse and investigation by the community; it’s entirely possible that users in general would have accepted it.

    However; Mozilla did something very wrong by deploying this without asking the greater community. Point blank. That’s not good faith; and that did not allow for the community to go over the code and suggest fixes and express their concerns with how it works.

    Instead Mozilla took the lead and decided it will exist; quietly. Without consulting the community. Given that this is how most companies turn selfish, that alarms MANY people who are knowledgeable about how Mozilla typically operates, and it undermines public trust in Mozilla.