

Consumer protection here kicks in after you paid for something, until then you’re just a visitor
Cryptography nerd
Fediverse accounts;
@Natanael@slrpnk.net (main)
@Natanael@infosec.pub
@Natanael@lemmy.zip
Bluesky: natanael.bsky.social


Consumer protection here kicks in after you paid for something, until then you’re just a visitor


A restaurant owner can kick you out for not liking your colors. They rarely do because it’s bad for business.


Two wrongs don’t make a right


Either they have sources inside satellite imaging operators, or a satellite with ground track imaging was routed to fly over


They made the prices so insane that most 3rd party apps couldn’t justify the higher subscription price


They didn’t even evacuate their bases in advance! They didn’t even install air defenses at them! They did nothing whatsoever to prepare! They just assumed instant success!


No he didn’t follow a plan. The plans said things like Iran would counter attack and try to close the strait. Trump and his team didn’t even look at the plans. They went with Netanyahu’s suggestion
The biggest clue to that bombing is them admitting they asked AI for targets and it delivered outdated info


Trump went to war without a plan, the lack of plans didn’t stop him


Remember the touch panel on the back and the games that used it?


Causing shrapnel to fly a bit is one way to get those numbers without deaths, but even then you have a high risk of many serious injuries, these aren’t controlled explosions


AFAICT they probably won’t be advertising it as a general distro because they want some control of it (broad hardware compatibility is hard) but they do want other OEMs to use it and contribute patches to make it work on their hardware, which is easier on Linux if the distro is simply available to test on other hardware freely and patches can be upstreamed via the Linux kernel for drivers, etc
Tldr the public release will probably be full of disclaimers and oriented to PC makers


Via USB, your options are extra software on the PC or jailbreaking the phone to install a kernel module. (edit: that kernel module would be the UVC one, seems like some phones ship it already)
The easiest solution is streaming the image over the network.
If you’re connected by USB then Android phones support ethernet over USB adapters, so you can make the computer present a network connection over the USB cable (internet sharing over USB) for more stable streaming.


It does use deniable encryption, but that stops working as a defense the second they take your phone and copy all logs from your device.
And large group chats relies on how well you can vet participants more than it relies on encryption itself, and if they’re too large they may as well not be encrypted.


They changed that. You can make yourself undiscoverable by just the number now


At that point you can rely on nothing but Tor or I2P
Nothing else hides metadata better than Signal, without involving large networks of independent nodes that participate in Sybil resistant routing. The only thing that gets close is threshold schemes where you still need multiple independent entities running servers.


What evidence do you have that Signal collects anything? Traffic logs from the app or something?


The pair of Zint and Zbar does everything Qr codes (and endless other codes)
There’s apparently multiple tools with the name, but none does the obvious of scanning unused space in the file system for remnants of unlinked files (there’s other tools doing that, but not using that name)


Might also be that fewer are posting about strong disagreements here and mostly have minor ones. Not unlikely when there’s already strong selection effects in who chooses to come here.
Posting for an audience of one