• 2 Posts
  • 16 Comments
Joined 7 months ago
cake
Cake day: April 3rd, 2024

help-circle

  • Don’t get things for free! Ever! The producers aren’t rich enough yet to pay the artists a living wage for their creative work. Homeland will extra-judicially use weapon systems on you even if you don’t pirate because all it takes is false accusation and then you will be tortured and never allowed to reproduce anywhere in the US sphere of influence (or TPP or UN).





  • Unfortunately, Tinder doesn’t work and that is helpful to get in touch with the ladies. That app is too hell bent on location data which GOS handles more privately.

    NFC should work, it is just scheduled to be deactivated after 3 months if not used for security reasons.

    I think GOS is very user friendly and has many positive privacy and security enhancements. I would like to see if they can surpass sandboxed Google Play and officially support other repositories and updaters like Accrescent. Also, a standard way of securing traffic beyond encrypted DNS would be good such as a tor client like Orbot.

    Looking into the Veilid ecosystem might also be a source for further development ideas.






  • Ah, that must be it. 2FA is still a very good security feature to have.

    But there is nothing only you know that is still useful because a secret must be shared in order to be useful (unless you just have full disk encryption and then when it is unlocked and network connected, it is still vulnerable). In short, admins could change your password since you are not the sole admin of your own server but then you would have to have mass appeal to be “useful”, i.e. popular.

    In theory, Tim Cook might have a keybearer who could usurp the throne with all the proprietary OEM crypto keys that only the Company knows, but everyone knows who the CEO is and the keybearer could get in big trouble unless he had an army…

    Things can be changed on the server side and the network is not the same as the device: these are technology truths some people refuse to ever understand.



  • Do you want to show us what that looks like in assembly, ASCII from machine code? …ha, ha, ha, no!

    Depends on the device, I know. Such a pain without the higher level languages.

    What would it look like for ARM android touch screens? Just for one character…

    But if some characters go missing or are exchanged for others for no discernable reason, then might that be an exploit on a EC or assembly level?


  • What do you think about sites that don’t work with all variety of DNS (not even cloudflare) or proxies or tor or Firefox or Chrome or varied AP or varied devices–in short, all access combinations?

    Dead link? Total Information Awareness roving tap castiron?

    Can you unblock 404 Media podcasts on Signal and Identity Hacked? Tried both Spotify and Apple Podcasts.