• 0 Posts
  • 46 Comments
Joined 1Y ago
cake
Cake day: Jan 15, 2024

help-circle
rss

Is there some easy way to find devices that don’t support win 11 on ebay? Hoping for cheap laptops for surfing.


I never made a MS account, so I no longer own Minecraft since they stopped accepting Mojang accounts.

My sibling in christ: you never owned Minecraft, then.


If you’re only interested in singleplayer or can convince your friends to move: There’s a free, open source alternative called Luanti.



Sorry, homie. I’m not gonna keep arguing with you if you obviously can’t argue without moving the goal posts, if your life depends on it.

My point still stands: Encrypting metadata can be sensible/necessary for your threat model and does not count as security through obscurity. You have failed to explain how it would be and then started to attack me, personally.

Have fun misrepresenting this comment as well, bye.


Firstly, if the police confiscate your PC, they already know (and have proven to a judge) that you conduct illegal activity and likely already have enough to convict you of a crime. lol

Not if it’s for securing evidence. That is only collected before the verdict/conviction. Otherwise, there wouldn’t be any need for a trial.

Also, your metadata can put others in jeopardy. If you’re busted for being an antifascist activist, who the police deems a “terrorist” and you’re also member of another activist group which up to then wasn’t in the sights of law enforcement, then you’re putting that other activist group’s members in danger.

Secondly, you can have an account at a private torrent tracker […]

That wasn’t my argument, though. You can criticise the circumstances that started my example premise, but the point still stands: having metadata that’s clearly visible can be dangerous, because it can give an attacker more information on you (depending on your threat model).

These are exceptionally poor arguments.

You’ve actually only attacked my examples, not my argument. My original point still stands: The type of accounts you have can be something you legitimately want/need to encrypt. Not only the credentials.


Because if the data is secure, it makes no difference if a bad actor knows you have an account with a service or not

Bullshit. It’s not about the obvious services, but rather the ones that give more info about my profile.

If the police confiscates my PC because of e.g. piracy, they could nail me down if they also knew that I had an account at a darkweb marketplace, or that I am a member of an organization that’s deemed to be “terrorist”.

The only way to hide that info with pass is to give it a cryptic name which make it less obvious, what the account is actually for. That is both inconvenient and I would argue: also quite security of obscurity.

This is an example of security through obscurity.

It is not. Security through obscurity relies on having a visible secret hidden somewhere where “no one would think to check”. That’s different than encrypting the whole meta-structure of your digital life.


That’s a non-sequitur.

How is encrypting the metadata, as well as the data security through obscurity? O.o


OP is talking about hhe meta-structure being visible.

If my filesystem gets compromised (stolen, confiscated, etc.) and I use pass, the infiltrators will know that I have a password that I labeled “slrpnk.net”. They won’t have access to the password itself, but they’ll be able to determine all the services I have accounts at.





It’s great, but it drains my battery like hell, (with three profiles: default, google-ser-ices and owner… don’t know if that’s still recommended)


Just curious: what’s the usecase of others joining your tailnet? Filesharing/Private cloud services?


Remember that you need to let the server run for a bit, so it can establish , the routes.

I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.


At least they can’t utili’e the applied tactic to host their own node.



I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.


Pretty much all your worries can be fought with activism. Efficient activism will make you a target for law enforcement.


So your “argument” is purely semantic. Good to know.


Considering how much of a nieche Bitcoin still is: 0.5% of global energy usage is one hell of a lot of energy!

In what universe is proof-of-work more efficient than conventional banking systems?


Bitcoin’s annualized footprint in electricity consumption reached an all-time high in early 2022, then believed to be higher than the power consumption of Finland.

Sauce


Governments and CBDCs: “And I took that personally”.jpeg

You dropped this: Hands you a tinfoil hat


Buys fewer eggs than it used to huh?

Yeah. But it has been way more stable in the timespan of a few minutes.

Please read up a bit on economics. You’re embarrassing yourself with your austrian brainworm.


Gotta love to use a currency with that fluctuating value. /s

When I pay for a coffee and the shop says that I paid the equivalent of 5 cents. Then, I pay the rest and all of a sudden: I paid the equivalent of 100€.


So, you agree that it’s not anonymous?


Cash: Continues existing

Crypto bros: “And I took that personally”.jpeg



FOSS doesn’t require that it’s not sold commercially.

The “Free” is as in speech.

I think it’s great that FOSS developers can get paid.


Selaco is a quite recent FOSS game, pased on DOOM.


  • It requires your phone number

Not anymore, right? Or does it still need your number for signing up?


Some reporter(s?) in Germany found that all the forums for CSA actually host their material in the clearnet, i.e. on Google Drive, Dropbox, etc. (since TOR speeds are shit and those people don’t watch SD videos anymore).

The police could have demanded data from the uploading accounts and that the material was taken offline. They refused to do so, in order to “catch more criminals” or something like that.

So, their “think of the children” is exactly as in the spirit of Helen Lovejoy as it seems.

Sauce: https://www.tagesschau.de/investigativ/panorama/kinderpornografie-loeschung-101.html


Isn’t the option to backup whatsapp data to Gdrive encrypted opt-in?



If you’d like to have a more ergonomical keyboard: thumb-key is way worth the learning curve!




Compare the production values of channels like e.g. philosophy tube and old AVGNs. Times have changed.