sudneo

joined 7 months ago
[–] sudneo@lemm.ee 5 points 23 hours ago (4 children)

That's fair but it's also one of the biggest selling points for me. The isolation it provides is one of the reasons I'd rather ran applications in Flatpak (if possible).

[–] sudneo@lemm.ee 4 points 5 days ago (1 children)

But Light is like a generic incarnation of god but also knowledge, revelation etc., it's way more absolute than peace or even love. I think Light does make sense from their perspective, and in the catholic symbolism it is identified basically with all positive stuff.

You had a bunch of other references that make sense eh, I am not familiar with them, so I respect that people might have different perceptions.

[–] sudneo@lemm.ee 24 points 5 days ago (5 children)

I know nothing about anime, but I guess it is not that bad? Luce is straight up "light" in Italian, and Lucifer just means "the one who brings light" because it's the Angel's name, before the fall according to the fairytale. So from their POV it should all make sense.

[–] sudneo@lemm.ee 3 points 1 week ago

For browser, there is a webapp that can be selfhosted. See here https://github.com/logseq/logseq/blob/master/docs/docker-web-app-guide.md

I think you need chromium browsers due to the API they use, but it should work.

[–] sudneo@lemm.ee 3 points 1 week ago

Many encryption algorithms rely on the assumption that the factorizations of numbers in prime numbers has an exponential cost and not a polynomial cost (I.e. is a NP problem and not P, and we don't know if P != NP although many would bet on it). Whether there are infinite prime numbers or not is really irrelevant in the context you are mentioning, because encryption relies on factorizing finite numbers of relatively fixed sizes.

The problem is that for big numbers like n=p*q (where p and q are both prime) it's expensive to recover p and q given n.

Note that actually more modern ciphers don't rely on this (like elliptic curve crypto).

[–] sudneo@lemm.ee 0 points 2 weeks ago

Every point can be supported with an analogy bad enough

[–] sudneo@lemm.ee 7 points 4 weeks ago

Yep, my partner gave one for my birthday, it's basically plug-and-play. It can automatically harvest credentials, spoof captive portals, etc. I bet that in most places nobody would question something like this hanging on the ceiling indeed.

[–] sudneo@lemm.ee 25 points 4 weeks ago (2 children)

Just FYI https://shop.hak5.org/products/wifi-pineapple. There are ready-made devices that can do basically what you are describing!

[–] sudneo@lemm.ee 12 points 4 weeks ago

Encrypted DNS doesn't solve everything. Handshake for TLS sessions is still in clear, you can usually see the SNI, and since we are talking about Wireless, usually this data is available to anybody who is in the vicinity, not just the network owner. This already means that you can see what sites someone is visiting, more or less. TLS 1.3 can mitigate some of this (for those who implement ESNI, but you don't know that beforehand). Also TLS works until the user is not accepting invalid certificates prompts (HSTS doesn't work for everything) and there are still tons of HTTP-based redirect (check mailing newsletters and see how many first send you to an HTTP site, for example) that can be used for MiTM attacks.

A VPN moves the trust to a single provider that you can choose, which is much better than trusting every single WiFi network you can attach to and the people connected to it, I would say.

Also if you pay for the VPN (I pay Proton), it's not true that the company business is based on user data, they are based on subscriptions.

[–] sudneo@lemm.ee 2 points 1 month ago

That app doesn't work as it needs some play API which I guess is not implemented in microG. I am guessing not all of them are passed though.

[–] sudneo@lemm.ee 2 points 1 month ago (2 children)

My FP3 on /e/OS (based on lineage) has native recording. The phone passes safetynet check, i believe due to microG. However, some apps consider the bootloader unlocked so YMMV.

view more: next ›