umami_wasbi

@[email protected]

pending anonymous user

This profile is from a federated server and may be incomplete. Browse more on the original instance.

umami_wasbi,

If get into smartphones, it became a mega cookie to track every single person, unless it can be deactivated.

I won’t be surprise that some SNS will require this soon for uploading media when the adoption is wide enough.

does Google severly dislike Firefox??

with the recent news about the things that were said about Google slowing down Firefox on purpose, are they doing this because they severily dislike Firefox/open source? :c If so, that wouldn’t make a lot of sense!!! Because Google loves open source too. I read they were doing this to stop adblockers, and well if you use...

umami_wasbi,

They like anything that can generate profits for them, The point isn’t open source. If OSS can give them more benefits, they are 1000% happy to do.

Say Chromium, yeah they OSS it, but also give them power to define web standards. Many sites would “advice” its user to use Chrome or Edge. Why? Because Chromium based browers had almost 90% market share. Why bother to make it compatiable with other browers? Then the Manifest v3 and Web Environment Integrity shit came out.

They didn’t dislike FF particular, but anything that hurt their profit, as any for-profit company would do.

umami_wasbi,

Yes as its just another link, but not that usable deployed alone.

For example, log in to unsubscribe. I had a few marketing emails does this.

However, when’s your last time clicking the unsubscribe link? I guess most people would mark it spam before unsubscribe, at least I do.

Most attackers will consider more eye catching, urgent, and time sensitive subjects like prizes win, exclusive discounts, or account security warning rather wait one clicking on the unsubscribe link. It is more resonable to add a malicious unsub link with all other links. Actually, all links should redirect the victim to the phishing page.

umami_wasbi,

Republican FCC Commissioner Brendan Carr said the plan gives “the federal government a roving mandate to micromanage nearly every aspect of how the Internet functions.”

IHO, this doesn’t affect how the Internet function, at all. Internet doesn’t just exist in the US. What it does is manage and governs the access to the Internet, and make it equaily accessible, within US jurisdiction. Micro or not, that’s subjective.

umami_wasbi,

I like the product but not the ad.

umami_wasbi,

I’m dual booting my laptop and most of the time I stay using Linux. There just no point using Windows except some specific tasks.

umami_wasbi,

I’m browsing via the Jerboa app, which I can’t read anything except some non sense strings.

You got the idea but the execution is subpar TBH. Browsers are not the only method to view contents nowadays.

umami_wasbi,

This might upset you but for some uncensored model that have alignment removed will output such content. Is the content true? Don’t know cuz I haven’t read Harry Potter.

umami_wasbi,

If we treat model like a brain that “memorize” copyrighted text and generate new text based on that, your statement is valid. However, this will also prohibit any copyright claims on the model’s output, as the act of memorization isn’t a work. Only work can infringe on other works, which should the output of models defined as “work” is still under heavy debate. Even if it is defined as a work, can a model gain copyright while not being a legal person? Who should bear the liability then? What if the output is modify by an editor? This rabbit hole digs deep.

umami_wasbi,

If your client or something leaks your IP it happens anyways, if you route it over one node or seven. All the extra energy is just wasted.

Yes. That’s how I see the problem.

And bittorrent puts even more strain on the TOR network the way it works. Probably making it slower for anybody else.

I understand and agree.

In the context of this question, I don’t really cares if the IP changes or if UDP supported or the network degraded. I’m asking a more fundamental one: when the data in the BT protocol contains sensitive information, then why VPN/I2P is acceptable but Tor (or other transport) are not? That sensitive info is still being transmitted. If that Tor blog is true, then no matter what we use, it is still bad for privacy.

umami_wasbi,

Thanks. I was hoping 13 years will bring some improvements but sadly seems like not.

umami_wasbi,

Can you please elaborate more on my next post? Thanks. lemmy.ml/post/7508828

umami_wasbi,

I thought it is better as the focus is different: one is about “Is a blog post written 13 years ago still valid today”, the other one is “If BT protocol leaks information anyways, why VPN is acceptable but other’s not.” That’s the reasoning.

umami_wasbi,

I don’t understand what the down votes are for. Disagreement? What’s wrong in hoping for improvements in a 13 years gap? I understand and agree that BT over Tor is bad, but two doesn’t conflict.

umami_wasbi,

Then I’m sorry for not reading carefully.

umami_wasbi,

Blocky installed locally as a service for my PC github.com/0xERR0R/blocky

RethinkDNS for my phone rethinkdns.com/configure

umami_wasbi,

Using signal but planning to switch. SimpleX and XMPP are my candidates.

umami_wasbi,

There are numerous problems other:

  • content governance
  • format standardization
  • malvertisement prevention
  • XSS possibility
  • Loading time to different advertiser’s server (subject to implementation)
  • Revenue (if monetary based, which may involve going down the cryptocurrency, tracking/privacy, ad fruad, etc. rabbit hole)
  • Ad blockers

That’s what I think of off of my head.

umami_wasbi,

I don’t quite grasp the concept.

Are you asking for a decentralized DoubleClick copy? What you mean by “automatic”? What problem you’re trying to solve? Who are the audiences? You said personal websites then who is the advertiser? If that’s other personal websites, what are they going to advertise?

I don’t use Mastodon so could you please elaborate more? Thanks.

umami_wasbi,

I guess “RSS Aggregator” is what you looking for.

umami_wasbi,

He is sort of right, back in 2019. Even then, IBM PowerPC mainframe are still thriving.

Now, new language with cross compilation with some maturity are here. Major cloud providers now have ARM base machines ready, even designing to their own need.

ARM is in the datacenter market and become a trend.

The only thing I worried about, is the architecture of ARM are too fractured. AWS Graviton might behave differently than Ampere Altra, despite both have the ARM ISA.

umami_wasbi,

With x86, there are AMD and Intel. With ARM, how many designers are here? With more designers, the smaller the potential common ground is, and more code paths to optimize, thus cost more to build.

Windows pc calling home (even while asleep) (lemmy.dbzer0.com)

I have a network-wide pi hole and I noticed that it requested activity.windows.com, a url blocked by my pi hole, even while my pc is suspended. I pinged 10.0.0.217 and it is currently unreachable. So, somehow, windows pc’s turn on networking, phones home, and turns off even while suspended....

umami_wasbi,

Ain’t 10.0.0.217 an private IP?

umami_wasbi,

Yah. That make sense now. I thought that’s what the domain resolved to.

Never used PiHole but Blocky.

umami_wasbi,

Thanks for the input, yet I’m looking for generic encryption and signing tool. Not mesaaging app.

umami_wasbi,

I would treat GPG and PGP that same thing as they suffer the same problem like long lived root key, and problematic key management.

umami_wasbi,

Yes, I do mentioned age and I wish I can use it. Unfortunately, there isn’t a standalone app, at least on Android, performing age related operations.

umami_wasbi,

So you have two keys: master and ephemeral key. Both are independent to each other. Mater doesn’t expire and ephemeral will have a short period of validity.

You kept the master key secure, and using it to certify the ephemeral key with a expire date?

You still need to publish the master’s public key to key server for everyone knows and verify you signed the ephemeral key isn’t?

umami_wasbi,

Ain’t Keybase dead already after aquired by Zoom? And using PGP/GPG underneath.

umami_wasbi,

Please correct me if I misunderstood.

You have one master key (root). This key have strong connection to your identity. However, you kept this in secret.

You have one or more ephemeral keys (edge). You can dedicate each key for different purposes. You sign these keys with the root key.

If I’m not mistaken, it’s essentially the “Web of Trust”. How do people trust your edge keys without knowing the root’s public key by “the signer hash is the same”? While I can see the certification on your edge key, I can’t build a trust path as I don’t have your root’s public key.

I don’t really understand “each ephemeral key in the chain”. What chain actually? Chain as in " Web of Trust"? Or as in subkeys?

umami_wasbi,

I believe the problem isn’t the place where journalist can write, but place to get exposure.

Yes, one can write a blog but how many of the netizens read blogs without a social media link? Independent journalist aren’t newspaper nor magazine. When they investigated something and reported it, yet no one reads it, that’s waste of effort. Social media is the perfect place for them to get exposure.

Twitter of course not the only social media in the world. But in reality, we consume less and less textual but visual information. And Twitter is one of the few platform that focused on text, rather images or videos.

umami_wasbi,

That’s just an excuse to charge more. TOTP is standardized in RFC 6238 and cost nothing to generate.

umami_wasbi,

Except Steam and banks that are stubborn and insist to use a custom implementation rather a standard one.

umami_wasbi,

Which I will use it when making tomato sauce.

umami_wasbi,

Any trusted auto CI build linked to an F-Droid repo for management and update?

umami_wasbi,

So just a private CI build with a private f-droid repo for the revanced app

umami_wasbi,

Anonaddy/Addy.io to create aliases, then PGP encrypt it before forwarding to my Google mailbox.

I also use Proton but considering ditching it in favor of Anonaddy.

umami_wasbi,

Oh wow. Maybe I will migrate to Tutanota from Proton then. That price, function, and dedication to privacy sounds quite attractive to me.

umami_wasbi,

Just don’t mix up public and private IP. You cant use private IP outside of your LAN if you want to access it when you on the go.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • uselessserver093
  • Food
  • aaaaaaacccccccce
  • test
  • CafeMeta
  • testmag
  • MUD
  • RhythmGameZone
  • RSS
  • dabs
  • KamenRider
  • TheResearchGuardian
  • KbinCafe
  • Socialism
  • oklahoma
  • SuperSentai
  • feritale
  • All magazines