

Drink a verification can
Cryptography nerd
Fediverse accounts;
@Natanael@slrpnk.net (main)
@Natanael@infosec.pub
@Natanael@lemmy.zip
Bluesky: natanael.bsky.social


Drink a verification can


They made the prices so insane that most 3rd party apps couldn’t justify the higher subscription price


Remember the touch panel on the back and the games that used it?


He needs to end in a humiliating self inflicted way. Falling off the stairs or something.


It does use deniable encryption, but that stops working as a defense the second they take your phone and copy all logs from your device.
And large group chats relies on how well you can vet participants more than it relies on encryption itself, and if they’re too large they may as well not be encrypted.


They changed that. You can make yourself undiscoverable by just the number now


At that point you can rely on nothing but Tor or I2P
Nothing else hides metadata better than Signal, without involving large networks of independent nodes that participate in Sybil resistant routing. The only thing that gets close is threshold schemes where you still need multiple independent entities running servers.


What evidence do you have that Signal collects anything? Traffic logs from the app or something?


The pair of Zint and Zbar does everything Qr codes (and endless other codes)


Here in Sweden we have that too, and we just got new machines in many of the bigger stores which sorts for you. You open the lid and there’s an angled wheel with indents which pulls up the bottles and cans you pour in from your bags, and they end up on a conveyor belt for scanning and sorting. While not magically fast, it really does help when people have a ton of bottles and cans
Not a fan of the marketing speak on that page, as a cryptography nerd there’s a lot of questionable stuff.
SAS authentication is stone cold dead in the LLM age. P2P with friends is trivially trackable by the ISP and can easily map who knows who. ECDSA isn’t “industry leading”, that would be EdDSA or something based on Risetto, or a pq algorithm like ML-DSA


Yes you can cite the other party’s past statements. They might not always mean as much as you hoped for the current court case, unless you can show it was a consistent position of your counterparty even recently, or in particular if they gave you reason to believe that was their position.
“their lawyer said X in one of many arguments in court” is often not that strong
Depends on how repressive.
Often your main method of staying safe is appearing harmless.
You can find dedicated Mastodon and lemmy hosts more receptive to VPN users.
Anonymous use is hard due to stuff like timing attacks and writing style recognition, etc, especially if you post publicly. You want to mimic another style, for example. And create plausible deniability around timings (like say scheduled posts)


Don’t just tweak deadzones, you also want to tweak scaling on joysticks (how large numbers a given angle corresponds to)


Could be that you loaded an incomplete set the second time…? 🤷


That would make it stop at the end of the bootloader with decryption failure, not full bricking


Could be a UEFI bug in the VM itself;
Could also be that you didn’t sign your boot image since that command seems to load the secure boot signing key into the UEFI firmware, if you cleared other signing keys then potentially no code can load. You would have to load the keys for whatever UEFI firmware vendor is used (presumably that made by the VM software maker) or sign it yourself, etc.
Big mlem
Silverfish tend to look different