

Drink a verification can
Cryptography nerd
Fediverse accounts;
@Natanael@slrpnk.net (main)
@Natanael@infosec.pub
@Natanael@lemmy.zip
@Natanael_L@mastodon.social
Bluesky: natanael.bsky.social


Drink a verification can
Oh, you speak native The Sims?
Don’t dead open inside


They made the prices so insane that most 3rd party apps couldn’t justify the higher subscription price
Reinforced feedback learning is kinda that


AFAICT they probably won’t be advertising it as a general distro because they want some control of it (broad hardware compatibility is hard) but they do want other OEMs to use it and contribute patches to make it work on their hardware, which is easier on Linux if the distro is simply available to test on other hardware freely and patches can be upstreamed via the Linux kernel for drivers, etc
Tldr the public release will probably be full of disclaimers and oriented to PC makers


Theoretically possible


Via USB, your options are extra software on the PC or jailbreaking the phone to install a kernel module. (edit: that kernel module would be the UVC one, seems like some phones ship it already)
The easiest solution is streaming the image over the network.
If you’re connected by USB then Android phones support ethernet over USB adapters, so you can make the computer present a network connection over the USB cable (internet sharing over USB) for more stable streaming.


It does use deniable encryption, but that stops working as a defense the second they take your phone and copy all logs from your device.
And large group chats relies on how well you can vet participants more than it relies on encryption itself, and if they’re too large they may as well not be encrypted.


They changed that. You can make yourself undiscoverable by just the number now


At that point you can rely on nothing but Tor or I2P
Nothing else hides metadata better than Signal, without involving large networks of independent nodes that participate in Sybil resistant routing. The only thing that gets close is threshold schemes where you still need multiple independent entities running servers.


What evidence do you have that Signal collects anything? Traffic logs from the app or something?


Here in Sweden we have that too, and we just got new machines in many of the bigger stores which sorts for you. You open the lid and there’s an angled wheel with indents which pulls up the bottles and cans you pour in from your bags, and they end up on a conveyor belt for scanning and sorting. While not magically fast, it really does help when people have a ton of bottles and cans
Not a fan of the marketing speak on that page, as a cryptography nerd there’s a lot of questionable stuff.
SAS authentication is stone cold dead in the LLM age. P2P with friends is trivially trackable by the ISP and can easily map who knows who. ECDSA isn’t “industry leading”, that would be EdDSA or something based on Risetto, or a pq algorithm like ML-DSA
Depends on how repressive.
Often your main method of staying safe is appearing harmless.
You can find dedicated Mastodon and lemmy hosts more receptive to VPN users.
Anonymous use is hard due to stuff like timing attacks and writing style recognition, etc, especially if you post publicly. You want to mimic another style, for example. And create plausible deniability around timings (like say scheduled posts)


Could be that you loaded an incomplete set the second time…? 🤷
Silverfish tend to look different