• 0 Posts
  • 24 Comments
Joined 8 months ago
cake
Cake day: June 10th, 2024

help-circle
  • Federated browsers

    That’s literally just regular browsers, you can interact with any one of billions of webservers

    Federated github

    Git is federated by nature, you can add as many remotes as you wish and push/pull to all of them. Add in a mailing list for issue tracking and “pull requests” (patch submissions) and you’re golden. You can look up sourcehut to self-host a well-integrated combination of the two.

    Federated hosting providers

    Not sure what exactly you mean by this but maybe take a look at IPFS, although it’s more P2P then federation.

    Federated internet

    Internet is already fairly federated by nature - most commonly used protocols in the OSI stack are open and you can host your own components of critical infrastructure. Getting others to interact with them might be difficult due to security & privacy issues.




  • If you look closesly there’s a lot of nonsensical details, like the quite high water tower in the top right, window layout on the side of the building facing us, different lengths and angles of fire escape stairs, a weird semi-reflective “thing” (scaffolding?) on the left of the image (and if it is indeed reflective, the reflection doesn’t match the original), extremely weird-looking humans on the hoist and artifacts on the hoist railing. None of these are a dead giveaway, but the general vibe is off.





  • Honestly, while fun, those videos don’t provide too much value per GB - and I say that as someone who’s watched almost all of them. Their main actual benefit besides entertainment is (IMHO) getting people interested in the relevant field so they study more thoroughly. They often explain simple yet dazzling concepts which get you hooked but don’t provide much value on their own, and don’t directly enable you to solve real-life problems. Even more involved videos like those by 3blue1brown are still edutainment at their core, as acknowledged by the author. In an apocalypse (which, let’s face it, is the most likely reason the internet would indefinitely go down in a developed country) you would be much better off with engineering (mechanical, electrical, etc) literature and textbooks, maybe a couple science textbooks for good measure (I have a drawer full of the Feynman lectures in case something like this happens).






  • Nah, cheap phones often have their bootloader unlocked/unlockable. Really happy with my POCO M5 running modified AOSP. Also, unlike every expensive phone nowadays, it has 3.5mm jack, SD card slot, and exceptional battery life for hiking/trekking (it survives 5-6 days as just a camera+map phone with all power saving on, in comparison people with flagships typically only last 2-3 days with the same usage and power-saving techniques).




  • I’m not sure you should “cheap out” on headphones per se. The really cheap ones are usually horrible, both in terms of sound quality, usability and comfort (well, except for wired Apple ones, allegedly, though they never fit me right). It’s just that it makes no sense to go for really expensive ones, unless you’re really into audio and love hearing the tiny sound reproduction differences between them, or enjoying the different tech etc. The middle ground of $50-$100 for in-ears and $100-300 for over-ears will often offer you good/great/excellent sound quality and the same usability&comfort as more expensive ones.


  • balsoft@lemmy.mltoTechnology@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    5 months ago

    Problem is not how weak or strong the encryption is

    Here it’s definitely part of discussion. The context was

    It’s encrypted anonymous communication capabilities.

    It’s barely anonymous, and poorly encrypted. The latter is the reason Durov is in custody while Signal devs are scott free. He could easily turn illegal stuff over to French authorities, but doesn’t.

    The bigger problem is that people somehow assume this a huge threat, while all previous cases didn’t involve anything like that.

    There have absolutely been cases where a backdoor/weakness/lack of encryption used to catch criminals before: https://en.wikipedia.org/wiki/Operation_Trojan_Shield https://en.wikipedia.org/wiki/Ennetcom https://en.wikipedia.org/wiki/EncroChat . I distinctly remember that there were also arrests of opposition activists in Russia based on personal messages in VKontakte, but can’t find the news right now.

    real criminals do their stuff everywhere (especially on telegram) for years, staying safe.

    Some are staying safe, others are being caught precisely because of this.

    Problem is not how weak or strong the encryption is, but that once you are under oppression and do opposition activities, you’re going to learn by yourself how to deal with it.

    Using better encryption schemes is definitely part of that.


  • balsoft@lemmy.mltoTechnology@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    5 months ago

    Toy may call it TLS but it’s a custom protocol.

    Sure, it’s mtproto. The security it provides for non-encrypted chats (which are the absolute majority of chats) is not any different from just having TLS for transport. It’s potentially even worse as it’s not as well-audited.

    Data is not kept unencrypted on their servers, according to their docs.

    That just means that they store both your data in some encrypted way and the key. They can still read it trivially. You don’t even have to know the protocol to understand why: you can add new devices without having any other device online, and read all non-secret chats. It might also just mean disk encryption, in which case it’s plain-text in RAM while the server is running.