• 0 Posts
  • 25 Comments
Joined 11 months ago
cake
Cake day: November 4th, 2023

help-circle
  • The only way you can do this, is if the only service you use the provider for is storage. Encrypt the data before you send it to the provider and then they don’t know what they’re storing.

    If they have to do any processing on it at all, then conceptually they need a plain text copy of it to feed into the CPU. And if they have that, there is nothing you can do to stop them from stealing it or using it.

    There has been some research in this field, the concept is called homomorphic encryption. That is where you encrypt something in a way that allows a third party to manipulate the data without possessing a key. It is still very limited, and likely always will be due to the extreme difficulty of the question.


  • with an outside control interface that’s quite literally about as optimal as it can be.

    Which is probably true, as long as you make one assumption- that the operator dedicates a significant amount of time to learning it. With that assumption being true- I’ll assume you’re correct and it becomes much more efficient than a Nano/Notepad style editor.

    I’m happy to concede without any personal knowledge that if you’re hardcore editing code, it may well be worth the time to learn Vim, on the principle that it may well be the very most efficient terminal-based text editor.

    But what if you’re NOT hardcore editing code? What if you just need to edit a config file here and there? You don’t need the ‘absolute most efficient’ system because it’s NOT efficient for you to take the time to learn it. You just want to comment out a line and type a replacement below it. And you’ve been using Notepad-style text editors for years.

    Thus my point-- there is ABSOLUTELY a place for Vim. But wanting to just edit a file without having to learn a whole new editor doesn’t make one lazy. It means you’re being efficient, focusing your time on getting what you need done, done.




  • SirEDCaLot@lemmy.todaytoPrivacy@lemmy.mlIs TOR compromised?
    link
    fedilink
    arrow-up
    16
    arrow-down
    2
    ·
    20 days ago

    All the crypto in the world won’t help if you do stupid stuff and have crap OPSEC.

    A big part of that is stay under the radar. If I were NSA I’d be running a great many TOR nodes (both relay nodes and exit nodes) in the hope of generating some correlations. Remember, you don’t need to prove in order to raise suspicion.

    So for example if you have an exit node so you can see the request is CSAM related, and you run a bunch of intermediate nodes and your exit nodes will prefer routing traffic through your intermediate nodes (which also prefer routing traffic through your other intermediate nodes), you can guess that wherever the traffic goes after one or two relay hops through your nodes is whoever requested it.
    If you find a specific IP address frequently relaying CSAM traffic to the public Internet, that doesn’t actually prove anything but it does give you a suspicion ‘maybe the guy who owns that address likes kiddy porn, we should look into him’.

    Doing CSAM with AI tools on the public Internet is pretty stupid. Storing his stash on cell phones was even more stupid. Sharing any of it with anyone was monumentally stupid. All the hard crypto in the world won’t protect you if you do stupid stuff.


    So speaking to OP- First, I’d encourage you to consider moving to a country that has better free speech protections. Or advocate for change in your own country. It’s not always easy though, because sadly it’s the unpopular speech that needs protecting; if you don’t protect the unpopular stuff you jump down a very slippery slope. We figured that out in the USA but we seem to be forgetting it lately (always in the name of ‘protecting kids’ of course).

    That said, OP you should decide what exactly you want to accomplish. Chances are your nation’s shitty law is aimed at public participation type websites / social media. If it’s important for you to participate in those websites, you need to sort of pull an Ender’s Game type strategy (from the beginning of the book)- create an online-only persona, totally separate from your public identity. Only use it from devices you know are secure (and are protected with a lot of crypto). Only connect via TOR or similar privacy techniques (although for merely unpopular political speech, a VPN from a different country should suffice). NEVER use or allude to your real identity from the online persona. Create details about your persona that are different from your own- what city you’re in, what your age and gender are, what your background is, etc. NEVER use any of your real contact info or identity info.



  • This is exactly the issue. A friend of mine knew for a fact she never wanted to have children, but at the time was in her early twenties. Finding a surgeon who would do it was damn near impossible. Half of them refused without speaking with her husband (!) the other half just refused period saying she was young and didn’t know what she wants and would change her mind later.

    At NO point was ‘my body my choice’ part of the discussion.

    There was a similarly good thread on Reddit a couple weeks back about a woman who just gave birth and was having a lot of pain and knew something was wrong, and the doctor just dismissed her and said she’s being hormonal. It wasn’t until her husband threatened to sue the hospital that they finally got her a different doctor, who rushed her into the ER and as I recall said if she waited another day she’d have died.

    The point is, and the problem is, that medical establishment has an awful habit of denying women agency over their own bodies. Always wrapped in valid reasons, but the result is still the same.


  • Casey Neistat. Back when he was doing his daily vlog thing a lot of it was really interesting, covering him and his wife trying to make shit happen in the city as he was running and riding his powered skateboard around Manhattan. At some point his audience started drifting younger, way way younger, and I don’t know if it was him or me but I just kind of lost interest. It didn’t feel new anymore.

    That might be me to be honest. I actually don’t watch YouTube that much at all anymore, unless I’m looking for something specific. Their recommendation algorithm is garbage and it is so obviously going for raw time suck engagement that it leaves me with a bunch of unfulfilling clickbait / ragebait where I could watch it for an hour and then just want my hour back so I end up not returning. The whole platform used to be more full of interesting genuinely entertaining and educational videos, now it just feels like a giant time sink. And every other video is now some paid sponsorship or plug where the creator is basically just whoring out their own influence. Case in point, look up reviews of laser engravers. Every single one that I could find, especially of a couple major brands, the creator got the laser hardware for free. Some of them are just advertisements that reuse the manufacturer’s own stock footage, and some seem more like real reviews, but for one or two brands I literally could not find one video where the creator wasn’t sponsored by the laser manufacturer.



  • It’s a very simple answer Apple has guaranteed that your data will stay on your device and stay secure. This is generally trusted because Apple has a track record of keeping user data secure on the device or encrypted in the cloud even in ways Apple cannot access. Point is, when Apple says they are going to do this in a way that respects privacy, and they outline the technical details of how it will work, people trust that because there’s a track record.

    Microsoft has no such trust. They have a recent track record of being intrusive and using dark patterns to persuade users to give Microsoft their data, for example in Edge there have been new feature pop-ups that require data sharing with Microsoft and the two options are ‘got it’ and ‘settings’ so accepting requires one click and rejecting requires 4 going into the settings menu and changing a few things. Microsoft is also heavily pushing Copilot which is mostly cloud-based. Furthermore, Microsoft recently showed a system that would basically screenshot your computer at very regular intervals and store them in an insecure manner. Granted it was on the device, but the way they were going to be stored meant they could be stolen with two lines of code. And let’s not forget that Windows 11 cannot be set up without a Microsoft account, so to even use your computer you have to share your email address with Microsoft. In this and many other ways they just do not act like a company that respects privacy at all, they act like the typical big tech give us everything or we will make your life difficult type company that nobody trusts.





  • Easy. Electroplasma is very hot and very energetic. When it ruptures out of the conduit, The hot energetic plasma not only mechanically fractures the materials around it, but the plasma itself is a form of matter that will, when it’s energy is released and it cools, return to whatever state it would normally be at room temperature.

    Surface ships use deuterium and anti-deuterium as fuel, deuterium is liquid at room temperature. Assuming the combined plasma is also deuterium, that would mean it is eventually condensing to liquid. So I imagine the interaction between the plasma and some other material would turn the other material into a sort of spongy texture, which is probably dark due to being scorched. Thus, I don’t think that’s rock at all. It is scorched material from around the plasma conduit, that has been melted and integrated with the plasma which then returned to a lower energy state, namely deuterium steam or liquid.


  • The explanation I’ve always had- I think this was from some official source but I could have just made it up.

    Starfleet ships use EPS (Electro-Plasma System) to route power around the ship in the form of electro-plasma (a highly energized form of plasma). The warp core generates a lot of this plasma, which is piped through conduits to various devices around the ship. The EPS system and its related systems generate a lot of treknobabble about ‘scrubbing plasma conduits’ (apparently done from the outside using a field generator tool, but still boring), ‘replacing plasma relays’ (the valves that route plasma around, apparently they go bad frequently); problems like ruptured plasma conduits are dangerous and require immediate repair, etc.

    Because this all works in a grid system, whenever the ship takes damage (especially energetic damage like weapons fire) the EPS conduits can carry energy spikes all over the ship. That’s why as the ship takes damage you see random small explosions and sparks all over the place- something hits or spikes the EPS grid and the shockwave ends up, well, wherever in the grid it ends up.

    Of course many EPS conduits go to bridge terminals, especially as those terminals may have direct connections to the ship systems in question.


    Of course in reality this would be seen as a horrible safety risk, and a bridge terminal that could probably run on a car battery shouldn’t have explosive plasma running through it especially when it can explode and harm the operator. In fact one could argue a safe starship should keep all EPS stuff as far away from any essential human-inhabited areas of the ship as possible (especially the bridge).

    One counter to that might be that perhaps the consoles actually play some role in EPS switching, but that seems a bad tradeoff to me.


  • Welcome to Clock 2.0, the new time and reminder experience from Microsoft! Powered by Bing AI and Microsoft OneDrive.

    • Sync your time zones, alarms, and reminders to all your devices via Microsoft OneDrive
    • Get suggested wake-up times powered by Bing AI and your calendar!
    • Use of Clock is governed by the Microsoft Cloud Connected Experiences Privacy Policy (click here to view).
    • Click I Agree to start your use of Microsoft Clock!

    and for all this, your alarm reminders become yet another datapoint for personalized ads, your phone alarm to wake you up then plays at full blast through the living room computer and wakes everybody else up, and you agreed to a 750kb privacy policy that displays in a 2"x3" window with 500 pages to scroll through.