1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\Entry {#1586
+user: App\Entity\User {#265 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1597 …}
+image: Proxies\__CG__\App\Entity\Image {#1687 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1731 …}
+slug: "The-AirDrop-flaw-exploited-by-China-explained"
+title: "The AirDrop flaw exploited by China, explained"
+url: "https://blog.cryptographyengineering.com/2024/01/11/attack-of-the-week-airdrop-tracing/"
+body: "The news was already posted here last week, but I found this great technical explanation of the flaw. Long story short: Apple is using bad cryptography. They got alerted by researchers back in 2019 but didn’t fix it."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 100
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705513879 {#1588
date: 2024-01-17 18:51:19.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1725 …}
+votes: Doctrine\ORM\PersistentCollection {#1721 …}
+reports: Doctrine\ORM\PersistentCollection {#1562 …}
+favourites: Doctrine\ORM\PersistentCollection {#2463 …}
+notifications: Doctrine\ORM\PersistentCollection {#1740 …}
+badges: Doctrine\ORM\PersistentCollection {#2454 …}
+children: []
-id: 31014
-titleTs: "'airdrop':2 'china':6 'explain':7 'exploit':4 'flaw':3"
-bodyTs: "'2019':34 'alert':29 'alreadi':4 'appl':22 'back':32 'bad':25 'cryptographi':26 'didn':36 'explan':15 'fix':38 'flaw':18 'found':11 'got':28 'great':13 'last':7 'long':19 'news':2 'post':5 'research':31 'short':21 'stori':20 'technic':14 'use':24 'week':8"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705516905
+visibility: "visible "
+apId: "https://sopuli.xyz/post/8048617"
+editedAt: null
+createdAt: DateTimeImmutable @1705430505 {#1635
date: 2024-01-16 19:41:45.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\Entry {#1586
+user: App\Entity\User {#265 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1597 …}
+image: Proxies\__CG__\App\Entity\Image {#1687 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1731 …}
+slug: "The-AirDrop-flaw-exploited-by-China-explained"
+title: "The AirDrop flaw exploited by China, explained"
+url: "https://blog.cryptographyengineering.com/2024/01/11/attack-of-the-week-airdrop-tracing/"
+body: "The news was already posted here last week, but I found this great technical explanation of the flaw. Long story short: Apple is using bad cryptography. They got alerted by researchers back in 2019 but didn’t fix it."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 100
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705513879 {#1588
date: 2024-01-17 18:51:19.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1725 …}
+votes: Doctrine\ORM\PersistentCollection {#1721 …}
+reports: Doctrine\ORM\PersistentCollection {#1562 …}
+favourites: Doctrine\ORM\PersistentCollection {#2463 …}
+notifications: Doctrine\ORM\PersistentCollection {#1740 …}
+badges: Doctrine\ORM\PersistentCollection {#2454 …}
+children: []
-id: 31014
-titleTs: "'airdrop':2 'china':6 'explain':7 'exploit':4 'flaw':3"
-bodyTs: "'2019':34 'alert':29 'alreadi':4 'appl':22 'back':32 'bad':25 'cryptographi':26 'didn':36 'explan':15 'fix':38 'flaw':18 'found':11 'got':28 'great':13 'last':7 'long':19 'news':2 'post':5 'research':31 'short':21 'stori':20 'technic':14 'use':24 'week':8"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705516905
+visibility: "visible "
+apId: "https://sopuli.xyz/post/8048617"
+editedAt: null
+createdAt: DateTimeImmutable @1705430505 {#1635
date: 2024-01-16 19:41:45.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\Entry {#1586
+user: App\Entity\User {#265 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1597 …}
+image: Proxies\__CG__\App\Entity\Image {#1687 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1731 …}
+slug: "The-AirDrop-flaw-exploited-by-China-explained"
+title: "The AirDrop flaw exploited by China, explained"
+url: "https://blog.cryptographyengineering.com/2024/01/11/attack-of-the-week-airdrop-tracing/"
+body: "The news was already posted here last week, but I found this great technical explanation of the flaw. Long story short: Apple is using bad cryptography. They got alerted by researchers back in 2019 but didn’t fix it."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 100
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705513879 {#1588
date: 2024-01-17 18:51:19.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1725 …}
+votes: Doctrine\ORM\PersistentCollection {#1721 …}
+reports: Doctrine\ORM\PersistentCollection {#1562 …}
+favourites: Doctrine\ORM\PersistentCollection {#2463 …}
+notifications: Doctrine\ORM\PersistentCollection {#1740 …}
+badges: Doctrine\ORM\PersistentCollection {#2454 …}
+children: []
-id: 31014
-titleTs: "'airdrop':2 'china':6 'explain':7 'exploit':4 'flaw':3"
-bodyTs: "'2019':34 'alert':29 'alreadi':4 'appl':22 'back':32 'bad':25 'cryptographi':26 'didn':36 'explan':15 'fix':38 'flaw':18 'found':11 'got':28 'great':13 'last':7 'long':19 'news':2 'post':5 'research':31 'short':21 'stori':20 'technic':14 'use':24 'week':8"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705516905
+visibility: "visible "
+apId: "https://sopuli.xyz/post/8048617"
+editedAt: null
+createdAt: DateTimeImmutable @1705430505 {#1635
date: 2024-01-16 19:41:45.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\Entry {#2467
+user: App\Entity\User {#265 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1597 …}
+image: Proxies\__CG__\App\Entity\Image {#2371 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2471 …}
+slug: "PhD-thesis-on-mass-surveillance-and-strategies-to-counter-it"
+title: "PhD thesis on mass surveillance (and strategies to counter it)"
+url: "https://research.tue.nl/en/publications/communication-in-a-world-of-pervasive-surveillance-sources-and-me"
+body: """
Recently stumbled upon the PhD thesis of a researcher at the Eindhoven University of Technology from ~2 years ago. I haven’t read the whole thing, but I thought it might be of interest for someone here. It’s freely available for download on the link.\n
\n
Excerpts from the preface:\n
\n
> The sheer number of the surveillance systems that we document in subsequent chapters reflects the industrial scale of data collection in the twenty-first century. We hope that future researchers will take up the challenge of addressing each covert program as a research subject to fully and completely explore, and to freely share their findings with the wider world in the spirit of open academic discussion. This kind of basic research is crucial to anti-surveillance software and hardware development.\n
\n
> The machinery of mass surveillance is simply too dangerous to be allowed to exist. We must work to ensure that no one will be able to say that they did not know, or that they were not warned. We must use all of the tools in our toolbox – economic, social, cultural, political, and of course, cryptographic – to blind targeted and mass surveillance adversaries.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 102
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1711965348 {#2453
date: 2024-04-01 11:55:48.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2459 …}
+votes: Doctrine\ORM\PersistentCollection {#2468 …}
+reports: Doctrine\ORM\PersistentCollection {#2359 …}
+favourites: Doctrine\ORM\PersistentCollection {#2364 …}
+notifications: Doctrine\ORM\PersistentCollection {#2380 …}
+badges: Doctrine\ORM\PersistentCollection {#2382 …}
+children: []
-id: 27193
-titleTs: "'counter':9 'mass':4 'phd':1 'strategi':7 'surveil':5 'thesi':2"
-bodyTs: "'2':17 'abl':157 'academ':116 'address':88 'adversari':195 'ago':19 'allow':144 'anti':127 'anti-surveil':126 'avail':41 'basic':121 'blind':190 'centuri':76 'challeng':86 'chapter':63 'collect':70 'complet':99 'cours':187 'covert':90 'crucial':124 'cryptograph':188 'cultur':183 'danger':141 'data':69 'develop':132 'discuss':117 'document':60 'download':43 'econom':181 'eindhoven':12 'ensur':151 'excerpt':47 'exist':146 'explor':100 'find':106 'first':75 'freeli':40,103 'fulli':97 'futur':80 'hardwar':131 'haven':21 'hope':78 'industri':66 'interest':34 'kind':119 'know':164 'link':46 'machineri':134 'mass':136,193 'might':31 'must':148,172 'number':53 'one':154 'open':115 'phd':5 'polit':184 'prefac':50 'program':91 'read':23 'recent':1 'reflect':64 'research':9,81,94,122 'say':159 'scale':67 'share':104 'sheer':52 'simpli':139 'social':182 'softwar':129 'someon':36 'spirit':113 'stumbl':2 'subject':95 'subsequ':62 'surveil':56,128,137,194 'system':57 'take':83 'target':191 'technolog':15 'thesi':6 'thing':26 'thought':29 'tool':177 'toolbox':180 'twenti':74 'twenty-first':73 'univers':13 'upon':3 'use':173 'warn':170 'whole':25 'wider':109 'work':149 'world':110 'year':18"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704469515
+visibility: "visible "
+apId: "https://sopuli.xyz/post/7617519"
+editedAt: null
+createdAt: DateTimeImmutable @1704383115 {#2461
date: 2024-01-04 16:45:15.0 +01:00
}
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\Entry {#2467
+user: App\Entity\User {#265 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1597 …}
+image: Proxies\__CG__\App\Entity\Image {#2371 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2471 …}
+slug: "PhD-thesis-on-mass-surveillance-and-strategies-to-counter-it"
+title: "PhD thesis on mass surveillance (and strategies to counter it)"
+url: "https://research.tue.nl/en/publications/communication-in-a-world-of-pervasive-surveillance-sources-and-me"
+body: """
Recently stumbled upon the PhD thesis of a researcher at the Eindhoven University of Technology from ~2 years ago. I haven’t read the whole thing, but I thought it might be of interest for someone here. It’s freely available for download on the link.\n
\n
Excerpts from the preface:\n
\n
> The sheer number of the surveillance systems that we document in subsequent chapters reflects the industrial scale of data collection in the twenty-first century. We hope that future researchers will take up the challenge of addressing each covert program as a research subject to fully and completely explore, and to freely share their findings with the wider world in the spirit of open academic discussion. This kind of basic research is crucial to anti-surveillance software and hardware development.\n
\n
> The machinery of mass surveillance is simply too dangerous to be allowed to exist. We must work to ensure that no one will be able to say that they did not know, or that they were not warned. We must use all of the tools in our toolbox – economic, social, cultural, political, and of course, cryptographic – to blind targeted and mass surveillance adversaries.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 102
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1711965348 {#2453
date: 2024-04-01 11:55:48.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2459 …}
+votes: Doctrine\ORM\PersistentCollection {#2468 …}
+reports: Doctrine\ORM\PersistentCollection {#2359 …}
+favourites: Doctrine\ORM\PersistentCollection {#2364 …}
+notifications: Doctrine\ORM\PersistentCollection {#2380 …}
+badges: Doctrine\ORM\PersistentCollection {#2382 …}
+children: []
-id: 27193
-titleTs: "'counter':9 'mass':4 'phd':1 'strategi':7 'surveil':5 'thesi':2"
-bodyTs: "'2':17 'abl':157 'academ':116 'address':88 'adversari':195 'ago':19 'allow':144 'anti':127 'anti-surveil':126 'avail':41 'basic':121 'blind':190 'centuri':76 'challeng':86 'chapter':63 'collect':70 'complet':99 'cours':187 'covert':90 'crucial':124 'cryptograph':188 'cultur':183 'danger':141 'data':69 'develop':132 'discuss':117 'document':60 'download':43 'econom':181 'eindhoven':12 'ensur':151 'excerpt':47 'exist':146 'explor':100 'find':106 'first':75 'freeli':40,103 'fulli':97 'futur':80 'hardwar':131 'haven':21 'hope':78 'industri':66 'interest':34 'kind':119 'know':164 'link':46 'machineri':134 'mass':136,193 'might':31 'must':148,172 'number':53 'one':154 'open':115 'phd':5 'polit':184 'prefac':50 'program':91 'read':23 'recent':1 'reflect':64 'research':9,81,94,122 'say':159 'scale':67 'share':104 'sheer':52 'simpli':139 'social':182 'softwar':129 'someon':36 'spirit':113 'stumbl':2 'subject':95 'subsequ':62 'surveil':56,128,137,194 'system':57 'take':83 'target':191 'technolog':15 'thesi':6 'thing':26 'thought':29 'tool':177 'toolbox':180 'twenti':74 'twenty-first':73 'univers':13 'upon':3 'use':173 'warn':170 'whole':25 'wider':109 'work':149 'world':110 'year':18"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704469515
+visibility: "visible "
+apId: "https://sopuli.xyz/post/7617519"
+editedAt: null
+createdAt: DateTimeImmutable @1704383115 {#2461
date: 2024-01-04 16:45:15.0 +01:00
}
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\Entry {#2467
+user: App\Entity\User {#265 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1597 …}
+image: Proxies\__CG__\App\Entity\Image {#2371 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2471 …}
+slug: "PhD-thesis-on-mass-surveillance-and-strategies-to-counter-it"
+title: "PhD thesis on mass surveillance (and strategies to counter it)"
+url: "https://research.tue.nl/en/publications/communication-in-a-world-of-pervasive-surveillance-sources-and-me"
+body: """
Recently stumbled upon the PhD thesis of a researcher at the Eindhoven University of Technology from ~2 years ago. I haven’t read the whole thing, but I thought it might be of interest for someone here. It’s freely available for download on the link.\n
\n
Excerpts from the preface:\n
\n
> The sheer number of the surveillance systems that we document in subsequent chapters reflects the industrial scale of data collection in the twenty-first century. We hope that future researchers will take up the challenge of addressing each covert program as a research subject to fully and completely explore, and to freely share their findings with the wider world in the spirit of open academic discussion. This kind of basic research is crucial to anti-surveillance software and hardware development.\n
\n
> The machinery of mass surveillance is simply too dangerous to be allowed to exist. We must work to ensure that no one will be able to say that they did not know, or that they were not warned. We must use all of the tools in our toolbox – economic, social, cultural, political, and of course, cryptographic – to blind targeted and mass surveillance adversaries.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 102
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1711965348 {#2453
date: 2024-04-01 11:55:48.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2459 …}
+votes: Doctrine\ORM\PersistentCollection {#2468 …}
+reports: Doctrine\ORM\PersistentCollection {#2359 …}
+favourites: Doctrine\ORM\PersistentCollection {#2364 …}
+notifications: Doctrine\ORM\PersistentCollection {#2380 …}
+badges: Doctrine\ORM\PersistentCollection {#2382 …}
+children: []
-id: 27193
-titleTs: "'counter':9 'mass':4 'phd':1 'strategi':7 'surveil':5 'thesi':2"
-bodyTs: "'2':17 'abl':157 'academ':116 'address':88 'adversari':195 'ago':19 'allow':144 'anti':127 'anti-surveil':126 'avail':41 'basic':121 'blind':190 'centuri':76 'challeng':86 'chapter':63 'collect':70 'complet':99 'cours':187 'covert':90 'crucial':124 'cryptograph':188 'cultur':183 'danger':141 'data':69 'develop':132 'discuss':117 'document':60 'download':43 'econom':181 'eindhoven':12 'ensur':151 'excerpt':47 'exist':146 'explor':100 'find':106 'first':75 'freeli':40,103 'fulli':97 'futur':80 'hardwar':131 'haven':21 'hope':78 'industri':66 'interest':34 'kind':119 'know':164 'link':46 'machineri':134 'mass':136,193 'might':31 'must':148,172 'number':53 'one':154 'open':115 'phd':5 'polit':184 'prefac':50 'program':91 'read':23 'recent':1 'reflect':64 'research':9,81,94,122 'say':159 'scale':67 'share':104 'sheer':52 'simpli':139 'social':182 'softwar':129 'someon':36 'spirit':113 'stumbl':2 'subject':95 'subsequ':62 'surveil':56,128,137,194 'system':57 'take':83 'target':191 'technolog':15 'thesi':6 'thing':26 'thought':29 'tool':177 'toolbox':180 'twenti':74 'twenty-first':73 'univers':13 'upon':3 'use':173 'warn':170 'whole':25 'wider':109 'work':149 'world':110 'year':18"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704469515
+visibility: "visible "
+apId: "https://sopuli.xyz/post/7617519"
+editedAt: null
+createdAt: DateTimeImmutable @1704383115 {#2461
date: 2024-01-04 16:45:15.0 +01:00
}
} |
|
Show voter details
|