Natanael

@Natanael@slrpnk.net

Cryptography nerd

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Natanael,

Yup, unless you specifically set it to use one of the few outproxies then it’s by default just for connecting to other peers within the I2P network

Natanael,

I2P doesn’t behave like Tor by default, it’s designed around connecting to internal peers within its network so your browser won’t treat it as a proxy but default and you have to specifically configure it to route traffic to the I2P network

Natanael,

This is not how the law is applied to packet switching.

If it was store and forward then maybe just maybe law enforcement would care, but anybody smart enough to set up an I2P node to research it and who tried to track where packets from from would first see the packets originate from their own local node at 127.0.0.1, then in the I2P console they could see that packet came in via an active half-tunnel from their own end interfacing with the endpoint node of the other side’s half-tunnel, and they would know that node has no idea what it’s sending (just like their ISP)

Natanael,

Torrents are literally built around file hashes so yes

Natanael,

1: then they would go after literally anybody running a node

2: their client will not see peers on another IP. It will just see their own I2P node. Any I2P aware software will also not have any IP addresses as peers, only I2P specific internal addresses. They will not even be able to associate an incoming connection to any one node without understanding the I2P network statistics console.

3: by this argument all anonymization tools should be illegal, Signal too, etc, and nobody should help anybody maintain privacy. In the real world there’s plenty of reasons why anonymization tools are necessary. And there will be literally zero evidence tying you to a crime. Preexisting legal precedence says an IP address alone is not enough.

Natanael, (edited )

Your scenario would specifically require the cops to ask their techs for a detailed report and then deliberately lie about it’s conclusions to attack completely random people, and just FYI the last few rounds of this happened when public WiFi was new and the cops kept losing so badly in courts that this doesn’t really happen much anymore. You don’t even need a great lawyer, just an average one who can find the precedence.

There’s no “additional fingerprints” of relevance binding any node in a tunnel to the communications in the tunnel. It uses PFS and multiple layers of encryption (tunnels within tunnels). They need to run a debugger against their node to have any chance to really argue that a specific packet came from a specific node, which also would ironically simultaneously prove that node didn’t actually know and was just a blind relay (just like how mailmen aren’t liable for content of packages they deliver).

Your argument is literally being used to argue that nobody should have privacy because those who don’t break laws don’t need it, yet you yourself are arguing for why we still need privacy if we haven’t broken laws. The collateral damage when such tools aren’t available is so much greater than when privacy tools are available. One of the greatest successes of Signal is how its popularity makes each of its users part of a “haystack” (large anonymity set) and targeting individual users just for using it is infeasible, protecting endless numbers of minorities and other at-risk individuals.

In addition, it’s extremely rare that mass surveillance like spying on network traffic leads to prosecutions. It’s usually infiltration that works, so you running an I2P node will make zero difference.

Natanael,

Tell them NIST now recommends against it so the insurance company is increasing your risks

Natanael,

NIST now recommends watching for suspicious activity and only force rotation when there’s risk of compromise

Natanael,

Password crackers says you’re wrong

Natanael,

It’s not entirely wrong, public transit is better

Natanael,

You haven’t seen good public transit then, are you being satirical or are you really that dimwitted?

Natanael,

If it’s IP blocked it still won’t work, but most aren’t

Natanael,

Depends on alloy, some are more brittle or prone to deformation than others

Natanael,

A roku, Chromecast, etc, which will get updates for longer than the TV itself, and which is much less likely to be backdoored.

Or begging companies to support Miracast properly

Natanael,

If he hadn’t been in long he might have still have had a heartbeat, and then CPR does no good

Natanael,

I suspect reddit’s /u/fuckswithducks is involved

Natanael,

Heat capacity of lava per degree Celsius per unit of mass

Multiplied by temperature differential vs ambient, multiplied by mass = total extra heat energy

Then you calculate the sum of heat capacity multiplied by mass for lava and for water, and calculate from that how many degrees above ambient the two masses will land at when combined as the extra energy above is divided over both (assuming water starts at ambient temp)

It won’t be exact because heat capacity varies in materials as temperature changes, both steam and solidification of lava (state change) will contribute significantly, but it’s a decent first estimate

Natanael,

Assuming enough water that most of it doesn’t boil, then my math would still check out, but yeah, any substantial amount of boiling forces you do do the math in multiple steps to handle that

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #