ReversalHatchery

@ReversalHatchery@beehaw.org

Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: vimeo.com/5168045

This profile is from a federated server and may be incomplete. Browse more on the original instance.

ReversalHatchery,

You wouldn’t own a house!
You wouldn’t own a car!
You would be happy!
Because we said so.

Each Facebook User is Monitored by Thousands of Companies – The Markup (themarkup.org)

Using a panel of 709 volunteers who shared archives of their Facebook data, Consumer Reports found that a total of 186,892 companies sent data about them to the social network. On average, each participant in the study had their data sent to Facebook by 2,230 companies. That number varied significantly, with some panelists’...

ReversalHatchery,

This is just my opinion, but why would they tell you the truth? It’s not like you can find out they are lying.

ReversalHatchery,

At the same time it’s also important that the provider only complies with requests where it legally has to. I trust Proton to act this way.

ReversalHatchery,

They tell whatever they want until their claims can be validated with the source code. If we take it for granted that they use an original, unmodified version of the signal protocol programming libraries, there are still multiple questions:

  • how often do they update the version they use
  • what are they doing with the messages after local decryption (receiving), and before encryption (sending)
  • how are they storing the secret keys used for encryption, and what exactly are they doing with it in the code

Any of these questions could reveal problems that would invalidate any security that is added by using the signal protocol. Like if they use an outdated version of the programming library that has a known vulnerability, if they analyze the messages in their plain data form, or on the UI, or the keypresses as you type them, or if they are mishandling your encryption keys by sending them or a part of them to wherever

ReversalHatchery,

Password reset requires saying when the account was created (month and year) and “tech support” can’t help here either.

Did you try the date of their first email?

ReversalHatchery,

I don’t think so. I never delete such emails. Why would I? Not like it’s in the way

ReversalHatchery,

You can do that without this software too. Create separate windows accounts for every member of the family, preferably offline accounts (which are not attached to a Microsoft account and an email address), and put a password or a pin code on yours.

ReversalHatchery, (edited )

I think it’s just dumb to not make a backup before large updates. There’s so many things happening, a lot can go wrong, especially if you have added 3rd party repos and have customized core parts of the system, not just through config files but let’s say you switched to latest kde plasma from the one your distro ships.

And what happens if you have to restore the backup?
You can look up what’s the solution to your problem in peace while everything is still working. If it was a server, all the services are still available, if it was your desktop you don’t have to use a live linux usb that’s without all your configs to find the solution

ReversalHatchery,

If you want something easy to use and you don’t have to learn buy a Mac, you want great software compatibility buy a windows pc.

That is very bad advice, as that may well not be a solution. There are people who want to use their computers without the ads, data mining and forced program defaults windows is doing.

That’s true that if people switch OS, they’ll need to learn a lot of new things. But don’t forget that not only sysadmins and adventurous people use Linux.

That being said, there are distros that give you a decent GUI frontend to the package manager, for example openSUSE

ReversalHatchery,

No, I don’t have any suggestion for how should Apple circumvent laws. But if they can’t improve on it, they shouldn’t lie that they did so.

ReversalHatchery,

NFS

waiting for locked database

I agree that sqlite is slower through the network than a database server that was made with that in mind, but I think in your case the majority of it was something different.
I’ve recently read in the Jellyfin docs about problems with fs locks on an NFS share, and the point is that NFS does not enable locks by default or something like that, and you have to configure it yourself.

Does Google still hold contact data after deleting from Google Contacts?

I am in the process of moving out some contacts from Google Contacts, specifically those that I do not have a Gmail address. It's a way for me to give these people a tiny bit more privacy, as I'm doing a cleanup of my contact list. My concern is that Google will still keep their data even after I delete it from my end. Is it so?...

ReversalHatchery,

I don’t think there’s a factual answer to this question.
My take on it though is why would they delete it? They can make use of it in various ways, and in new ways every once in a while, and it’s not like as if you could prove it in court or even just find out that they didn’t delete your data.

ReversalHatchery,

are there applications where zfs/btrfs is more or less appropriate than ext4 or even FAT?

Neither of them likes to deal with very low amounts of free space, so don’t use it on places where that is often a scarcity. ZFS gets really slow when free space is almost none, and nowadays I don’t know about BTRFS but a few years ago filling the partition caused data corruption there.

ReversalHatchery,

I remember reading there, when it wasn’t on github pages but it’s own website, the recommendation to keep your critical dotfiles permissioned to a different user account of yours. I don’t think that’s bad advice. Yes it is probably not needed if you use the system as a pro sysadmin for server purposes, but for desktop use it’s just natural that you’ll run a lot more programs in a much less controlled manner.

Of course there were ones that I thought they went overboard, but it has at least a few good pieces, if not more, I don’t really remember.

ReversalHatchery,

How is it not decentralized?

Traffic is flowing through computers of volunteers, that part is indeed decentralized, but your client needs to find them, and that happens through a centralized service, through a “directory authory” if I’m not mistaken

ReversalHatchery,

Even you were comfortable giving your address and name to 4 other parties

They have never said that, did they?

Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form' (tech.slashdot.org)

Proton Mail, the leading privacy-focused email service, is making its first foray into blockchain technology with Key Transparency, which will allow users to verify email addresses. From a report: In an interview with Fortune, CEO and founder Andy Yen made clear that although the new feature uses blockchain, the key technology...

ReversalHatchery,

FYI. Blockchain is only so very power waster because for cryptocurrency uses the users churn out new rounds continuously as if there is no tomorrow.

Here, your public key relatively rarely changes. If you had your protonmail account for years, it probably hasn’t changed ever yet.
Maybe I’m wrong in this, but this seems to be similar to what Keybase was doing, and that was a cool idea!

Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement (www.cbc.ca)

According to Ortis, briefed him about a “storefront” that was being created to attract criminal targets to an online encryption service. A storefront, said Ortis, is a fake business or entity, either online or bricks-and-mortar, set up by police or intelligence agencies....

ReversalHatchery, (edited )

Why, what else could have they done with laws? Protonmail and literally every other provider on the clearnet is also susceptible to this. The only thing they can do is have lawyers to find what the absolute most minimum they are required to do and only do that, but that’s all.

Why Not Store Encrypted Emails in Plaintext Locally?

Clients like Thunderbird are great because you have everything stored locally so you can easily search offline. They also support encrypting and decrypting emails in PGP. However, they seem to have the same limitation as protonmail where you can’t search through encrypted emails....

ReversalHatchery,

Protonmail now supports searching in the content of all your mail, though.
Or at least the web client. It will ask you to download all your mail, and it will make an encrypted search index on your computer.

ReversalHatchery, (edited )

I think they meant the former, but if there were downvotes that’s still weird

ReversalHatchery,

I think they mean the variable width of the graph’s columns. If you watch it as the graph moves, there are gaps at every 2 columns.

I don’t understand though the thing about font priorities.
And also, would that just change all fonts? Unless you mod the font to only have the braille characters…

ReversalHatchery,

I wouldn’t think that the city on the planet where the screenshot was made (and I don’t remember the name) was procedurally generated

Faking Pixel 5a

I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to...

ReversalHatchery,

Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded.
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.

Other things that may be interesting:

  • several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise
  • you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
Shkshkshk, to piracy
@Shkshkshk@dice.camp avatar

Is ProtonVPN worth it?

@piracy

Got reminded of this while reading about ProtonMail. The reason I haven't gotten into proper is that I don't have a VPN for torrenting, and the reason I don't have a VPN is that I don't . So it would be nice if I got a good VPN while myself.

Will ProtonVPN rat me out to Comcast? I know some VPNs don't hide what you're downloading from your ISP, for reasons I don't fully understand.

ReversalHatchery,

I’ve never heard about arguments against ProtonVPN. Could you elaborate?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #