Skip Navigation
eager_eagle Eager Eagle @lemmy.world
Posts 11
Comments 1.2K
Stop. Calling. Everything. AI
  • and later the turbo button on your pc that actually made the CPU clock slower

    turbon't

  • Firefox added ad tracking and has already turned it on without asking you
  • it's like a drizzle is a dryer alternative to a thunderstorm

    surely I'd prefer none, but if I had to choose...

  • Firefox added ad tracking and has already turned it on without asking you
  • I see this as them giving companies a more privacy-preserving alternative to tracking. And just another privacy setting to opt out for us.

    Instead of a reactive social media post, here's how it works.

    The only real alternative to this conflict of interest between companies and customers is an independent browser.

  • Signal downplays encryption key flaw, fixes it after X drama
  • Recall is also not supposed to collect data from private sessions from popular web browsers.

    it makes one wonder how well that works; if it's based on OCR, does it "redact" the bounding box corresponding to the private window? What happens with overlapping windows; how does it handle windows with transparency; I can't help to think there's a high probability their solution is flaky.

  • Signal downplays encryption key flaw, fixes it after X drama
  • Full disk encryption is not a solution here. Any application that’s already running which can provide read only file system access to an attacker is not going to be affected by your full disk encryption.

    that's my point

  • Signal downplays encryption key flaw, fixes it after X drama
  • upon reading a bit how different wallets work, it seems macos is able to identify the program requesting the keychain access when it's signed with a certificate - idk if that's the case for signal desktop on mac, and I don't know what happens if the program is not signed.

    As for gnome-keyring, they ackowledge that doing it on Linux distros this is a much larger endeavor due to the attack surface:

    An active attack is where the attacker can change something in your security context. In the context of gnome-keyring an active attacker would have access to your user session in some way. An active attacker might install an application on your computer, display a window, listen into the X events going to another window, read through your memory, snoop on you from a root account etc.

    While it'd be nice for gnome-keyring to someday be hardened against active attacks originating from the user's session, the reality is that the free software "desktop" today just isn't architected with those things in mind. We need completion and integration things like the following. Kudos to the great folks working on parts of this stuff:

    - Trusted X (for prompting)
    - Pervasive use of security contexts for different apps (SELinux, AppArmor)
    - Application signing (for ACLs) 
    

    We're not against the goal of protecting against active attacks, but without hardening of the desktop in general, such efforts amount to security theater.

    Also

    An example of security theater is giving the illusion that somehow one application running in a security context (such as your user session) can keep information from another application running in the same security context.

    In other words, the problem is beyond the scope of gnome-keyring. Maybe now with diffusion of Wayland and more sandboxing options reducing this context becomes viable.

  • Signal downplays encryption key flaw, fixes it after X drama
  • let me just highlight that if someone has access only to your signal desktop conversations, they have access to your signal desktop conversations.

    if someone has access to your windows recall db, they have access to your signal desktop conversations, the pages you've browsed including in private windows, documents you've written, games you've played, social media posts you've seen, and pretty much anything you've done using that machine.

    perhaps that does demand a slightly different level of concern.

  • Signal downplays encryption key flaw, fixes it after X drama
  • But that's the thing: I haven't found anything that indicates it can differentiate a legitimate access from a dubious one; at least not without asking the user to authorize it by providing a password and causing the extra inconvenience.

    If the wallet asked the program itself for a secret - to verify the program was legit and not a malicious script - the program would still have the same problem of storing and retrieving that secret securely; which defeats the use of a secret manager.

  • Linux when? Linux now. - Zed Blog
  • I'm also running it smoothly on Wayland+nvidia. Pacman install btw.

    Most key bindings work ime. All commands I've tried in the past few days work fine too, though I've missed things especially for Python development. For Rust it is very much usable today I'd say.

  • Signal downplays encryption key flaw, fixes it after X drama
  • privacy != anonymity != security

  • Signal downplays encryption key flaw, fixes it after X drama
  • The whole drama seems to be pushing for Electron's safeStorage API, which uses a device's secrets manager. But aren't secrets stored there still accessible when the machine is unlocked anyway? I'm not sure what this change accomplishes other than encryption at rest with the device turned off - which is redundant if you're using full disk encryption.

    I don't think they're downplaying it, it just doesn't seem to be this large security concern some people are making it to be.

    This is like the third time in the past two months I've seen someone trying to spread FUD around Signal.

  • Pixel 9 Pro Euro Prices Leak - Should We Worry?
  • I got my Pixel 8 for $400 and it was already the most I was willing to pay. I would keep buying cheap $300 alternatives before burning $800 on a new phone.

  • Alignment Chart Shitpost
  • kleenex is too good, should be replaced for sandpaper

  • 5 years of experience, yet still not clue what "Underfull \hbox" means
  • yeah, I still wrote my dissertation last year on latex because that was the template they had and I didn't feel like reading all formatting rules and writing a Typst version for that. That said, creating a Typst template is a far more straightforward than any other format.

  • Zed on Linux is out!
  • only if double precision can be called high fyves

  • matduggan.com GitHub Copilot Workspace Review

    I review Github Copilot Workspaces and it doesn't go well.

    > GitHub Copilot Workspace didn't work on a super simple task regardless of how easy I made the task. I wouldn't use something like this for free, much less pay for it. It sort of failed in every way it could at every step.

    4
    www.theguardian.com ‘It’s the perfect place’: London Underground hosts tests for ‘quantum compass’ that could replace GPS

    Subatomic instrument will be able to accurately pinpoint locations under ground and under water where satellite signals cannot reach

    ‘It’s the perfect place’: London Underground hosts tests for ‘quantum compass’ that could replace GPS
    24

    Plasma 6 Wayland + NVIDIA

    I've just upgraded to Plasma 6 on EndeavourOS and X11 works, but booting on Wayland via SDDM gives me a blank screen. The display enters power saving mode and switching to a TTY doesn't wake it up.

    Anyone else having this problem, or with a workaround suggestion?

    NVIDIA Driver 550.54.14-4 Operating System: EndeavourOS KDE Plasma Version: 6.0.1 KDE Frameworks Version: 6.0.0 Qt Version: 6.6.2 Kernel Version: 6.7.8-arch1-1 (64-bit)

    6

    1000 capacity!

    2
    www.theregister.com ICANN proposes creating .INTERNAL domain

    The plan is to keep the world at bay by never recording it in the DNS root – like many already do with a subdomain for an intranet

    ICANN proposes creating .INTERNAL domain
    52
    arstechnica.com SSH protects the world’s most sensitive networks. It just got a lot weaker

    Novel Terrapin attack uses prefix truncation to downgrade the security of SSH channels.

    SSH protects the world’s most sensitive networks. It just got a lot weaker
    27

    Uplay games on Linux

    I'd like to try the new Assassin's Creed and Avatar, but they're not on Steam - which is how I play almost every other game on Linux. I know I might be able to install Uplay games using Lutris, but I'm not sure if the experience is as smooth as Steam + Proton.

    Do you have any experience with Ubisoft + Lutris? Is there an equivalent to ProtonDB to have an idea how well a game runs?

    11