Natanael

joined 2 years ago
[–] Natanael@slrpnk.net 4 points 1 month ago (1 children)

Malicious compliance is when you follow a order or law knowing that it will backfire on those who issued it.

"Lawfare" is a comparable term but not quite it (basically legal harassment campaigns).

[–] Natanael@slrpnk.net 4 points 1 month ago

This affects the view of posts via the bluesky servers, but not via mirrors or other servers

And the use of content addressing means you can be sure it hasn't been modified

[–] Natanael@slrpnk.net 4 points 1 month ago

Several Android manufacturers have their own settings in the OS for battery longevity (automatic schedule based smart charging, or charging limits)

Don't think it's native in Android. Charging limits need support in the charging controller chip, plus driver support in the OS.

[–] Natanael@slrpnk.net 49 points 1 month ago

I use my backup headphones when my Bluetooth headset has run out of battery

[–] Natanael@slrpnk.net 10 points 1 month ago (2 children)

Or make a rule that bosses have to try out everything they suggest for others first, let them Darwin award themselves instead of others

[–] Natanael@slrpnk.net 6 points 2 months ago* (last edited 2 months ago)

Wireguard is most reliable in terms of security. For censorship resistance, it's all about tunneling it in a way that looks indistinguishable from normal traffic

Domain or IP doesn't make much of a difference. If somebody can block one they can block the other. The trick is not getting flagged. Domain does make it easier to administer though with stuff like dyndns, but then you also need to make sure eSNI is available (especially if it's on hosting) and that you're using encrypted DNS lookups

[–] Natanael@slrpnk.net 1 points 2 months ago

Telegram has been under fire from the start, lol. 'we have math PhDs" 🤷

[–] Natanael@slrpnk.net 16 points 2 months ago* (last edited 2 months ago)

There's also a big difference between published specifications and threat models for the encryption which professionals can investigate in the code delivered to users, versus no published security information at all with pure reverse engineering as the only option

Apple at least has public specifications. Experts can dig into it and compare against the specs, which is far easier than digging into that kind of code blindly. The spec describes what it does when and why, so you don't have to figure that out through reverse engineering, instead you can focus on looking for discrepancies

Proper open source with deterministic builds would be even better, but we aren't getting that out of Apple. Specs is the next best thing.

BTW, plugging our cryptography community: !crypto@infosec.pub

[–] Natanael@slrpnk.net 1 points 2 months ago* (last edited 2 months ago)

I did pay attention, and I saw noone serious think that would be legal to do

The biggest errors was not pushing harder against his first campaign, not pushing harder during the impeachments, letting Jan 6 go without another impeachment, and not calling out the billionaires helping his campaign with the intent to dismantle agencies that protect people, etc.

The SCOTUS appointments were big issues but due to the timing meaning they happened when dems lacked majorities there wasn't much to do about them. Getting Trump out of the office is the only fix.

Only exception would've been SCOTUS reform immediately after Biden's election when he had a majority, but the problem there is he couldn't get enough votes for it

[–] Natanael@slrpnk.net 2 points 2 months ago (2 children)

How were they supposed to override the "turtle" though? Sure they should've fought harder, but what legal options were there?

view more: next ›