

Malicious compliance is when you follow a order or law knowing that it will backfire on those who issued it.
“Lawfare” is a comparable term but not quite it (basically legal harassment campaigns).
Cryptography nerd
Fediverse accounts;
Natanael@slrpnk.net (main)
Natanael@infosec.pub
Natanael@lemmy.zip
@Natanael_L@mastodon.social
Bluesky: natanael.bsky.social
Malicious compliance is when you follow a order or law knowing that it will backfire on those who issued it.
“Lawfare” is a comparable term but not quite it (basically legal harassment campaigns).
This affects the view of posts via the bluesky servers, but not via mirrors or other servers
And the use of content addressing means you can be sure it hasn’t been modified
Several Android manufacturers have their own settings in the OS for battery longevity (automatic schedule based smart charging, or charging limits)
Don’t think it’s native in Android. Charging limits need support in the charging controller chip, plus driver support in the OS.
I use my backup headphones when my Bluetooth headset has run out of battery
Wireguard is most reliable in terms of security. For censorship resistance, it’s all about tunneling it in a way that looks indistinguishable from normal traffic
Domain or IP doesn’t make much of a difference. If somebody can block one they can block the other. The trick is not getting flagged. Domain does make it easier to administer though with stuff like dyndns, but then you also need to make sure eSNI is available (especially if it’s on hosting) and that you’re using encrypted DNS lookups
Telegram has been under fire from the start, lol. 'we have math PhDs" 🤷
There’s also a big difference between published specifications and threat models for the encryption which professionals can investigate in the code delivered to users, versus no published security information at all with pure reverse engineering as the only option
Apple at least has public specifications. Experts can dig into it and compare against the specs, which is far easier than digging into that kind of code blindly. The spec describes what it does when and why, so you don’t have to figure that out through reverse engineering, instead you can focus on looking for discrepancies
Proper open source with deterministic builds would be even better, but we aren’t getting that out of Apple. Specs is the next best thing.
BTW, plugging our cryptography community: !crypto@infosec.pub
Looks like the same dev from reddit
https://www.reddit.com/r/crypto/comments/1iumxl3/how_far_can_i_push_closesource_code_towards_being/
I was going to post the whitespace programming language but this wins
Malbolge
Under quantum mechanics this can’t explain non-even distributions. With no effects making high probability events more prevalent than others you can not (reliably) observe differentiated probabilities.
And once again, cardinalites appears. A thing whose possible variations correspond to infinite integers can’t match that with have variations matching the real numbers. An infinite line won’t correspond to an infinite hypercube in infinite dimensions. Gotta consider combinatorics from statistics too, as well as entropy. The number of permutations mapping to normal states simply has to far exceed the strange states for us to observe a normal universe.
Something dark matter like has to exist, because there’s no other reasonable way to describe this behavior (shifted center of gravity matching presence of matter not influenced by friction)
Yup, don’t be sole owner if you can’t afford a lawyer to make sure you get a good deal
And you can have a union even in a co-op (would mostly help if the majority / appointed leaders make decisions that break some rules, think enforcing safety rules and such)
We’re getting into hierarchies of infinities here, look up cardinality. You can have infinities that can’t map to every possibility of a higher infinity
Your workaround is precisely why I said “more practical”. Any updates to your tooling might break it because it’s not an expected usecase
You don’t want FIDO2 security tokens for that, use an OpenPGP applet (works with some Yubikeys and with many programmable smartcards). Much more practical for authenticating a server.
BTW we have a lot of cryptography experts in www.reddit.com/r/crypto (yes I know, I’m trying to get the community moved, I’ve been moderating it for a decade and it’s a slow process)
[Windows subsystem] for [executable environment] is the naming scheme. The default is Win32, there’s one for POSIX (practically never used), and Linux runs in another.
https://stackoverflow.com/a/41409419