Skip Navigation

User banner
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)F
Posts
0
Comments
320
Joined
2 yr. ago

  • Who can murder someone with a PC this excellent?

    Professor Belvedere “Fartsparkles” Tinkletuft was once a respected lecturer at the Neverwinter Arcane Academy. His groundbreaking research into “transmogrified odoriferous manifestations” (or, as the students called it, fart magic) was dismissed as childish and “in poor taste.”

    In protest, the Professor vowed to prove that flatulence is the ultimate illusion. Through alchemical experimentation, he discovered how to weaponize his digestive essence into arcane displays — clouds of glittering gas, illusionary stink beasts, and even gaseous duplicates of himself.

    Now he roams the realms, performing “scientific demonstrations” and occasionally saving the world — usually by accident.

  • You’re arguing with someone who hasn’t read the article…

  • And wasn’t the makeup to hide chlamydia / syphilis etc?

  • Is it any good?

  • Why does your use case trump all other use cases for users on the internet?

    Just because your use of HTTP doesn’t expose users to risks (technically it does to MitM) doesn’t mean users shouldn’t be warned about the risks of HTTP by their browser.

    You’re annoyed at browsers, not HTTPS or CAs. There’s nothing in the specifications / RFCs that HTTP warnings are MUSTs.

  • And they’re patching in memory so enjoy giving full system permission to their tool and excluding it from your security products as this thing is architecturally similar to malware.

  • If clients trust the cert and add it to their store, what happens when your key is stolen? Where’s the CRL And how is trust established with the provider of that CRL (which I assume is also self-signed and requires TOFU)? What if first contact is made with a MitM and trust is established with the actor?

    With no third party trust anchor, how do you authenticate identity? You’ve got an encrypted connection but to who?

    Certs on the public internet aren’t just about confidentiality and integrity, they’re about authenticity, something the author of the article doesn’t quite understand. Certificates are literally about binding identity to a key, with CAs providing a way to bootstrap trust of that binding.

    There hasn’t really been a better proposed solution to this problem.

    DANE/DNSSEC shifts trust from CAs to registrars, PGP Web of Trust is complex for users and adds friction to revocations, key pinning breaks catastrophically if you lose the key, DNS CAA just constrains the CA model but is still the same thing. Blockchain still has key loss issues and how do you handle disputes? Also you’re centralising things economically since biggest miners thus dominates.

    SPKI was really interesting and actually positioned that identity key bindings via certs could negate the need for CAs if binding shifted to a protocol. It didn’t get anywhere though.

    Don’t get me wrong, I have my own PKI and CA at home and “self-sign” internally but that’s fine when i can personally establish trust and authenticate but it doesn’t internet-scale where everyone is predominately strangers.

  • I once bought a pack of condoms from a vending machine in a gas station bathroom and the pack had a little red devil on it that looked incredibly familiar. I kept the box but goodness knows where in the house it is.

  • What do you do, out of interest? It sounds like you only get a couple of hours to yourself a day…

  • That’s rather silly. Might as well include road signs “advertising” places to go and how far away they are.

  • I live in the countryside. You know, that place with all the green.

  • Zero but I’m neither average nor American.

  • The very definition of enshittification:

    Here is how platforms die: first, they are good to their users; then they abuse their users to make things better for their business customers; finally, they abuse those business customers to claw back all the value for themselves. Then, they die. I call this enshittification, and it is a seemingly inevitable consequence arising from the combination of the ease of changing how a platform allocates value, combined with the nature of a "two-sided market", where a platform sits between buyers and sellers, hold each hostage to the other, raking off an ever-larger share of the value that passes between them.

  • No virus or ransomware? Also nonsense. BERT, Pay2Key, Helldown are but a few examples of ransomwares that target Linux.

  • What game?

  • Or if you’re not interested in piracy, kids don’t care if a Bluray etc is second hand.

  • Hopefully a full release will mean the TES3MP project picks up steam again. I don’t think there’s been an update for a year now.

  • I bet they did the classic n(n+1)/2 but forgot to multiply by $1000.

  • This is representative democracy which is pretty much how most western-style democracies are today…

    The risks you’re trying to mitigate are somewhat mitigated in a structure like the European Union has: the European Parliament, European Council, Council of the European Union, and European Commission, etc.