Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)NA
Natanael @infosec.pub

Cryptography nerd

Fediverse accounts; Natanael@slrpnk.net (main) Natanael@infosec.pub Natanael@lemmy.zip

Lemmy moderation account: @TrustedThirdParty@infosec.pub - !crypto@infosec.pub

@Natanael_L@mastodon.social

Bluesky: natanael.bsky.social

Posts 0
Comments 76
Take your passkey and shove it where the sun don't shine
  • They're using the same standard as FIDO2 / WebAuthn hardware security keys. The protocol is phishing resistant, unlike TOTP and similar one time code solutions.

    I prefer the physical ones, because they're easy to organize. Passkey synchronization can be annoying.

  • The state should be purely passed through function inputs and outputs
  • Of course a group of people could use violence to oppress other people. But then you no longer have anarchy.

    The irony is that the amount of coordination needed to protect anarchism would no longer be called anarchism

    You will always end up recreating some form of organizations to manage resources. The best you can do is ensure those organizations are structured with accountability to make sure they're fair to everybody

  • GitHub - LadybirdBrowser/ladybird: Truly independent web browser
  • There's basically ideologues versus hateful people versus indifferent sociopaths (overlap is common)

    I consider political ideologues and "technocrats" and extremely pedantic rule-following bureaucrats to be different flavors of ideologues (has a specific worldview they try to enforce / uphold)

  • Google’s ‘Secret’ Update Scans All Your Photos
  • Yeah so here's the next problem - downscaling attacks exists against those algorithms too.

    https://scaling-attacks.net/

    Also, even if those attacks were prevented they're still going to look through basically your whole album if you trigger the alert

  • Signal's CEO: Then We're Leaving Sweden | Sweden Herald
  • https://commission.europa.eu/law/law-making-process/types-eu-law_en

    Each country may still have the equivalent of a constitution, and the majority of EU laws are directives which the country may translate to fit their local law, also there's various negotiated exceptions to EU laws. But the general idea is that the treaties establishing EU are meant to require full cooperation

  • Signal's CEO: Then We're Leaving Sweden | Sweden Herald
  • Technically only for non-classified internal communication. Classified stuff is restricted to be discussed only using military approved locked down hardware. But still, issuing a strong recommendation for Signal above all other options when communicating using regular devices is a good thing. Lots of "regular" conversations can still leak more than you expect through metadata, timing, etc, so they trust Signal to protect that