[-] Mike1576218@lemmy.ml 1 points 6 days ago* (last edited 6 days ago)

Certificate pinning?

Also all let's encrypt certs are public. So if someone malicious gets a cert for your domain, you can notice.

(Thats also why it may be a bad idea to use that for secretButPublicStuff.Yourdomain.com certificate transparency logs are a great way to find attack surface.)

edit oh certificate pinning has been deprecated in favor of checking transparency logs.

[-] Mike1576218@lemmy.ml 15 points 1 week ago

Wasn't that somewhat how Q-anon started?

[-] Mike1576218@lemmy.ml 12 points 3 weeks ago

It is not a problem to distribute the decryption algorithm. The question remains against what this will protect. Normal https encrypts the traffic safely during transit. With this, the data is also encrypted on the server. But if you can access the server, you can modify the javascript code to send the password back to a server.

It could be used on something like IPFS, where all data is basically public but you can be sure it hasn't been modified.

[-] Mike1576218@lemmy.ml 8 points 3 weeks ago

Aren't all (most?) those centralized services? What good is having the app if the service is unavailable? Tox, Jamie and Veilidchat are fully decentralized, not just federated, fully decentralized. They come with their own downsides though...

[-] Mike1576218@lemmy.ml 9 points 1 month ago

No wonder. That file is super slow to transfer for some reason. but wait till you get to /dev/urandom. That file hat TBs to transfer at whatever pipe you can throw at it...

[-] Mike1576218@lemmy.ml 11 points 1 month ago

For how long though? How do you know these are real people?

[-] Mike1576218@lemmy.ml 7 points 1 month ago

Imo the most important thing is the separation of what you do. If you're logged in on facebook, you can do that from your public ip. Anything you're not associated with your name you want to use a diffferent browser identity and maybe a different ip.

If you use Torrents or do anything illegal or whistleblowing or similar stuff, use a live linux iso with no persistence and a vpn bought with monero.

[-] Mike1576218@lemmy.ml 23 points 1 month ago

While I also noticed my webcam showing up with 3W in powertop and disabling the uvcvideo module removed that entry, it doesn't affect the reported battery discharge rate at all.

I can see the files being opened with lsof and not so with the workaround. But again the discharge rate doesn't change at all ...

To me it seems the power consumption is misreported.

[-] Mike1576218@lemmy.ml 12 points 2 months ago

Is "protein" in this article an euphemism for "meat" like usual in the us? Why do you do that? There are other sources of protein you know...

[-] Mike1576218@lemmy.ml 12 points 2 months ago* (last edited 2 months ago)

Just a note: Superconductivity is not only destroyed by temperature, but also by magnetic fields or a too high current. We might find a room temperature superconductor that is basically useless for energy transportation or high magnetic field applications.

Another problem: almost all known high-temperature superconductors are ceramics and thus very brittle and hard to work with.

What we want is a cheap, metallic, high temperature superconductor with a high maximum critical magnetic field and high critical max current density...

But of course any improvement could give big improvements in some applications. Having a nitrogen cooled MRI wound be awesome.

[-] Mike1576218@lemmy.ml 9 points 2 months ago

They probably can. jut every hack done has the possibility of spoiling the exploit. A good exploit can cost a million $. So if hacking you is worth more then say 100k to them, you're in trouble. Otherwise they will only target you with everyday surveilance.

[-] Mike1576218@lemmy.ml 7 points 3 months ago

Death by snu snu!

view more: next ›

Mike1576218

joined 3 months ago