[-] charonn0@startrek.website 69 points 7 months ago

This is a textbook example of the "establishment of religion" prohibited by the First Amendment.

[-] charonn0@startrek.website 70 points 8 months ago

You Linux users sure are a contentious people.

[-] charonn0@startrek.website 64 points 10 months ago

“We will be ready to defend this case surrounding extremely newsworthy events when it goes to trial, likely in 2025,” a Fox spokesperson said in a statement after the ruling. “As a report prepared by our financial expert shows, Smartmatic’s damages claims are implausible, disconnected from reality, and on their face intended to chill First Amendment freedoms.”

Yeah, right. They already settled the Dominion case for almost a billion dollars. This case is practically identical. I actually hope they're stupid enough to take this one to trial.

[-] charonn0@startrek.website 69 points 10 months ago* (last edited 10 months ago)

SSL/TLS, the "S" in HTTPS, and other network encryption protocols such as SSH, use a technique called a Diffie-Hellman key exchange. This is a mode of cryptography where each side generates two keys: a public half and a private half. Anything encrypted with the public half is only decryptable by the associated private half (and vice versa).

You and Youtube only ever exchange the public halves of your respective key pairs. If someone snoops on the key exchange all they can do is insert spoofed messages, not decrypt real ones.

Moreover, the keypairs are generated on the fly for each new session rather than reused. This means that even a future compromise of youtube won't unlock old sessions. This is a concept called forward secrecy.

Message spoofing is prevented by digital signatures. These also use the Diffie-Hellman principle of pairs of public/private keys, but use separate longer-term key pairs than those used with encryption. The public half of youtube's signing key, as presented by the server when you connect to it, has to be digitally signed by a well-known public authority whose public signing key was shipped with your web browser.

[-] charonn0@startrek.website 66 points 10 months ago

And their Christofascist fans don't even realize it's a sin to consult a psychic.

[-] charonn0@startrek.website 68 points 11 months ago

Even the researcher who reported this doesn't go as far as this headline.

"I am an admin, should I drop everything and fix this?"

Probably not.

The attack requires an active Man-in-the-Middle attacker that can intercept and modify the connection's traffic at the TCP/IP layer. Additionally, we require the negotiation of either ChaCha20-Poly1305, or any CBC cipher in combination with Encrypt-then-MAC as the connection's encryption mode.

[...]

"So how practical is the attack?"

The Terrapin attack requires an active Man-in-the-Middle attacker, that means some way for an attacker to intercept and modify the data sent from the client or server to the remote peer. This is difficult on the Internet, but can be a plausible attacker model on the local network.

https://terrapin-attack.com/

[-] charonn0@startrek.website 63 points 11 months ago* (last edited 11 months ago)

The month before, the justice had borrowed $267,000 from a friend to buy a high-end RV.

Just cut back on the avocado toast.

[-] charonn0@startrek.website 66 points 1 year ago

Mullin has been going on a media tour in the wake of the near-altercation. During an interview with Sean Hannity, the Fox News host reminisced to Mullin about his rough and tumble youth. “I don’t think there was a single day that we were playing sports where we didn’t drop the gloves or, you know, have a brief interlude of, you know, throwing fists and it would be all be over,”

"Emotionally stunted manchild" would have been more succinct.

[-] charonn0@startrek.website 63 points 1 year ago

Each additional decade of age seems half as long as the previous one was.

0-10 took forever

10-20 took 20 years

20-30 took 10 years

30-40 took 5 years

I'm 40 and it feels like 50 is next year already.

[-] charonn0@startrek.website 70 points 1 year ago

“A very large portion of my party really doesn’t believe in the Constitution,” he told Coppins a few months after Jan. 6.

"But I lay down with the dogs anyway."

[-] charonn0@startrek.website 67 points 1 year ago* (last edited 1 year ago)

In the beginning there was NCSA Mosaic, and Mosaic called itself NCSA_Mosaic/2.0 (Windows 3.1), and Mosaic displayed pictures along with text, and there was much rejoicing.

And behold, then came a new web browser known as “Mozilla”, being short for “Mosaic Killer,” but Mosaic was not amused, so the public name was changed to Netscape, and Netscape called itself Mozilla/1.0 (Win3.1), and there was more rejoicing. And Netscape supported frames, and frames became popular among the people, but Mosaic did not support frames, and so came “user agent sniffing” and to “Mozilla” webmasters sent frames, but to other browsers they sent not frames.

And Netscape said, let us make fun of Microsoft and refer to Windows as “poorly debugged device drivers,” and Microsoft was angry. And so Microsoft made their own web browser, which they called Internet Explorer, hoping for it to be a “Netscape Killer”. And Internet Explorer supported frames, and yet was not Mozilla, and so was not given frames. And Microsoft grew impatient, and did not wish to wait for webmasters to learn of IE and begin to send it frames, and so Internet Explorer declared that it was “Mozilla compatible” and began to impersonate Netscape, and called itself Mozilla/1.22 (compatible; MSIE 2.0; Windows 95), and Internet Explorer received frames, and all of Microsoft was happy, but webmasters were confused.

And Microsoft sold IE with Windows, and made it better than Netscape, and the first browser war raged upon the face of the land. And behold, Netscape was killed, and there was much rejoicing at Microsoft. But Netscape was reborn as Mozilla, and Mozilla built Gecko, and called itself Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.1) Gecko/20020826, and Gecko was the rendering engine, and Gecko was good. And Mozilla became Firefox, and called itself Mozilla/5.0 (Windows; U; Windows NT 5.1; sv-SE; rv:1.7.5) Gecko/20041108 Firefox/1.0, and Firefox was very good. And Gecko began to multiply, and other browsers were born that used its code, and they called themselves Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.2) Gecko/20040825 Camino/0.8.1 the one, and Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.8.1.8) Gecko/20071008 SeaMonkey/1.0 another, each pretending to be Mozilla, and all of them powered by Gecko.

And Gecko was good, and IE was not, and sniffing was reborn, and Gecko was given good web code, and other browsers were not. And the followers of Linux were much sorrowed, because they had built Konqueror, whose engine was KHTML, which they thought was as good as Gecko, but it was not Gecko, and so was not given the good pages, and so Konquerer began to pretend to be “like Gecko” to get the good pages, and called itself Mozilla/5.0 (compatible; Konqueror/3.2; FreeBSD) (KHTML, like Gecko) and there was much confusion.

Then cometh Opera and said, “surely we should allow our users to decide which browser we should impersonate,” and so Opera created a menu item, and Opera called itself Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; en) Opera 9.51, or Mozilla/5.0 (Windows NT 6.0; U; en; rv:1.8.1) Gecko/20061208 Firefox/2.0.0 Opera 9.51, or Opera/9.51 (Windows NT 5.1; U; en) depending on which option the user selected.

And Apple built Safari, and used KHTML, but added many features, and forked the project, and called it WebKit, but wanted pages written for KHTML, and so Safari called itself Mozilla/5.0 (Macintosh; U; PPC Mac OS X; de-de) AppleWebKit/85.7 (KHTML, like Gecko) Safari/85.5, and it got worse.

And Microsoft feared Firefox greatly, and Internet Explorer returned, and called itself Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) and it rendered good code, but only if webmasters commanded it to do so.

And then Google built Chrome, and Chrome used Webkit, and it was like Safari, and wanted pages built for Safari, and so pretended to be Safari. And thus Chrome used WebKit, and pretended to be Safari, and WebKit pretended to be KHTML, and KHTML pretended to be Gecko, and all browsers pretended to be Mozilla, and Chrome called itself Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.13 (KHTML, like Gecko) Chrome/0.2.149.27 Safari/525.13, and the user agent string was a complete mess, and near useless, and everyone pretended to be everyone else, and confusion abounded.

https://webaim.org/blog/user-agent-string-history/

[-] charonn0@startrek.website 70 points 1 year ago

In the early 2000's Commodo was actually a reputable consumer-grade firewall vendor. Like all security software vendors, they eventually became that which they fought against.

view more: ‹ prev next ›

charonn0

joined 1 year ago