[-] wanderingmagus@lemm.ee 0 points 2 weeks ago

@remindme@mstdn.social 4 days

[-] wanderingmagus@lemm.ee 1 points 2 weeks ago

Just ping @remindme@mstdn.social

[-] wanderingmagus@lemm.ee 1 points 4 months ago

Isn't surfing the web the main use case for a large portion of the PC/Laptop user base? Pretty sure for wide swaths of people, "executable", "startup program" and "HDD" have no meaning. Not saying that's "right" or "wrong", just that that's my observation. You could make the argument that they might as well switch to Chromebook, and in fact, many do.

For intermediate users, there's a graphical startup program menu for selecting startup apps, at least in Mint Cinnamon. Usually programs for me won't be able to access my HDD only if I did an even more advanced thing and made a docker instance without permissions - other than that, I've been able to connect programs like Steam (Flatpack) to my external HDD without issue. But maybe that's just Mint, idk.

[-] wanderingmagus@lemm.ee 1 points 4 months ago

https://cdn.netzpolitik.org/wp-upload/2024/06/2024-05-22-Recommendation-HLG-Going-Dark-c.pdf

  1. Implementing lawful access by design in all relevant technologies in line with the needs expressed by law enforcement, ensuring at the same time strong security and cybersecurity and providing for the full respect of legal obligations on lawful access. According to the HLG, law enforcement authorities should contribute to the definition of requirements, but it should not be their role to impose specific solutions on companies so that they can provide lawful access to data for criminal investigative purposes without compromising security. To that end, experts recommend developing a technology roadmap that brings together technology, cybersecurity, privacy, standardisation and security experts and ensures adequate coordination e.g. potentially through a permanent structure.
  2. Ensuring that possible new obligations, a new legal instrument and/or standards do not lead, directly or indirectly, to obligations for the providers to weaken the security of communications by generally undermining or weakening E2EE. Therefore, potential new rules on access to data in clear would need to undergo a cautious assessment based on stateof-the-art technological solutions (which should in turn consider the challenges of encryption). When ensuring the possibility of lawful access by design as provided by law, manufacturers or service providers should do so in a way that it has no negative impact on the security posture of their hardware or software architectures.
  3. Enhancing EU coordination and support to address situations where technical solutions exist to enable lawful interception but are not implemented by providers of Electronic Communications Services. In such cases, for example when home-routing agreements or when specific implementation of Rich Communication System (RCS) do not allow lawful interception capabilities, clear guidance and a dialogue facilitated at EU level would improve the cooperation with Electronic Communications Services.
  4. Conducting a comprehensive mapping of the current legislation in Member States to detail the legal responsibilities of digital hardware and software manufacturers to comply with data requests from law enforcement. It would also take into account specific scenarios and requirements that compel companies to access devices, in compliance also with CJEU caselaw and case law of the European Court of Human Rights. The goal should be to develop an EU-level handbook on that basis, and depending on the aforementioned mapping, to promote the approximation of legislation within this area, and to develop binding industry standards for devices brought to market in the EU, to integrate lawful access.
  5. Establishing a research group to assess the technical feasibility of built-in lawful access obligations (including for accessing encrypted data) for digital devices, while maintaining and without compromising the security of devices and the privacy of information for all users as well as without weakening or undermining the security of communications. Recommendations from the High-Level Group on Access to Data for Effective Law Enforcement, Council of the European Union, 22 May 2024, pp. 23-24.
[-] wanderingmagus@lemm.ee 0 points 5 months ago

Lmao, enlist? Vatnik, I'm already in the goddamn Navy of the United States of America, what the fuck do you think "SSBN submariner" means? And don't worry, vatnik, when I engage in combat, you'll know - when the sun rises several thousand times across your sorry excuse of a nation.

[-] wanderingmagus@lemm.ee 0 points 5 months ago

And the Russkies need a reminder that good ol' US of A also has several thousand nukes and is ready and willing to use them. First and second strike. Proud SSBN submariner, ready to launch when ordered. HOOYAH AMERICA. KILL THE BEAR.

[-] wanderingmagus@lemm.ee 0 points 1 year ago

Slava Ukraini, Crimea is Ukraine, and if you don't like it you can taste nuclear fire. HOOYAH AMERICA. The SSBN force stands ready to set condition 1SQ for strategic launch! Fuck the FSB, fuck Putin, and fuck anyone who supports them. KILL THE BEAR. Churchill should've followed through with Operation Unthinkable when he had the chance.

[-] wanderingmagus@lemm.ee 1 points 1 year ago

How about I do it to the world instead? People like you are why I joined the SSBN force, so I can get a front row seat when I get the order to flip the switch and set 1SQ.

[-] wanderingmagus@lemm.ee 1 points 1 year ago

Here's my alternative effort: I joined the SSBN force to get a front row seat to the end of the world. Gimme a valid and authentic EAM and I'll flip that switch like there's no tomorrow, 'cause there won't be.

[-] wanderingmagus@lemm.ee 1 points 1 year ago

I sure hope you're right. Decentralization won't solve all the issues of course, and will cause its own problems, but it will hopefully be at least a little better the the chain of walled gardens and outrage- and clickbait-driven cesspool that the internet is right now.

[-] wanderingmagus@lemm.ee 1 points 1 year ago

Seems to be the plan for an increasing number of social media companies. As far as Lemmy is concerned, if it and other related services get killed, that just drives us underground to the darknet and the old tried and true chat services still being used there. As the old saying goes, can't stop the signal, and every empire falls to ruin eventually. We'll see how long it takes for Rome to crumble this time.

[-] wanderingmagus@lemm.ee 0 points 1 year ago

"Democrats" is an amazingly broad term that mostly encompasses "almost anything that isn't Republicans". It isn't so much a unified monolith as an alliance of often polar opposite interests banding together only because the GOP is the only real alternative. Were the GOP to disappear tomorrow, I guarantee the Democratic party would almost instantly split into dozens of smaller parties, or possibly into two again. Compared to most of Europe, an American "Democrat" is a centrist or even a right wing neoliberal. People like Bernie Sanders, who is viewed as a far-left outright communist in America, would barely count as center left in most of Western Europe.

view more: ‹ prev next ›

wanderingmagus

joined 1 year ago