• 0 Posts
  • 30 Comments
Joined 29 days ago
cake
Cake day: February 10th, 2025

help-circle
  • I got into computers when I destroyed a Windows 3.11 install on a PC we’d been given.

    Nobody wanted to use it without graphics. So I started playing with it and typing words into the MS DOS prompt and reading the output.

    I found qbasic and the gorilla and snake games. Then a text editor and so I learned how to make batch files. Learned how to edit basic by trial and error so I could make the gorilla’s bananas blow up the whole screen

    Found some DOS games, like scorched earth and a copy of wing commander which led to me learning to hate DRM and also how to operate an unguarded photocopier at my school.

    Fast forward 30 years and I’ve picked up a few more tricks


  • I understand why it exists in online spaces, at the same time it’s on every person to speak up against bad behavior.

    I didn’t magically become transphobic because someone was an asshole to me and I can empathize with what caused the behavior.

    These kinds of reactions are still wrong and is harmful on both the individual level and to the community writ large. Because of that, people should not feel pressured to accept bad behavior or blamed for not walking on egg shells.

    We all have the right to be treated with respect and dignity.



  • FauxLiving@lemmy.worldtomemes@lemmy.worldBlahaj is wild
    link
    fedilink
    arrow-up
    30
    arrow-down
    3
    ·
    6 days ago

    I understand that transphobic people exist online.

    We also need to recognize that being trans doesn’t mean that you’re incapable of being an asshole, engaging in cyberharassment or any other negative social behaviors that all people are capable of.

    Much like OP, I’ve been attacked by these people for supporting trans people in a way that wasn’t popular (I.e. not brigading Twitch streamers and harassing children playing Legacy of Hogwarts). I saw a user banned for saying to donate to the Trevor Project instead of brigading and I spoke up in support of them.

    I was banned for “transphobia”.

    There are absolutely mods/admins using their power in trans social spaces to attack and purge people for no reason other than that they’re not fully aligned with whatever dogma the mod feels is correct.

    I just don’t even try to interact anymore. There will always be some chronically online commenter or mod who wants to try to deconstruct your every word choice looking for an angle to accuse you of saying something outrageous.

    Alienating allies and bullying people out of the community is toxic and wrong, regardless of your being a member of a minority group.





  • You’re asking if someone can give you the names of any telemetry endpoints that may exist in the future?

    If you’re that worried about it and suspect Mozilla will act maliciously then you should probably use a different browser/fork. Since pihole blocking depends on the browser respecting your system DNS.

    If they were trying to be malicious they could resolve DNS through a custom module over an encrypted connection. Pihole doesn’t block DNS, it simply filters the DNS queries issued by your system. Malicious apps can still resolve DNS queries without using your system’s DNS which will completely bypass pihole.


  • I am pretty sure that if asked, the serverside protections can be circumvented

    No, they literally cannot. The entire protocol is open sourced and has been audited many times over.

    One of the fundamental things you assume when designing a cryptosystem is that the communication link between two parties is monitored. The server mostly exists as a tool to frustrate efforts by attackers that have network dominance (i.e. secret police in oppressive regimes) by not allowing signals intelligence to extract a social graph. All this hypothetical attacker can see is that everyone talks to a server so they can’t know which two people are communicating.

    The previous iteration, TextSecure, used SMS. Your cellular provider could easily know WHO you were talking to and WHEN each message was sent. So SMS was replaced with a server and the protocol was amended so that even the server has no way of gaining access to that information.

    The sealed sender feature is something that the client does. It was best effort because, at the time, they still supported older clients and needed backwards compatibility. This is no longer the case.






  • History isn’t stored on the server so it can’t be automatically populated on a new device. That is a feature. The alternative, storing the messages on the server or having the means for one device to clone all of its messages to another device, would be insecure.

    A 30 character long password is required in order to have enough bits of entropy so that the backed up messages are actually secure.

    Grandma isn’t moving her data to a new PC without assistance, the person that is assisting her should be competent enough to operate Signal.





  • There once was a Whateley so brash,
    Who thought all critique was just trash,
    
    But your tongue's been too sharp,
    You ignite a dull harp—
    Your abrasiveness is nothing but ash.
    
    Your retorts may be quick and they fly,
    But they’re empty like clouds in the sky.
    If you fail to relent,
    Keep on being so bent,
    You’ll continue receiving an AI reply.