Andromxda
@Andromxda@lemmy.dbzer0.com
- Comment on Have you said Thank You once? 3 days ago:
I don’t know if you have noticed, but this is c/lemmyshitpost
- Comment on Have you said Thank You once? 3 days ago:
Apparently they don’t. At least not, when visiting the country they desperately want to conquer.
- Comment on Have you said Thank You once? 4 days ago:
Which chat bot did you use?
- Comment on Have you said Thank You once? 4 days ago:
Finally someone who got my JD Vance reference. I was expecting more comments about that.
- Submitted 4 days ago to [deleted] | 55 comments
- Comment on lightweight blog ? 5 days ago:
I like Zola. You can integrate it with Lemmy comments: lemmy.dbzer0.com/post/30018034
- Comment on [deleted] 2 weeks ago:
You could get a smaller amount of panels at first, and later expand your solar farm. But I don’t know if that would keep the costs low enough to be manageable for you, as solar panels aren’t even the most expensive part of a solar farm. The biggest upfront investment would probably be all the electrical gear, e.g. the inverter, etc.
You could try getting a loan. Demand for renewable electricity is pretty high after all, banks might be willing to invest in something like this. - Comment on Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying 4 weeks ago:
It probably needs some permissions that aren’t available in newer Android versions anymore
- Comment on Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying 4 weeks ago:
It didn’t mention anything about the CPU in the install instructions…
Try locating the binary that crashes with the “Bad CPU type” exception and run the
file
command on it. It will show you which architecture the binary was built for.Edit: Linux install was successful
That’s good to hear
- Comment on Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying 4 weeks ago:
Can I message you on Matrix to help you diagnose this?
- Comment on Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying 4 weeks ago:
You’re right, I forgot that
- Comment on Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying 4 weeks ago:
Bad CPU type in executable
Do you use an Apple Silicon Mac by any chance?
- Comment on Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying 4 weeks ago:
I couldn’t find anything on that yet. I think that since the project is still in a rather early stage of development, it’s more of a proof of concept. But I do know that the PCAPs are saved on the device, and you can download them onto another computer.
- Comment on Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying 4 weeks ago:
Is it necessary to get a cell plan to run the hotspot?
As far as I’m aware: no. Cell-site simulators could theoretically only target devices that connect with a valid IMSI, but I kinda doubt that they are doing that. But you could get a cheap prepaid SIM, instead of an actual cell plan.
- Comment on Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying 4 weeks ago:
This is the easiest explanation I could come up with:
Your phone (or other cellular devices) constantly broadcasts a few identifiers. The IMEI, which is tied directly to the cellular hardware in your device, and the IMSI, which is tied to your SIM card. Law enforcement uses so called cell-site simulators, which basically pretend to be cellular antennas, while actually just grabbing IMEIs and IMSIs from every device in the area. This is often used during protests, in order to identify those who attend them.
Rayhunter is a piece of software that detects the presence of cell-site simulators, making attendants of protests aware of the hidden danger.
This is especially important, now that the US basically transformed into an authoritarian state. We’ve already seen how Trump strategically uses law enforcement to crack down on protests, such as the BLM movement in 2020. (www.youtube.com/watch?v=K_a63r5Km9I) Being aware of law enforcement/intelligence operations that try to identify and track down protest attendants is more important than ever.
- Submitted 4 weeks ago to technology@lemmy.world | 31 comments
- Submitted 5 weeks ago to [deleted] | 63 comments
- Comment on Elon Musk’s X blocks links to Signal, the encrypted messaging service 1 month ago:
Would Mexico and Panama be the 54th and 55th then?
- Comment on Elon Musk’s X blocks links to Signal, the encrypted messaging service 1 month ago:
The first step would probably be to try and revoke their tax exempt non profit status. But I’m confident the Signal Foundation would at that point just move to another jurisdiction. Maybe Canada, Switzerland or something like that.
- Comment on Elon Musk’s X blocks links to Signal, the encrypted messaging service 1 month ago:
That’s what I thought when I first saw this
- Comment on Elon Musk’s X blocks links to Signal, the encrypted messaging service 1 month ago:
I agree
- Comment on Elon Musk’s X blocks links to Signal, the encrypted messaging service 1 month ago:
Absolutely
- Submitted 1 month ago to technology@lemmy.world | 87 comments
- Comment on Bad UX is keeping the majority of people away from Lemmy 1 month ago:
Bad choice, many new users specifically came here because of !piracy@lemmy.dbzer0.com, which can’t be accessed from lemmy.world.
- Comment on Time to get serious with E2E encrypted messaging 1 month ago:
There was a period where they didn’t push changes to the repo, but all the code was released afterwards and it’s been getting regular updates ever since. But it also doesn’t matter at all, since the Signal client is designed in a way that avoids putting trust in the server. Signal servers could literally be run by the NSA and it wouldn’t matter, as everything is fully end-to-end encrypted, including metadata. The Signal protocol was also updated to use post-quantum cryptography in 2023.
- Comment on Time to get serious with E2E encrypted messaging 1 month ago:
Signal’s default, well-supported installations use Google services
Signal only uses FCM for notifications, with a fallback mechanism (WebSockets) being available in all builds of the app, as well as Google Maps for location sharing (which most people probably don’t use anyway).
so unless you’re an extremely atypical user, those services are present on most of your contacts’ devices
Google Play services being present on people’s devices has nothing to do with Signal including the library. They are present on almost every Android device, because Google pressures OEMs to include them and grant them system level privileges.
Let’s also remember that E2EE doesn’t protect the endpionts
Yeah, but that’s the case with EVERY messenger app, so I really don’t know what your point is here?
- Comment on Time to get serious with E2E encrypted messaging 1 month ago:
As far as I know moxie, signals lead dev, considers only the use of the officially build and distributed client authorized to use their servers.
Moxie has resigned a few years ago. The article you linked to is 9 years old, Signal leadership has changed a bunch of times since. Signal can’t detect that you’re running an alternative client, because that check would require them to include some new code in the official client. Even if they did this, they couldn’t just ban anyone who’s client doesn’t pass the check, since it could just be an older version of the official client. They could force everyone to use the official app, but they really have no reason to invest time and effort into enforcing this. Molly is only available for Android, and it isn’t even on the Play Store or the official F-Droid repo, so the user base naturally won’t be as big.
- Comment on Time to get serious with E2E encrypted messaging 1 month ago:
No it’s not: github.com/signalapp/signal-server
- Comment on Time to get serious with E2E encrypted messaging 1 month ago:
Have you been using this one?
I tried it out once, but I currently don’t use it, because I just run mollysocket on my own server.
On my app I don’t get rich notifications only “you may have a new message”.
That should only be the case while your Molly database is locked, because the actual messages can’t be decrypted, so no message preview can be shown in the notification.
- Comment on Time to get serious with E2E encrypted messaging 1 month ago:
Oh that’s the only one I know of. I thought that this is what you’re referring to.