ReversalHatchery
@ReversalHatchery@beehaw.org
- Comment on Forbidden Gummies 4 weeks ago:
then what is the popular food on the picture?
- Comment on Forbidden Gummies 4 weeks ago:
paper wasps are a popular food?
- Comment on Steam now explicitly states you're not buying the game, just a license 5 weeks ago:
btw that’s the case with most steam games. if it doesn’t have DRM, all you need is the goldberg emu dll and done.
- Comment on Star Wars Outlaws Is A Crappy Masterpiece 2 months ago:
This is a mainstream news site, did you expect them doing that?
Also, personally I haven’t heard about this trend, but let’s do it! It sounds good.
- Comment on 2 months ago:
To me it seems more nuanced.
First, a VPN won’t solve much because this garbage will still be able to log connection periods (when you are home), signal strengths changing over time, (where are you in your home), and traffic bursts (when are you doing something on your phone or other devices).
Second, this is not about mesh WiFi, as I understand. Install OpenWRT, and the mesh function of that won’t do any of this.
The problem is with new (but probably preexisting too) router brands who’s sole purpose is making all the unknowing customers into a product, but stealing their private life and giving it away for money (or anything else).
The problem is basically that a facebook-like company has got deep insight into your network, which you can’t avoid using, especially if your ISP forced you to use these garbage. - Comment on 2 months ago:
A VPN wouldn’t even help there. The spies are not in front of your door, but directly in your house.
- Comment on ISS astronauts on eight-day mission may be stuck until 2025, Nasa says 3 months ago:
They should be happy they are allowed home!
- Comment on Quick Chat 3 months ago:
Honestly I could imagine that in a slowed down world
- Comment on Signal under fire for storing encryption keys in plaintext 4 months ago:
UAC prompts you since vista if you want to let a process elevate it’s rights
- Comment on Are there any guides, tutorials or similar on how to use Steam more privately? 4 months ago:
I don’t have experience with it, but as I know that is a GUI helper for Wine.
A steam emulator is different. It is often just a single file, a program library that holds program code.
On windows it is a DLL file, on Linux it does not have an extension but it’s the same concept. The game loads it because it actually searches for the official version of this file, but both Linux and Windows implement the search for it so that a library file (with the expected name) besides the executable is preferred instead of whatever is installed systemwide.Lutris on the other hand is a GUI tool to manage your “wineprefixes”, which is maybe better called wine environments. If you are familiar with python, it’s more like python’s virtual environments.
And besides basic tasks, it has a lot of additional tools to make using Wine easier. - Comment on Are there any guides, tutorials or similar on how to use Steam more privately? 4 months ago:
Ater purchasing and downloading a game from Steam, the Steam client is not actually needed for it to be playable. Of course it will try to start up Steam, and if isn’t installed then it will complain, but if use use a “steam emulator” that can be worked around.
One such emulator is Mr Goldberg’s steam emu.
It has a bunch of configuration options, per-game settings, optionally portable settings, windows+linux support, and I think it’s even open source. - Comment on Privacy services and non privacy payments options 5 months ago:
Yeah, that’s true for most of them, they all are basically useless. It’s only worth to use private crypto, like Monero, that is designed actually with privacy in mind.
- Comment on Privacy services and non privacy payments options 5 months ago:
but I don’t know if it makes sense if my bank knows I’m using it anyway so they can sell that info to advertisers, gov, etc.
Yeah it’s not ideal, but it’s still much better because these services won’t give access to your data if they can avoid it, and then data that is encrypted is not useful when given out
- Comment on Interesting new data on Lemmy instance federation with Threads, ordered by Active Users descending. 6 months ago:
I think you have sorted by “users”, and are looking at the “active” column.
If you sort by active, it’s fine. - Comment on I am a victim of the network effect who wishes to degoogle. What do I do? 7 months ago:
How much are you into programming and tinkering?
You may be able to make an xposed module to convince the dji app that you use an “investor approved” operating system.First you would need to reverse engineer the dgi app a little, to find out where in the code it checks for your system, like when does it use safetynet. If it prints an error message or logs something to logcat when it refuses to work, then it could be easier to find the place starting from that point and the stringcs appearance in the code and usages.
Fortunately, even it not too easy, android apps are among the easiest to reverse engineer. The 2 major tools that will help you are jadx (the decompiler) and Android Studio (the official android dev program for helping in navigating the code, most important features are finding usages of a function or string resource, and “refactoring” so mass renaming functions when you understood what does a key function do)
- Comment on I am a victim of the network effect who wishes to degoogle. What do I do? 7 months ago:
Maybe it’s not for safety reasons, but they just don’t trust you with attending school. This is even worse.
- Comment on Why is it dangerous to chain power dividers? 8 months ago:
I think they may be speaking about a different kind of power divider, something to which the name probably fits better
- Comment on "How to bypass and block infuriating cookie popups" 🙄🤦🏻♀️🤦🏻♀️ 9 months ago:
Yes, but preferably go over the list of enabled filterlists in it’s settings and tick a few more boxes.
- Comment on BVG out here recommending the best 2FA Apps! 11 months ago:
It’s not bad design, it’s definitely intentional, however I agree that it’s probably not for having backdoors, but for convenience. Average people forget their passwords all the time, and with encryption that level of carelessness is fatal to your data if they have not saved it somewhere, which they probably didn’t do.
Very few devices are rooted and usually you cannot get root without fully wiping your device in process.
I’m pretty sure the system is not flawless. Probably it’s harder to find an exploit in the OS than it was years ago, but I would be surprised if it would be really rare. Also, I think a considerable amount of people use the cheapest phones of no name brands (even if not in your country), or even just tablets that haven’t received updates for years and are slow but “good for use at home”. I have one at home that I rarely use. Bootloader cannot be unlocked, but there’s a couple of exploits available for one off commands and such.
- Comment on Does Google still hold contact data after deleting from Google Contacts? 11 months ago:
I don’t think there’s a factual answer to this question.
My take on it though is why would they delete it? They can make use of it in various ways, and in new ways every once in a while, and it’s not like as if you could prove it in court or even just find out that they didn’t delete your data. - Comment on BVG out here recommending the best 2FA Apps! 11 months ago:
That depends. More of the popular ones don’t encrypt the secret keys, they can just be read out with root access or even with the use of ADB (the pull command), not even speaking about reading the memory contents while booted to a recovery.
Some even uploads the keys to a cloud service for convenience, and they consider it a feature. - Comment on I have an archaeology joke but it's probably just a ritual. 11 months ago:
I remembered this XKCD from the image: xkcd.com/1683/
- Comment on I have an archaeology joke but it's probably just a ritual. 11 months ago:
Or “but it does not compile”
- Comment on Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement 1 year ago:
on the proton encryption, i did know about this but does that apply to proton-to-proton, proton-to-NonProton, or both? if you have details on this let me know.
As I know it applies to both. Formerly they were asking (among other things) about the titles of your latest emails for account recovery. (after I have put all the links here I realized that these don’t give a details on whether this also applies to inter-proton messages…)
A few sources:
proton.me/…/proton-mail-encryption-explained
Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.
www.reddit.com/r/ProtonMail/comments/…/eiphhs7/?c…
…stackexchange.com/…/why-is-some-meta-data-not-en…
either way the fact that they dont makes me feel that proton is a similar honeypot to signal and telegram, where they make a compromise with the five eyes, to give them metadata even if actual contents are safe. metadata can be much more powerful than contents often times
Yeah, might as well be. But if it is, I’m afraid we won’t get to know for a few decades, if ever. And I think it’s still better than the alternatives… the alternative email providers, that is.
If it comforts you, in their reddit comment I linked they mention (in 2019…) that there’s a proposal they support for openpgp to be able to have an encrypted subject line. - Comment on Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement 1 year ago:
Proton can be legally ordered to start recording the IP address of a specific user. That’s why they recommend that you always connect through their Onion site.
Other than that and if that’s possible, I think it may also be possible to legally order Proton to keep the unencrypted form of incoming emails for a specific user, but Proton did not said it in the article, and Swiss laws might protect them against that. It’s certainly possible technically, and good to be aware of it, I think.Sorry but I can’t open the second page, as it actively resists it. I suspect though that the problem with Tutanota was not their encryption, but their legal system, which required them to keep a copy of the incoming emails.
Also, don’t mistake me, I’m all for protonmail, and I mean this. But did you know they only encrypt the email contents? Metadata like title, sender recipient and other things in the mail header don’t get encrypted.
- Comment on Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement 1 year ago:
Why, what else could have they done with laws? Protonmail and literally every other provider on the clearnet is also susceptible to this.
- Comment on Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement 1 year ago:
The plan was to have criminals use the storefront — an online end-to-end encryption service called Tutanota — to allow authorities to collect intelligence about them.
Excuse me, what?
- Comment on Why Not Store Encrypted Emails in Plaintext Locally? 1 year ago:
fastmail
That’s a paid service, right? I don’t know much about them, they may have other pros too, but proton also allows you to use your own email client if you’re in a plan.
- Comment on Why Not Store Encrypted Emails in Plaintext Locally? 1 year ago:
Protonmail now supports searching in the content of all your mail, though.
Or at least the web client. It will ask you to download all your mail, and it will make an encrypted search index on your computer. - Comment on 1 year ago:
service has all the downsides of a centralized service
No it doesn’t? A single party cannot block you from participating in the network, as you can just find a different provider, and you can have control over what servers may store your data, both as a server operator and as a room admin.