Just give it a grill faceplate
Natanael
Cryptography nerd
Fediverse accounts;
@Natanael@slrpnk.net (main)
@Natanael@infosec.pub
@Natanael@lemmy.zip
Bluesky: natanael.bsky.social
- 1 Post
- 391 Comments
Natanael@slrpnk.netto
World News@lemmy.world•‘Trumpist’ Czech PM-elect refuses to sell business empire amid conflict of interest rowEnglish
1·2 months agoJust realized my post could be read wrong.
I meant that the above would be forced onto candidates as they sign up for an election.
Natanael@slrpnk.netto
World News@lemmy.world•‘Trumpist’ Czech PM-elect refuses to sell business empire amid conflict of interest rowEnglish
101·2 months agoMove all control of all business into a fully independent trust, or something. Maybe even one controlled in a different country if you’re really paranoid.
Natanael@slrpnk.netto
Games@lemmy.world•Steam Hardware [new Steam Controller, Steam Machine, and VR headset Steam Frame, coming in 2026]English
16·2 months agoYup, FEX to translate x86 to ARM.
Natanael@slrpnk.netto
Privacy@lemmy.ml•Can Google read my Signal messages on stock Android?
11·2 months agoMost of those things would only be possible by hiding them in a system update
Natanael@slrpnk.netto
Privacy@lemmy.ml•Can Google read my Signal messages on stock Android?
11·2 months agoIt’s possible but complicated.
Since apps have access to the TPM API they can encrypt their own data in such a way that only the app’s own authorized processes can retrieve the decryption key from the TPM chip
Natanael@slrpnk.netto
Privacy@lemmy.ml•Can Google read my Signal messages on stock Android?
63·2 months agoThere’s measures they could use in theory, but if you switch keyboard app away from Google’s and set private text mode, enable screenshot protection, etc, then you should be good.
Natanael@slrpnk.netto
Privacy@lemmy.ml•Is it better to enable javascript in LibreWolf or switch to a different browser when a site needs it? Does switching browsers help in general?
10·2 months agoFor sites you visit occasionally, it’s better to enable tab isolation (use the containers feature) and then enable JS only for that domain (note the difference between allowing JS from that domain in any tab, vs only allowing that tab with that domain to use JS, you should do the latter)
https://addons.mozilla.org/en-US/firefox/addon/multi-account-containers/
If you’re switching to a different browser you may as well use the same browser but a second clean profile and use private tabs so it doesn’t retain history. Using private tabs in your main browser profile does also help but isn’t perfect because there’s still some metadata leaks occasionally.
Using a different browser could ironically make you easier to track - how unique you are is the main signal used to track you (user agent, OS, language, etc), and going for an even more rare config will help their tracking even if you delete session cookies. Especially if they have a tracker across multiple domains you visit from different browsers from the same IP, with similar device fingerprinting results across browsers. That’s a strong signal those sessions are linked. You want to NOT stand out to maintain your privacy.
Natanael@slrpnk.netto
cats@lemmy.world•The vet had him shaved because he has scratchies on his neck
28·3 months agoForbidden snacks
Natanael@slrpnk.netto
Technology@lemmy.world•The Windows Subsystem for Linux is now open source.English
4·8 months ago[Windows subsystem] for [executable environment] is the naming scheme. The default is Win32, there’s one for POSIX (practically never used), and Linux runs in another.
Natanael@slrpnk.netto
Ask Lemmy@lemmy.world•Is there a term for *exploiting the letter of the law for malicious gain*, particularly knowing that the opponent will be bound by the letter of the law despite the negative outcome?
4·9 months agoMalicious compliance is when you follow a order or law knowing that it will backfire on those who issued it.
“Lawfare” is a comparable term but not quite it (basically legal harassment campaigns).
Natanael@slrpnk.netto
Technology@lemmy.world•Bluesky has started honoring takedown requests from Turkish governmentEnglish
4·9 months agoThis affects the view of posts via the bluesky servers, but not via mirrors or other servers
And the use of content addressing means you can be sure it hasn’t been modified
Natanael@slrpnk.netto
Technology@lemmy.world•The Fairphone 5 price has been dropped to €499. The phone is designed to be the most advanced environmentally friendly smartphone.English
4·9 months agoSeveral Android manufacturers have their own settings in the OS for battery longevity (automatic schedule based smart charging, or charging limits)
Don’t think it’s native in Android. Charging limits need support in the charging controller chip, plus driver support in the OS.
Natanael@slrpnk.netto
Technology@lemmy.world•The Fairphone 5 price has been dropped to €499. The phone is designed to be the most advanced environmentally friendly smartphone.English
49·9 months agoI use my backup headphones when my Bluetooth headset has run out of battery
Natanael@slrpnk.netto
Selfhosted@lemmy.world•Traffic routing security comparisonEnglish
6·11 months agoWireguard is most reliable in terms of security. For censorship resistance, it’s all about tunneling it in a way that looks indistinguishable from normal traffic
Domain or IP doesn’t make much of a difference. If somebody can block one they can block the other. The trick is not getting flagged. Domain does make it easier to administer though with stuff like dyndns, but then you also need to make sure eSNI is available (especially if it’s on hosting) and that you’re using encrypted DNS lookups
Natanael@slrpnk.netto
Privacy@lemmy.ml•Why does Big Tech's "End to End" encryption matter if they are compromised anyways?
21·11 months agoTelegram has been under fire from the start, lol. 'we have math PhDs" 🤷
Natanael@slrpnk.netto
Privacy@lemmy.ml•Why does Big Tech's "End to End" encryption matter if they are compromised anyways?
161·11 months agoThere’s also a big difference between published specifications and threat models for the encryption which professionals can investigate in the code delivered to users, versus no published security information at all with pure reverse engineering as the only option
Apple at least has public specifications. Experts can dig into it and compare against the specs, which is far easier than digging into that kind of code blindly. The spec describes what it does when and why, so you don’t have to figure that out through reverse engineering, instead you can focus on looking for discrepancies
Proper open source with deterministic builds would be even better, but we aren’t getting that out of Apple. Specs is the next best thing.
BTW, plugging our cryptography community: !crypto@infosec.pub
Natanael@slrpnk.netto
News@lemmy.world•A new DOJ memo argues that immigration judges can be stripped of civil service protections. That could lay the groundwork for firing them if they don’t rule the “right” way.
1·11 months agoI did pay attention, and I saw noone serious think that would be legal to do
The biggest errors was not pushing harder against his first campaign, not pushing harder during the impeachments, letting Jan 6 go without another impeachment, and not calling out the billionaires helping his campaign with the intent to dismantle agencies that protect people, etc.
The SCOTUS appointments were big issues but due to the timing meaning they happened when dems lacked majorities there wasn’t much to do about them. Getting Trump out of the office is the only fix.
Only exception would’ve been SCOTUS reform immediately after Biden’s election when he had a majority, but the problem there is he couldn’t get enough votes for it


Biking or swimming