Posts by peexea@fosstodon.org
(DIR) Post #9wa2P2HHbWANZPRXpA by peexea@fosstodon.org
2020-06-29T14:38:05Z
0 likes, 0 repeats
@tolstoevsky очень мило, но есть важное "но":Так называемое состояние (типа 139 миллиардов у Безоса) - это не деньги. Это, фактически, оценочная стоимость доли в компании. Грубо говоря, если вы хотите иметь такой контроль над амазоном, как Безос, вам придётся заплатить 139*10^9$.Контроль стоит много денег - это правда, но неверно считать, что сам по себе он имеет ценность. Более того, этот " контроль" неликвиден и неудобен для "простых смертных".
(DIR) Post #9wa2P2dcGU1ygftNdQ by peexea@fosstodon.org
2020-06-29T14:47:09Z
0 likes, 0 repeats
@tolstoevsky дисклеймер:Я ни в коем случае не оправдывают существующее социальное неравенство, но хочу заметить, что эта инфографика некорректна, т.к. сравнивает величины (деньги и активы), которые нельзя сравнивать без учёта их внутренней природы.
(DIR) Post #9werx7ysmKlvOmgqFU by peexea@fosstodon.org
2020-07-02T00:05:51Z
0 likes, 0 repeats
@sir you know, that's a very strong statement. Why is it "lees secure that not using it"? Without futher explaination it sounds like "<your_favorite_privacy_abuser> is more secure than a tool which at least _have_ privacy features" yes, protonmail's security model is very questionable, but it is still better than gmail.
(DIR) Post #9wetG4OaQuwNjdJDzE by peexea@fosstodon.org
2020-07-02T00:19:40Z
0 likes, 0 repeats
@sir BTW, signal is a non-profit organisation, so "want to sell you smth" sounds very unreasonable.
(DIR) Post #9wetfcPl5Z3yTy2WjA by peexea@fosstodon.org
2020-07-02T00:24:35Z
0 likes, 0 repeats
@sir and what? They know, who I am. They can say, that I am yousing their service. What else?
(DIR) Post #9weu8KeAEAENm6TAJ6 by peexea@fosstodon.org
2020-07-02T00:28:38Z
0 likes, 0 repeats
@sir @Kimba and that's the signal case. If you don't want to reveal you phone number, use wire, or wait till the end of the year. IFAIK, signal had started migrating from phone verification to sonething else.
(DIR) Post #9weuUCBgMN9xuRZZAm by peexea@fosstodon.org
2020-07-02T00:30:01Z
0 likes, 0 repeats
@sir do not mix privacy and anonymity, it's not the same.
(DIR) Post #9weujB7uaP8gxlxAm0 by peexea@fosstodon.org
2020-07-02T00:33:29Z
0 likes, 0 repeats
@sir well, if you want protection from contact tracing, you have only one variant: closed f2f networks. Provided, you connect only to unknown nodes, so your mail of IM will be transfered through multiple relay nodes.
(DIR) Post #9wfDte45kNQAjrs4MS by peexea@fosstodon.org
2020-07-02T00:47:42Z
0 likes, 0 repeats
Partially, but I've read it.OFK, p2p (and, even more, f2f) is more private, but, man, it is different usecase.Yes, federative messaging is far better than centralised servers - totally agree.We do not have a federated IM know. At least that is used not just by authors and their friends.
(DIR) Post #9wfDteuYbJO9MaPy8f by peexea@fosstodon.org
2020-07-02T00:52:53Z
0 likes, 0 repeats
Maybe, I was not very good at explaining myself, so again.1)Signal protocol itself is quite good from crypto point of view.2)There *are* several quastionable design desitions in signal itself which can significantly reduce your privacy.3)We should you the best tool we have *so far* and, well, xmpp+otr does not fullfill my expectations from a IM tool.Except the abovementioned xmpp+otr I don't know any IM tool with comparable cryptographic abilities.
(DIR) Post #9x9chVa7mxNIY7xfrk by peexea@fosstodon.org
2020-07-16T20:08:52Z
2 likes, 1 repeats
When speaking about computer busses, terms "master" and "slave" sounds inappropriate.Maybe, we'll change it to "dominant"(dom) and "submissive"(sub)?IMO, it explains the idea of relations between bus units more clear than other alternatives.
(DIR) Post #9zP2bDaf23dQaus3uK by peexea@fosstodon.org
2020-09-21T23:48:05Z
0 likes, 1 repeats
@grainloom from linux mailing list:"There is a strong belief that standards are something that people follow."
(DIR) Post #9zeTZl9f5R0ftwLMUC by peexea@fosstodon.org
2020-09-29T13:05:11Z
0 likes, 0 repeats
TL;DR: do not use torrents. Anyone can see, what you are downloading or seeding.Don't believe me?Check this: https://iknowwhatyoudownload.com/#privacy #torrent #surveillance
(DIR) Post #9zeYIfQDeEbmy7l0XA by peexea@fosstodon.org
2020-09-29T14:03:26Z
0 likes, 0 repeats
@Matter To be secure, we need to use not peer2peer but friend2friend sharing systems, as they do not leak any information outside the "first hop".
(DIR) Post #9zebkSEUZu7K2BDJ0i by peexea@fosstodon.org
2020-09-29T14:41:50Z
0 likes, 0 repeats
@Matter @wonderingdane well, the herd security model is surely secure in average, but sounds dangerous and unpredictable for a specific user.F2F model with turtle rooting gives essentially the same discoverability and similar maximum download rates. But doesn't leak any information.)
(DIR) Post #9zecUtqeEkI10ECvgm by peexea@fosstodon.org
2020-09-29T14:50:26Z
0 likes, 1 repeats
@Matter @wonderingdane theory: A Generic Data Exchange System for Friend-to-Friend Networks by Cyril SolerImplementation: Retroshare https://retroshare.cc/
(DIR) Post #9zevV5iC1hMyvU3d7A by peexea@fosstodon.org
2020-09-29T13:07:50Z
0 likes, 0 repeats
More over, they are offering spying links:
(DIR) Post #A6jAxsNAAtXYja249o by peexea@fosstodon.org
2021-04-29T04:42:00Z
0 likes, 0 repeats
@TheFuzzStone Personally, I prefer CryFS for that purpose.
(DIR) Post #AQhmtYIusZ1YZ46bmS by peexea@fosstodon.org
2022-12-17T17:42:31Z
1 likes, 2 repeats
For me one of the biggest disadvantages of proprietary software (and hardware!) is the fact, that maintainance and support for a given produced can be terminated unilaterally (remember planned obsolescence), leaving users in stalemate.Imagine, there will be some law, that will obligate the companies to either support and maintain their closed source product or stop maintaining it and release the code. What do you think? Will it help our society?
(DIR) Post #AQhmtaL7JLyMsT9OUK by peexea@fosstodon.org
2022-12-17T17:43:04Z
0 likes, 0 repeats
Some may say, that such releases will affect the intellectual property, that is still in use in new products.That's true, but I have a solution for it:The company can divide the product into a set of libraries. They are required to open-source only those libraries, that are no longer supported. The still-in-use libraries, while being closed source must remain compatibile with the already OSed ones (otherwise the last compatible version should be opensourced).