It seems more important to ensure Larry Ellison’s good behaviour than Joe Schmoe’s. Ellison is able to be far more destructive. Maybe some surveillance at Oracle HQ could help.
It seems more important to ensure Larry Ellison’s good behaviour than Joe Schmoe’s. Ellison is able to be far more destructive. Maybe some surveillance at Oracle HQ could help.
My mom has quite severe hearing loss but is not totally deaf. She uses TV captioning and generally can’t tell whether the TV sound is on or off. I generally want it to be off because it is annoying, so when she leaves it on by accident, I just shut it off and she doesn’t notice or anyway doesn’t care.
If only there was a way to communicate without videos. The Mesopotamians had something like that but the technology was unfortunately lost.
Look on Starlink.com. I don’t expect it’s much worse than your typpical evil ISP or phone caerrier in terms of privacy. Certainly you could route everything through a VPN and that might help a little.
Edit: oh wait, I confused this thread with a different one when I looked at my inbox. Starlink is a high speed service with a roof antenna. For satellite phone stuff, look at https://skylo.tech.
I’d either get an older model for cheap, or get a 9 because of the satellite capability. I wonder if GrapheneOS supports the latter, and for that matter whether it supports the 9 at all yet.
Nobody intentionally creates vulnerabilities, but more complicated software is more error prone and therefore more likely to be vulnerable. Fast release cycles also get in the way of good testing. The most complicated piece of software on most phones is the web browser, and its complexity is imposed by the web and its advertisements, rather than by what the user wants or needs.
IOS and Android face pretty much the same issues on the OS developer and phone manufacturer sides. Therefore, the IOS and Android worlds could both clean up their acts in about the same way if the incentives were right. That they don’t do so might be a bad situation that we have to cope with, but we shouldn’t pretend that it is a good situation.
I wonder what apps require IOS 16 in some meaningful way. I know there is a situation with Android apps requiring OS upgrades unnecessarily.
Why do companies like McDonalds want you to run an app anyway, instead of e.g. using a web page? There are a few sites or products where I currently give up the equivalent of a french-fry discount rather than run their stupid app. It’s just a minor annoyance so far, but it doesn’t make sense to me. Do those apps usuallly keep running the background so they can track you, or what?
Those security vulnerabililties are because of buggy old software, and updating the software in the old devices does as good a job of fixing the vulnerabilities as selling you a new device does. A significant e-waste tax on every new device, accompanied by credits for keeping old devices working, might help with that. Anyway, if it’s an app (rather than OS) vulnerability and you can’t fix it with an update because the new version of the app requires a new OS, that’s mostly likely an app that you don’t need to use. I’m getting by ok with F-droid apps instead of Play Store apps, for example.
Best still would be to debug the software before shipping it, so it wouldn’t have those vulnerabilities in the first place. There are various forces that get in the way of that, but a significant one is that web development is now driven by delivering more advertising rather than useful information to the user.
I wasn’t aware of the USB-C adapter with pass through charging, but still, it’s extra crap plugged into your phone. Yes I have a Moto G series phone which is Motorola’s budget to low-midrange line. It has a headphone jack and it is full size. Flagship phones have a few more features but none seem important.
The laptop (Thinkpad X220) that I’m using is much older than the iphone 7 and it runs current Debian just fine. Lots of people are running current LineageOS on similarly old Android phones. Why can’t the phone vendors do the same? Planned obsolescence doesn’t change by wrapping it with nice marketing words.
I have figured that if I needed to get an iphone for some reason, it would be a 6+, since that is the last version with a headphone jack (similarly for Pixels, it would be a 4A). But I guess that strategy won’t work any more.
They need “This show depicts stupidity” but they will never have it.
Interesting. Cost is also very important for large scale deployment of course. I wonder if this stuff can become competitive in $ per watt with the current silicon cells.
This exact same thing happened with the very simple ELIZA chatbot back in the 1960s. Joseph Weizenbaum (ELIZA’s author) wrote about it in his book “Computer Power and Human Reason”. He was shocked and scared. He had written ELIZA as a cute demo, and people treated it as if it were human.
Never heard of U-prove but for what you are asking, is FIDO2 similar?
Your public key block is a cumbersome thing and it’s enough to just append its fingerprint, if you consider email to be trusted against forgery but not against eavesdropping. The other person can then use the hash to authenticate your key that they get some other way (or they could just ask you to email it).
Back in the day, lots of nerds would have their PGP key fingerprint (32 hex digits) printed across the bottom of their business cards. So if someone got a card in person, they could use the fingerprint to authenticate a key that they later received by email.
Your post doesn’t ask about signing your emails without a good reason, but some commenter seems to think you are asking about that. That can be good, bad, or both, since it means that anyone who gets a copy of the message, including attackers, can now authenticate that the message came from you. Anything that gives attackers capabilities that they didn’t already have, must be examined critically. Dan Bernstein came up with an clever authenticator scheme designed to prevent this exact attack, but PGP doesn’t implement it and I actually don’t know of any software that does.
Finally, at least some of the old-time PGP community now thinks that PGP solved, to some extent, the wrong problem. It not only made no attempt to conceal metadata, but it actually advertised it, in the form of key servers and key signatures connected with keys. Even if the attackers couldn’t read the encrypted messages, they could still tell who was talking to who, which is almost as bad. Remailer and broadcatch systems tried to solve this, with mixed success. A quote by cryptographer Silvio Micali has stuck with me for a long time: “a good disguise does not reveal the person’s height”. I.e. don’t just try to conceal the message contents from attackers while letting them collect other information. Rather, don’t give them ANY information.
It’s possible to get rather “Spy vs Spy” about this type of stuff but it can help you think about security. As always, “Security Engineering” by Ross Anderson is a fantastic book if you’re interested in the general topic of how to be paranoid. Or to quote the proverb, it’s not paranoia if they really are out to get you ;). The book is here, 1st and 2nd editions downloadable as pdfs: https://www.cl.cam.ac.uk/~rja14/book.html
These days all those closed containers are virus spreaders so better to fly and get less exposure time. Wear an N95 either way.
In the old days I did some long bus and train trips and it wasn’t so bad unless there were noisy or otherwise annoying people on board. Basically bring a long book to read, sleep when you can, and enjoy the scenery when there is something to look at. A travel pillow can be a help, and also warm clothes or a blanket. On international trains (EU) you can meet interesting people too.
Email and sometimes irc. And old fashioned sms when needed.
Reed to T’Pol: “I was always rather fond of the name Stinky”.
So long, Intel.
Lol, AI firms trying to devour the entire internet for training data, discovers that it needs a way to ensure that it doesn’t train on its own output. So it pitches credentials as something to fight AI rather than to mark non-AI data as delicious for ingestion.
Spoiler: Xiaomi is #1 now.