Skip Navigation

Posts
2
Comments
440
Joined
2 yr. ago

  • That's a pretty reasonable compromise, and probably explains my confusion.
    Why didn't you do the same for remote upvotes?

  • Then maybe it is still around on some instances?
    Either way, it is only a matter of time for another fediverse software to show downvotes, or someone to spin up a vote info page which gets its information via undisclosed legitimate fediverse instances so you cannot defederate them.

  • There is a "Reduces" tab on mbin, which shows downvotes

  • Your world does not correspond to reality given that mbin already shows individual votes.

    Head over to your comment on fedia.io and see who voted on your own comment.

    Do you want to only vote on instances that defederate all mbin instances, and commit to keep doing so in the future?

  • So the technical-skill-bar is transforming a lemmy link into the equivalent on an mbin instance? That is huge.

  • Every single (speak most) news outlet posted on this sub?

  • This is likely already priced in and the reason they aren't completely gone.
    What remains of Intel are their foundaries.

  • Careful, Google is currently forcing apps to migrate from SafetyNet to PlayProtect!
    SafetyNet is used by tons of security theater apps like banking 2FA. It is an API of play services.
    PlayProtect is basically the same but you have to talk to it though google play. This is a blatant move by google to make exactly what OP is suggesting impossible, and means that if you do this, you may soon see many apps break that you are forced to use.

  • Yes, those could be detected.
    Ill see how large that portion is on my system in a bit, but I would expect it to come out as the minority.

    Non-detectible ones I can think of rn:

    • Tab muting manager
    • VPN manager
    • link redirect skippers
    • stats printers, like a tab counter
    • dynamic shortcuts, like opening the archived version of the current page on archive.org
    • old reddit redirect
    • cookie managers

    Many more of the ones you listed won't be detectable on most websites.

    userscript managers (grease/tamper/violentmonkey etc.)

    A userscript manager is by definition detectible only on pages you define or install a userscript for. Even then, modern userscript managers like tampermonkey are running scripts in a separate scope that is completely sandboxed from the actual websites js context, you can't even pass an object or function to the website and access it there, it will fail.
    Youtube has actively fought some userscripts and failed, which they probably wouldn't have if those userscripts were detectible.

    User theme managers should be similar, but I can't comment on them as I don't use any.

    page translators

    Translators are only detectible when enabled.

    addons serving in-browser ads

    Why would you have an addon that serves ads?

    site-specific UI improvements (RES, SponsorBlock, youtube/SNS tweaks)

    Are site-specific, i.e. not detectible anywhere else

    privacy blockers (CanvasBlocker/JShelter/etc.)

    Please don't use those anymore, use only uBo. Same for uMatrix.
    uBo is pretty good about not being detected, for obvious reasons.

  • I found this is the only thing I found on a quick search.
    It would indicate that chrome does disclose addons (so maybe don't use it for yet another reason).
    For Firefox you can only look for changes typically performed by an addon, something like adblock should be detectible but networking layer stuff like an I2P tunnel should definitely not be.

    Most firefox addons dont even have the permissions needed to change anything a website could observe.

  • I don't see any extension info and I don't see how there could be any. There isn't any api for gaining this info in ff at the very least.

    There are other issues, but most extensions can in fact not be detected by websites, unless they specifically add something that makes them detectable.

  • TPM isn't all that reliable. You will have people upgrading their pc, or windows update updating their bios, or any number of other reasons reset their tpm keys, and currently nothing will happen. In effect people would see Signal completely break and loose all their data, often seemingly for no reason.

    Talking to windows or through it to the TPM also seems sketchy.

    In the current state of Windows, the sensible choice is to leave hardware-based encryption to the OS in the form of disk encryption, unfortunate as it is. The great number of people who loose data or have to recover their backup disk encryption key from their Microsoft account tells how easily that system is disturbed (And that Microsoft has the decryption keys for your encrypted date).

  • The default on android is to give every wifi network its own random but static mac.

  • What is the threat szenario?
    If you are smart about parallelization and have access to custom hardware, couldn't you turn 5 days into 1 hour or less?

  • Sonic's googles

    Jump
  • Neon Genesis Sonic

  • Firefox+PlasmaWayland+SystemD+portage+GNU+Linux

  • The problem is "indistinguishable" levers.
    In the strict sense, if there was a lever you could see first, they would not be indistinguishable. They should not be distinguishable by any property including location

  • Consensus is probably not.

    • We don't have transition forms
    • We probably have young Torosaurs (which are not Triceratops)
    • Holes in the skull would have to form atypically late for ceratopsidae
    • some other stuff I forgot
  • My favorite dinosaur is Plesiosaurus.

    What are you gonna do about it? >:)