Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)UW
Posts
41
Comments
748
Joined
2 yr. ago

  • I think crypto can achieve stability, not by pegged to a fiat currency but commodity backed. There are also mechanisms and algorithms that can confirm transactions without using excessive energy, be fast, and private all in the same time. I still think crypto have a future. Yet I don't know how far that future is, but for now I will stay away from it as far as I can.

  • No as it's not point to point. It involves an intermediate party to broker the transaction. Think that like a bank. You need to apply for one, which most likely involves KYC. Taler is designed such that the recipient is known, for tax purposes they claim.

    In contrast, AFAIK crypto can be P2P, only involving the blockchain and miner/validator that don't know you. That's what not Taler try to do.

    EDIT: Add correction to crypto description.

  • Restic. You just need a s3-compatible object store in k8s to make it work. All else is handled by the client. That's what I used (not with k8s), with resticprofile.

    I also heard Borg is a great alternative, but never try personally, nor how it works. Both are CLI only I believe.

  • Oh for sure. They will appeal, apply for "stay of execution" to suspend the judgement claiming this will degrade its operation capability and contray to public interest, and drag this into a legal battle until they win.

  • Or connect to a VPN all the time so you appears "not in the same netowork." Still, being an app menas it can just collect the WiFi name and cell tower ID to map our your social connections.

  • Permanently Deleted

    Jump
  • A French and Dutch Joint Investigation Team (JIT) harvested more than 115 million supposedly encrypted messages from an estimated 60,000 users of EncroChat phones after infecting the handsets with a software “implant”.

    Looks like they just hack the phone

  • Permanently Deleted

    Jump
  • Yes, but we are not auditing security or cryptography implementation.

    Instead, the goal is get a sense how it works, and look for suspicious codes or have if parts hidden (encoded) and doesn't want people to know. That's relatively way easier than a serious audit.

  • Permanently Deleted

    Jump
  • I'm not going to tell you what to use instead, but how you make the judgement for yourself: audit the code yourself

    The source code is linked right there, and you don't need trusting someone to make the call. You're making the call. Mind you, the actual add-on installed from Mozilla Add-Ons might contains different code then what shown in the repo. I never release any add-ons so that is just a wild guess and a hint possibility this could happen.

    To give you an head start: look for URLs and any encoded strings in all files, be it Base64 or something else. And follow them to find out why there it is there, how is it triggered, etc. Same goes for encoded strings with the added question: what was encoded within.

    Still, that is just the basic, and I'm not too into JavaScript but there could be other ways of hiding information, like in an image file via steganography.