[-] VexCatalyst@lemmy.astaluk.icu 48 points 1 year ago

The only stupid question is the one you don’t ask.

First, I don’t like calling proprietary software “official”. Proprietary software is just software with closed source code. What makes something official is someone deciding “OK, this is what we are going to use” or that it definitely came from a particular source. Getting Docker directly from Docker repositories rather from a distributions repository for example.

My general take is if FOSS can do the job, I use FOSS. If FOSS can’t do the job I need, then I will go with the best proprietary solution to my problem. If I go with FOSS, I tend to prefer using the repository of the project in question rather than my distributions repository. The projects repository tends to be more up to date and there are fewer opportunities for ba actors to play with the code. Downside is that these repositories may introduce changes that may bork your OS when/if you upgrade to a newer major version. FlatPacks and AppImages help to mitigate this.

Hope that helps.

[-] VexCatalyst@lemmy.astaluk.icu 5 points 1 year ago

Last I’d heard, even the NSA hasn’t been able to find an encryption that is quantum safe. And the some of the one they had found were broken using traditional computers. I strongly suspect that your messages will remain reasonably private for at least the next decade or two.

[-] VexCatalyst@lemmy.astaluk.icu 25 points 1 year ago

Fax isn't encrypted. What keeps it alive is just inertia.

As for why your insurance company won't take emailed photo, that probably has more to do with whatever system your insurance is using for their backend.

Email content can be end to end encrypted by GPG and S/MIME as well as through a few other standards. Email in transit can be (but not always is) encrypted via TLS.

The reason encryption is not default is because (I think) of backwards compatibility. E-mail originated at a time when almost nothing electronic was ever encrypted, including the username and password you used to log into a system with. Most of the encryption we use of today has simply been "bolted on" to standards that were already in place at the time and it did take a few tries to get it right.

When the internet was first getting started, few people, if anyone, thought it would become as invasive (possibly the wrong word) as it has become. Everyone on the net knew each other. They were friends, why would they ever need to hide anything from each other. /s

That and the early systems couldn't really spare the processing power for encrypting and decrypting things.

[-] VexCatalyst@lemmy.astaluk.icu 6 points 1 year ago

That's about right. The matrix protocol, while quite big on protecting messages, is not quite so worried about the metadata. This can be minimized if both users are from the same server.

Whether the metadata leakage is important depends largely on your threat environment.

As for Signal not having anything to be able to hand over... I'm not sure I take them at their word. That may just be me though, I'm a distrusting bastard.

[-] VexCatalyst@lemmy.astaluk.icu 33 points 1 year ago

Not familiar with the site, but it sounds like some one uploaded something directly related either to WMDs or the manufacture of drugs. Otherwise I suspect they would have used the provisions related to copyright infringement.

Knowledge related to both are publicly available, and the tech is simple enough that even a southern high schooler could build something truely nasty, but if it is too directly related…. Well, the people that do the day to day work of the government aren’t completely stupid. The best they can do, though, is try to keep the knowledge out of sight, out of mind.

[-] VexCatalyst@lemmy.astaluk.icu 15 points 1 year ago

Well, first thing, you should read “allow list” as “federate ONLY with these instances”. Block list is the opposite of that, “DO NOT federate with this instance “.

Try removing everything from your allow and block lists and see what happens.

[-] VexCatalyst@lemmy.astaluk.icu 5 points 1 year ago

I think the OP is looking for something remote hosted.

[-] VexCatalyst@lemmy.astaluk.icu 6 points 1 year ago

Probably, though you may have to dig to find them. Lemmy is rapidly becoming like Reddit in that if something exists, there is probably a community for it. If your local search doesn't bring anything up, I would check on lemmyverse.net. It seems to have indexed most if not all of the current communities. A quick search just now for "liberta" pulled up roughly 10 communities.

[-] VexCatalyst@lemmy.astaluk.icu 7 points 1 year ago

As far as I know, there isn't an account migration mechanism in Lemmy yet. I've heard (fourth hand at best) that it is in the works but hasn't been implemented yet. You may have to do it the hard way. Copy, paste and search.

[-] VexCatalyst@lemmy.astaluk.icu 6 points 1 year ago

Drama surrounding the .ml TLD.

Honestly, I'm a little suprised lemmy.ml is still up. lemmy.fmhy.ml has already gone down. This was what lead to me standing up my own instance.

[-] VexCatalyst@lemmy.astaluk.icu 23 points 1 year ago

Incredibly stupid question, but, if she was charged and convicted of this, wouldn’t she have to register as a sex offender? That would be rather amusing.

[-] VexCatalyst@lemmy.astaluk.icu 7 points 1 year ago

Following that link directly is giving me a server error, and it doesn't bring anything except up in search except your comment. Is there a particular way I'm supposed to use it?

88
Hello-world.sh (lemmy.astaluk.icu)

<tap, tap, tap> Is this mic on?

With the loss of lemmy.fmhy.ml I decided I would add a Lemmy instance to my virtual server rack. This is a test send as much as anything.

First thoughts... The documentation and the example configs could possibly be a bit clearer. Not sure how I would reword them though. Also, there has got to be a better way for a smaller instance to begin seeing communities than browsing lemmyverse.net and then manually searching for the communities from your new instance.

view more: next ›

VexCatalyst

joined 1 year ago