if the developer was unaware of this risk, they were very naive
Well, their security audit didn’t seem spot the risk…
Seriously, though, are you condoning someone being arrested for publishing software?
A buyer should be as much as possible anonymous, but a seller should not
GNU Taler is a payment system built on this philosophy
huh? you can torrent a snapshot of the whole thing, and people all over the world do.
in a post-internet world there will be lots of wikipedias. it would be really nice if they manage to fix their data model to use a DVCS before the collapse, to make it easier to do merges between the different forks, but even if they don’t… wikipedia will live on. (As will the factoid that Alan MacMasters invented the electric toaster…)
i don’t think apple’s “Find My” network is a mesh per se as all of sensing devices (iPhones) connect over the internet to Apple. they don’t repeat others’ messages between eachother, they just emit their own beacons and while relaying everything they hear to apple (along with the finding device’s location, encrypted to the beacon pubkey).
If you want to play with it checkout https://github.com/seemoo-lab/openhaystack which apparently lets anyone send beacons into the system without Apple hardware. I don’t think you can communicate arbitrary data over it, though, as the airtag-like device just broadcasts public keys. The encrypted location that is sent to apple is actually from the finding device. Also, you need a Mac to retrieve data from the system; presumably they rate limit fetches based on some dystopic trusted computing that macs all have now.
Happy Sysadmin Day today to all Lemmy instance operators! Thanks for keeping things running.
These instances are not only slow, they also sell their user’s information.
I’ve long wondered about this regarding alternate frontends for big sites in general, but especially about the youtube frontends like piped and invidious which must require substantial resources to operate (though sometimes they’re serving the video data itself directly from google, sometimes they’re actually proxying it too)… but, I’ve never seen any evidence of it. Have you?
In any case, many of the popular instances are running on Microsoft or Oracle clouds, and/or Clownflare, so, from a privacy standpoint it isn’t really much different than Google. I use them occasionally in Tor Browser just because they’re less likely to be blocking a Tor exit than youtube proper is.
it’s the “simple” corruption of the “one weird trick” format
use cryptography, for decentralized identities and content addressability.
the “fediverse” is ostensibly decentralized but that actually just means it has more single points of failure than the centralized model it is attempting to replace. (a failure doesn’t necessarily take the whole thing down, but, “federated” generally means there are more people and systems which could individually prevent information from flowing from point A to B; eg, I can’t message someone on another server if my server is down or if their server is down.)
Secure Scuttlebutt has a much better data model but is doing other things wrong so I haven’t used it much. Maybe Twitter’s Bluesky thing will produce something good, but I’m not holding my breath. What is clear is that ActivityPub is not a good long-term answer (but it is fun today).
Yes, it would change my armchair not-a-lawyer-but-i-play-one-online legal opinion. If there is evidence that he was (knowingly) hired to write the software by people who were planning to violate laws using the software, then it is not as much of an open-and-shut first amendment case (assuming they’re planning to extradite him to the US…).
Indeed. Which is why your assessment of his arrest should not be based on the assumption that that is what happened.