wanderingmagus

joined 1 year ago
[–] [email protected] 5 points 5 months ago (1 children)

But art, depending on your definition of art, has been sold for thousands of years. Even in Archaic Greece, potters were selling amphorae with intricately painted glazing on the side.

[–] [email protected] 5 points 5 months ago (3 children)

Linux Mint and Zorin OS work out of the box for most users. Usually the most complicated part is just the installation process (which can be an absolute pain if the starting system has Intel RST, Secure Boot and Fast Boot all enabled). Of course, more advanced users always can run the risk of breaking something (I accidentally broke my system irreparably at one point when I did a dumb and formatted my Swap for some reason and had to reinstall) but that's also true of Windows.

[–] [email protected] 4 points 5 months ago

It's not necessarily just about the government. Built-in backdoors also give malicious actors more ways to access your own private information, whether to steal your identity, transfer money out of your bank account, use your credit for loans, or blackmail you. Also, other governments already use your online speech to arrest you for saying things they don't like - see China or Russia. Many EU countries are only one election away from having a government that goes in that direction already. This is only going to make it that much easier for them.

[–] [email protected] 1 points 5 months ago

https://cdn.netzpolitik.org/wp-upload/2024/06/2024-05-22-Recommendation-HLG-Going-Dark-c.pdf

  1. Implementing lawful access by design in all relevant technologies in line with the needs expressed by law enforcement, ensuring at the same time strong security and cybersecurity and providing for the full respect of legal obligations on lawful access. According to the HLG, law enforcement authorities should contribute to the definition of requirements, but it should not be their role to impose specific solutions on companies so that they can provide lawful access to data for criminal investigative purposes without compromising security. To that end, experts recommend developing a technology roadmap that brings together technology, cybersecurity, privacy, standardisation and security experts and ensures adequate coordination e.g. potentially through a permanent structure.
  2. Ensuring that possible new obligations, a new legal instrument and/or standards do not lead, directly or indirectly, to obligations for the providers to weaken the security of communications by generally undermining or weakening E2EE. Therefore, potential new rules on access to data in clear would need to undergo a cautious assessment based on stateof-the-art technological solutions (which should in turn consider the challenges of encryption). When ensuring the possibility of lawful access by design as provided by law, manufacturers or service providers should do so in a way that it has no negative impact on the security posture of their hardware or software architectures.
  3. Enhancing EU coordination and support to address situations where technical solutions exist to enable lawful interception but are not implemented by providers of Electronic Communications Services. In such cases, for example when home-routing agreements or when specific implementation of Rich Communication System (RCS) do not allow lawful interception capabilities, clear guidance and a dialogue facilitated at EU level would improve the cooperation with Electronic Communications Services.
  4. Conducting a comprehensive mapping of the current legislation in Member States to detail the legal responsibilities of digital hardware and software manufacturers to comply with data requests from law enforcement. It would also take into account specific scenarios and requirements that compel companies to access devices, in compliance also with CJEU caselaw and case law of the European Court of Human Rights. The goal should be to develop an EU-level handbook on that basis, and depending on the aforementioned mapping, to promote the approximation of legislation within this area, and to develop binding industry standards for devices brought to market in the EU, to integrate lawful access.
  5. Establishing a research group to assess the technical feasibility of built-in lawful access obligations (including for accessing encrypted data) for digital devices, while maintaining and without compromising the security of devices and the privacy of information for all users as well as without weakening or undermining the security of communications. Recommendations from the High-Level Group on Access to Data for Effective Law Enforcement, Council of the European Union, 22 May 2024, pp. 23-24.
[–] [email protected] 2 points 5 months ago

Veilid is a peer-to-peer network and application framework released by the Cult of the Dead Cow on August 11, 2023, at DEF CON 31.[1][2][3][4] Described by its authors as "like Tor, but for apps",[5] it is written in Rust, and runs on Linux, macOS, Windows, Android, iOS,[6] and in-browser WASM.[7] VeilidChat is a secure messaging application built on Veilid.[1][4]

Veilid borrows from both the Tor anonymising router and the InterPlanetary File System (IPFS), to offer encrypted and anonymous peer-to-peer connection using a 256-bit public key as the only visible ID. Even details such as IP addresses are hidden.[4]

Source: https://en.wikipedia.org/wiki/Veilid

[–] [email protected] 4 points 5 months ago (2 children)

Poe's law strikes again, you forgot this: /s

[–] [email protected] 1 points 5 months ago

The military, among both officers and enlisted, is actually pretty split politically, and a good number can and will refuse to obey an order they perceive to be unconstitutional, or outright commit mutiny. For all that the military warns about insider threats, it is also woefully unprepared to deal with them as well. Military servicemembers are also significantly stricter with the use of deadly force than police from my experience, although that may simply be due to my having served in the SSBN force.

[–] [email protected] 2 points 5 months ago (1 children)

You "need" them because the society we live in is built around them. It's the same reason you are forced to learn how to mask - you "need" to mask to survive, to put food on the table, to have a home and a bed to sleep in. This world is commanded by the manipulators, shaped and molded by the manipulators, and if you don't have the skills to swindle your drop of money in the form of a grant in research or investment into your company, your project just dies. Everyone hates it (except the manipulators), but that's just how things are at the moment.

[–] [email protected] 3 points 5 months ago

SearXNG works all right for me, and it's free. I've also heard good things about the paid service Kagi.

[–] [email protected] 2 points 6 months ago

Looks at Saudi Arabia, Iran, Afghanistan, etc

[–] [email protected] 3 points 6 months ago (1 children)

So why do locks exist, if society runs on how people should behave? Why do we have a court system, if we assume no crimes will ever be committed? Why do we have laws?

[–] [email protected] 2 points 6 months ago

Don't know how it's going to go for you, but Mint has been going really well for me gaming-wise on an Alienware with Nvidia RTX. Pretty much all the Steam games I care about work, and all my Blizzard games through Lutris. All through simple GUIs, and if you like the Windows feel and setup, there's a Windows 10 theme you can try out, and tutorials on how to get a Windows style mouse cursor too. Again - all up to you, but it worked really well for me and is amazingly customizable. Just... remember to do Timeshift backups regularly, just in case. You never know if you'll need one.

view more: ‹ prev next ›