All of this user’s content is licensed under CC BY 4.0

  • 21 Posts
  • 27 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle
  • What I like about the Gadsden flag, as opposed to this one – according to how I interpret it, anyways – is that it advocates for the use of one’s voice before violence. The main symbol on the Gadsden flag is a timber rattlesnake. If you think about such a rattlesnake in nature, when you get too close to them, or provide them with a reason to feel wary, or uncomfortable they won’t immediately attack you, but will instead provide you with an auditory, nonviolent warning. It’s only when one ignores their warnings, and continues to harass the snake, or give them a reason to think that they are under immediate threat of harm that they will fight back, and will not hesitate to do so. In all other circumstances, the rattlesnake will mind it’s own business, and let you do the very same. I find this behaviour admirable of a creature, and it is, in my opinion, the true ethos of libertarianism. The Canada goose, on the other hand, won’t hesitate to harass you. they will routinely attack people just relaxing in a park. They provide little warning to someone that they find threatening, and will often choose to immediately strike out. This is not behaviour that should be emulated, or admired, in my opinion.




  • I’ve found that the only way to dual boot reliably is to have windows installed on a separate, dedicated drive, and to keep all drives used by Linux air-gapped from the windows drive. Fast start and hibernate must also be disabled within windows to prevent it from putting hardware in an undefined state.

    That being said, I haven’t actually found any regular use for the windows install in years. mostly just keep it around as a sort of backup failsafe, or just in case there is a game that refuses to work in Linux. 99 times out of 100 it simply just collects dust.








  • Flatpak – It’s not without it’s own issues, of course, but it does the job. I’m not fan of how snaps are designed, and I don’t think canonical is trustworthy enough to run a packaging format. Appimages are really just not good for widespread adoption. They do what they are designed to do well, but I don’t think it’s wide to use them as a main package format.












    1. Would you be able to ellaborate on the following

    matrix stores your profile info

    group membership

    ongoing conversation in plaintext

    As I am not exactly sure what you are referring to.

    1. In addition to metadata that matrix doesn’t encrypt

    I’m assuming that this statement is referring to what was said here:

    On the other hand, matrix stores your profile info, group membership, and ongoing conversation in plaintext, some of them replicated across homeservers


  • Hm, I have trouble trusting any information on that site for a number of reasons:

    1. They don’t seem to grasp the concept of a federated service, and how that plays a role with “Matrix”. As stated on this page, under “Riot/Element”:
    • There have been no code audit and an independent security analysis, and hence we must take Element’s word. No one can mark his own homework.
    • Matrix has had at least one embarrassing security breach, indicating that their infrastructure security is lacking.

    They seem to be referring to “Matrix”, and “Element” interchangeably which doesn’t make any logical sense as “Matrix” describes the underlying federation protocol, and “Element” one of many clients that exist. This line of thinking can also be seen in the comparison table; the column title is “Element/Riot”, and yet much of the data contained in the table is referring to things related to the protocol.

    1. Furthermore, it should also be noted that the quote in point #1 is complete misinformation, and blatantly false (it should also be noted that this information is repeated elswhere, including the comparison table). Firstly,

    There have been no code audit and an independent security analysis, and hence we must take Element’s word. No one can mark his own homework.

    Ignoring that they say “Element”, and, instead, assuming that they intended to say “Matrix”, from what I can see, there are at least two independent audits that have been done – their respective information can be found on the blog posts here, and here. and secondly,

    Matrix has had at least one embarrassing security breach, indicating that their infrastructure security is lacking.

    Ignoring the fact that this statement makes no logical sense since “Matrix” is a protocol, and therefore the idea of a “security” breach does not even apply, I’m going to instead assume that they are referring to the home-server “matrix.org”. The security breach I’m assuming that they are referring to is described in the blog post here:

    TL;DR: An attacker gained access to the servers hosting Matrix.org. The intruder had access to the production databases, potentially giving them access to unencrypted message data, password hashes and access tokens.

    I’m not entirely sure what the author was insinuating, since this is just something that affected the matrix.org homeserver and no one else, and has absolutely nothing to do with the security of the protocol on the whole. The only important thing with this is whether or not the retrived unencrypted data (ignoring the messages) has any affect of compromising the security of the user – this author, unfortunately, makes no effort to explore this idea, and just moves on.

    There are plenty of other discontinuties that can be picked apart from this person’s site, but these were the most immediately glaring.









  • I don’t really understand this reasoning. Some server would still need to receive those requests at some point. Would it not be better if those requests were distributed, rather than pounded onto one server? If you have a server caching all the content for its users, then all of its users are sending all of those requests for content to that one single server. If users fetched content from their source servers, then the load would be distributed. The only real difference that I can think of is that the speed of post retreival. Even then, though, that could be flawed, as perhaps the source server is faster than one’s host server.