hello

  • 76 Posts
  • 150 Comments
Joined 9M ago
cake
Cake day: Jan 17, 2022

help-circle
rss


Norway is weird. Immediately after people voted overwhelmingly to separate from sweden, the norwegian parliament asked a danish prince if he would please move to norway and be their new monarch.

The prince was like, bro, are you sure you guys don’t want to be a republic now? So a couple months later they had another referendum in which 78% voted that, yes, they really wanted danish prince carl to be king… so he accepted. His grandson is still king of norway today.


Yeah, maybe Antony Blinken is actually right when he says it is in no one’s interest to confirm what happened to Nord Stream. 😱


On a computer that is online, you can say apt install --download-only foo to download (and not actually install) the .deb files for foo and its dependencies to the directory /var/cache/apt/archives/. You can then copy them from the online computer to the offline computer, and install them with dpkg -i *deb (assuming the debs are in your current working directory). Note however that apt on the online computer will only download dependencies which aren’t already installed. To force re-downloading of a specific package which is already installed, you can say apt install --reinstall --download-only foo.

Instead of downloading with apt install --download-only you could also find the download paths for individual .deb packages using https://packages.debian.org/foo and then download them using a browser.

You could also copy the contents of /var/lib/apt/lists/ (after running apt update) and the contents of /var/cache/apt/archives/ both to the corresponding locations on the offline computer and, if your sources.list files have the same entries, then you can offline install the things you’ve put in the cache folder using apt instead of dpkg.

Or, if you have lots of disk space, you can create an offline mirror of all (or some) of debian and point your sources.list file at a local file:/// source and then you can use apt like normal but completely offline.




If by “UNIX time” you mean store timestamps as seconds (minus number-of-leap-seconds, currently 27) since 1970-01-01 00:00:00 UTC, that epoch is still technically defined in terms of the christian epoch, and, worse, it is also defined in terms of UTC which wasn’t even really standardized until 1972 and which periodically needs to have leap seconds inserted by the Earth Rotation Service. At least they have a cool logo:

We should probably just admit to the aliens that we didn’t even have a very precise definition of a “second” until 3 BUE (Before UNIX Era) but then we can tell them about TAI64, TAI64N, and TAI64NA and Circular T and then they’ll see that we’re at least starting to get serious.

It will be much easier if we can manage to abolish daylight savings time before we have to explain that too.


Someday aliens are going to land, and everything is going to go just fine right up until we try to explain our calendar to them
also being discussed on [MeFi](https://www.metafilter.com/196651/I-guess-thats-unavoidable-if-your-rotations-count-per-orbit-is-a-prime) and [HN](https://news.ycombinator.com/item?id=32975173)

Then again there’s also “To each according to their ability” so…

(i’m not sure if you’re joking? but…) the slogan is actually From each according to their ability, to each according to their needs


see also: https://www.fandom.com/articles/star-trek-the-motion-picture-4k-directors-cut i don't see a 4k torrent yet but [here 🧲](magnet:?xt=urn:btih:4643BB3E1E075AFB35BC9E79031AE30F57391B2B&dn=Star.Trek.The.Motion.Picture.The.Directors.Edition.1979.1080p.BluRay.x265-RBG&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2970%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopentor.org%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2980%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2Ftracker.uw0.xyz%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce) it is in 1080p



maybe it depends on what you mean by “effective”, but generally, no.




After reading your post, my second thought (after my first thought, which was that’s disappointing) was to wonder what conference it was, what it was about generally, and who else was there. So, after spending a few seconds figuring that out (using a search engine that isn’t google, btw) I figured I’d save others the time by posting it here. HTH, HAND.




using premium requires logging in, which is essentially gifting them your behavioral data




the quote is actually a variation of something often attributed to Stalin via [Boris Bazhanov](https://en.wikipedia.org/wiki/Boris_Bazhanov)'s memoir: https://www.snopes.com/fact-check/stalin-vote-count-quote/


Gowron's side hustles
![Gloreo](https://lemmy.ml/pictrs/image/6f3e01bf-c41c-44e4-9d78-5b7a58642a94.png) ![Gowron Hubbard](https://lemmy.ml/pictrs/image/7742eefc-0549-47b2-9c6d-7571052d2a8d.png) ![Made of Honor](https://lemmy.ml/pictrs/image/59d6ac05-6a73-4482-99fd-6f9157a5079e.png) ![Gowron Law](https://lemmy.ml/pictrs/image/dbaf263c-7243-4f2d-a16d-e6c3f144c7f7.png) ![Gowron Real Estate](https://lemmy.ml/pictrs/image/2c3019ab-0bbe-42e1-860f-09ec8f8b7db3.png)


I have not said about metadata, but contested your claims of conflating security with phone number identifier causing lack of anonymity.

Huh? My first comment in this thread did not say anything about metadata or anonymity; it was (like the linked blog post) discussing the attack surface that comes with using phone numbers for authentication.

It was you that brought up both metadata and anonymity when you said this:

Wrong. Anonymity from your contacts or phone carrier or government is different from security of messages and metadata.

(emphasis added). Phone numbers are also terrible for those issues, of course.

do you think organisations like Riseup are also backdoored

I did not say signal is “backdoored”. I think their client and server software is most likely doing what they say it is, and Signal employees can probably honestly say they don’t retain any data that they could give to governments. The backdoors, if you want to call them such, are in the phone number based design and the choice of company (Amazon) that they rely on to keep the promises that Signal makes to their users.

My understanding of Riseup is that they own their own hardware, which puts them in a better category than Signal already. They also don’t require phone numbers. They do however use an invite code system to prevent spam/abuse, which they say they don’t retain a social graph from… but it isn’t clear to me how that system is actually useful to them if they don’t. Unlike Signal, Riseup is explicitly for activists, which makes me reluctant to recommend it. I don’t think it is intentionally backdoored and I think the people behind it mean well, but I think having a system explicitly for activists seems wrong as (1) it is a very attractive target and (2) merely using it can make you seem suspicious. The use of riseup has actually been cited as evidence of wrongdoing in an arrest warrant in Spain.


Signal’s “sealed sender” metadata protection is a farce.

Their use of phone number identifiers is a gift to police and other violent adversaries around the world, including those that amazon doesn’t cooperate with. When one person’s phone gets seized or otherwise compromised, that adversary gets a list of the phone numbers - aka strong selectors in intelligence lingo - of all of the victim’s contacts.

Signal’s initial growth was funded with millions of USD from the US government, ostensibly for use by dissidents in places like China and Iran. The former requires ID to obtain a phone number, and the latter requires fingerprints. Even people who support the US’s soft power efforts to aid dissidents in those countries should be disturbed by the promotion of the use of phone numbers for “secure communication” in those contexts.


so… a bunch of twilio employees had (and still have) exactly the capability that the attackers gained with this phishing attack. As do employees of Signal, Amazon, and various telecom companies, not to mention governments.

“Secure messenger” and “requires a telephone number” are not compatible concepts.




Yeah, this is interesting, and apparently based on some micro-sat company’s technology that SpaceX bought 1-2 years ago.

What makes you think that? I guess you’re talking about Swarm Technologies? I don’t think that is what the T-Mobile announcement is about though… it sounds like that network is for extremely low bandwidth sensors etc rather than something as big as MMS and other messaging apps.


Is there an xmpp client would you would recommend as a slack replacement? Some things which make slack popular include:

  • full history on the server
  • fast search (across all channels in an organization)
  • integration with lots of 3rd party services
  • the above features working smoothly on both desktop and mobile

As far as I know the free software viable slack alternatives currently are zulip, mattermost, rocketchat, and matrix (element). It isn’t that xmpp couldn’t do what slack does, but if there is a client that does I haven’t seen it.



* "The vast majority of smartphones already on T-Mobile’s network will be compatible with the new service using the device’s existing radio." * "Text messaging, including SMS, MMS and **participating messaging apps**, will empower customers to stay connected and share experiences nearly everywhere."