Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)R
Posts
6
Comments
2176
Joined
2 yr. ago

  • TL;DW Mind your OPSEC, and AIs aren't magic. It can only find what information you willingly give up in the first place.

    The authors of this paper also refuse to publish their exact testing methods "for safety."

  • Those benchmarks compare Wine NTSYNC against upstream vanilla Wine, which means there's no fsync or esync either. Gamers who use fsync are not going to see such a leap in performance in most games.

    If you're using lutris or proton/etc., you're probably already using esync/fsync.

  • My bet would be ulterior motive.

  • techlore has burned bridges with every group/platform they have attempted to partner with

  • Linux is not an operating system, it's just the kernel and has no concept of users/accounts or logging in to anything.

    A great many Linux-based distros ("operating systems") are not under US jurisdiction.

  • I have to yet to find any fingerprint-evading solution that works on Linux and can actually beat creepjs reliably... besides disabling javascript completely, which puts you in a whole new (much, much smaller) set of people that can still be fingerprinted with non-JS solutions including html/css/header methods as well as TLS fingerprinting like JA3/JA4.

  • It still works, you just have to provide a unique user-agent. There's also x0.at which has a web upload form as well.

  • It doesn't, pretty sure the repo is a joke. Their code doesn't do anything special, just runs the program you give it.

  • Yep, the project must be a joke because the code doesn't actually do anything besides run the specified program normally.

  • Only if your OPSEC was already bad... LLMs aren't magical, they're just piecing together information you already gave away freely.

    Also the authors of this paper refuse to show their work "for safety."

  • I wouldn't blanket call the removal of PFS a "failure" as they put it... it does make the protocol much simpler (and hence easier to understand/audit as well) and it's not always a necessity for every single person's threat model... which is an important phrase the article doesn't even mention.

    IMO arguing about security or privacy without both people first defining their threat models... is like claiming apples are objectively better than bananas in every way.

  • If they did, it's still entirely possible to use your own e2ee for messages between friends on any app just by using an encrypted keyboard app on your phone (like KryptEY).

  • it's not paranoia if they're really out to get you

  • assuming it actually listens to you. in the past people have had settings randomly turn back on.

  • URLs can have newlines too

  • I think your own statements here are pretty elitist.

    "As a rule, strong feelings about issues do not emerge from deep understanding."

  • Maybe a better question might be why all the upvotes. Perhaps that already answers one of your questions.