• 0 Posts
  • 22 Comments
Joined 1 year ago
cake
Cake day: November 4th, 2023

help-circle
  • Yes it can.

    The fob has no idea what it has access to, in most systems it just has a serial number. When you tap it on the reader, the reader scans its serial number. The system has a list of which key numbers are allowed to open which doors at which times, if your key matches it opens the door. These almost always have some kind of log of which key opened which door when. Whether the building management knows how to access that is anyone’s guess.

    If he loves in a building with fobs there’s probably cameras also.

    So if he’s worried about after the fact investigation into his movements, he should live somewhere else.



  • I really wish there was something regulatory that could be done about this. There are millions of perfectly good fully working computers that are going to go in the fucking trash because of this. I understand the desire for a TPM on every machine. It makes sense in a way. But the pure environmental impact is just indefensible. All of those computers had a significant environmental footprint to build them and ship them and again to dispose of them plus building and shipping their replacements.
    If Microsoft had such a hard-on for TPM, they should have worked with computer manufacturers to make some sort of retrofit system or way of easily determining if a TPM can be added to an existing computer


  • That’s assuming raw PCM data, no compression (lossy or lossless) whatsoever.

    LDAC can do lossless redbook audio (16 bit 44.1 KHz) at 990kbps. All other modes are lossy.
    It’s probably doing something much like FLAC- lossy encoder + residual corrections to ensure you get the original waveform back out, but with less bandwidth than raw PCM.





  • I think that there are no all or nothing questions in something like this. I think the lions share of ocean plastic comes from third world countries where ‘dump it in the river’ is the most common form of trash disposal. I think that reducing harm is helpful, whether it’s a little or a lot. I would agree that tackling small issues with extremism while ignoring big ones is performative. For example, telling people in California to take 2 minute showers while ignoring the giant agricultural operations are wasting millions of gallons a day on inefficient air spray sprinkler systems.

    Focusing on us, I think keeping plastic out of our landfills is generally a good thing. We use plastic for millions of things in our society. It is simply not feasible to completely switch off plastic, not anytime soon and probably not ever. But reducing or removing single use plastics does an awful lot.

    So I say let’s replace single use plastic starting in places where it can be done easily and cheaply, where there are readily available cost effective alternatives. That is especially true for plastic film, like plastic bags, that can’t be recycled in a normal recycle bin.
    Use paper cups instead of styrofoam. Put your take out food in aluminum foil trays or cardboard clamshells. Use paper bags for grocery check out.

    And for the vegetables and meats, I don’t suggest banning those because you would get a lot of pushback from both stores and consumers.


  • This is a good idea. Rather than trying to collect little penny fees here and there, just get rid of the stuff. We don’t need it, we have other options.

    I would like to see most single use plastic grocery bags go with that. I think there need to be exceptions, for example produce bags or meat department bags. I haven’t seen a good replacement for those yet. But at the checkout, or for carry out food, just get rid of them.





  • SirEDCaLot@lemmy.todaytoPrivacy@lemmy.mlIs TOR compromised?
    link
    fedilink
    arrow-up
    16
    arrow-down
    2
    ·
    7 months ago

    All the crypto in the world won’t help if you do stupid stuff and have crap OPSEC.

    A big part of that is stay under the radar. If I were NSA I’d be running a great many TOR nodes (both relay nodes and exit nodes) in the hope of generating some correlations. Remember, you don’t need to prove in order to raise suspicion.

    So for example if you have an exit node so you can see the request is CSAM related, and you run a bunch of intermediate nodes and your exit nodes will prefer routing traffic through your intermediate nodes (which also prefer routing traffic through your other intermediate nodes), you can guess that wherever the traffic goes after one or two relay hops through your nodes is whoever requested it.
    If you find a specific IP address frequently relaying CSAM traffic to the public Internet, that doesn’t actually prove anything but it does give you a suspicion ‘maybe the guy who owns that address likes kiddy porn, we should look into him’.

    Doing CSAM with AI tools on the public Internet is pretty stupid. Storing his stash on cell phones was even more stupid. Sharing any of it with anyone was monumentally stupid. All the hard crypto in the world won’t protect you if you do stupid stuff.


    So speaking to OP- First, I’d encourage you to consider moving to a country that has better free speech protections. Or advocate for change in your own country. It’s not always easy though, because sadly it’s the unpopular speech that needs protecting; if you don’t protect the unpopular stuff you jump down a very slippery slope. We figured that out in the USA but we seem to be forgetting it lately (always in the name of ‘protecting kids’ of course).

    That said, OP you should decide what exactly you want to accomplish. Chances are your nation’s shitty law is aimed at public participation type websites / social media. If it’s important for you to participate in those websites, you need to sort of pull an Ender’s Game type strategy (from the beginning of the book)- create an online-only persona, totally separate from your public identity. Only use it from devices you know are secure (and are protected with a lot of crypto). Only connect via TOR or similar privacy techniques (although for merely unpopular political speech, a VPN from a different country should suffice). NEVER use or allude to your real identity from the online persona. Create details about your persona that are different from your own- what city you’re in, what your age and gender are, what your background is, etc. NEVER use any of your real contact info or identity info.