[-] [email protected] 18 points 1 month ago

US media is often terribly mastered like this

[-] [email protected] 12 points 1 month ago

To maintain the anonymity goal you still want to obtain Talers in advance (otherwise you'd open yourself up to timing correlation) - so they will have to be in the wallet for some non-negligible duration.

Regardless of expiration that also means the device holding the secrets to use the Talers can be lost in that time, so you need some e.g. encrypted cloud backup to restore from. Since people are terrible at printing out recovery codes, you can either have key escrow (leading to a compromise of the anonymity properties), or you accept that some people will lose their money for reasons they will not understand.

Regardless, I would much prefer Taler as a CBDC to whatever permissioned Blockchain garbage the Big4 consulting companies will come up with.

[-] [email protected] 24 points 3 months ago

This is called plausibly deniable encryption, though you cannot hide the presence of the system itself.

GrapheneOS has a Duress PIN feature, which wipes your phone if entered.

[-] [email protected] 9 points 3 months ago

How did he fuck up his liver? Do you mean that he was doing something that caused him to develop that tumor?

[-] [email protected] 23 points 4 months ago

it collects call logs, contacts, location, your microphone, and much more

From my cursory look at the APK this looks to be complete misinformation. The app has no permissions beside accessing the Internet and reading some basic device status information. It is not a system app either, so it cannot elevate its privileges beyond that. Therefore it can already do less than most other Google apps you have on your phone.

There's one main service that's exposed: the ClassificationApiService. Further, a machine learning library included - most likely for local/offline inference. And that all makes sense if you read what Google has to say about the app:

Sensitive Content Warnings is an optional feature that blurs images that may contain nudity before viewing, and then prompts with a “speed bump” that contains help-finding resources and options, including to view the content. When the feature is enabled, and an image that may contain nudity is about to be sent or forwarded, it also provides a speed bump to remind users of the risks of sending nude imagery and preventing accidental shares.

Now all that said, Google should definitely communicate the intent of these applications better, and not silently install some suspicious looking app without consent. But if Google wanted more data from you - most of the time they can just ask you to share it - Where do you store your contacts? How do you share files with your other devices?

In any case I do think that this sort of client side scanning is still concerning, since it's now just one step away from forwarding images that trigger the classification service to law enforcement.

[-] [email protected] 38 points 4 months ago

Promoting to another king should be allowed too

[-] [email protected] 9 points 5 months ago

Maybe you can dump the firmware and find out the reset code that way?

[-] [email protected] 8 points 10 months ago

Probably referring to the fact that the following text is in English (as opposed to German).

[-] [email protected] 40 points 11 months ago

That performance curve seems terrible for any practical use.

[-] [email protected] 49 points 1 year ago

Can be real fun though and often you get deeper insight into the subject than just attending a class or gain valuable connections into the institute.

[-] [email protected] 7 points 2 years ago

There's PeerTube I guess but all the videos are already on YouTube soo...

[-] [email protected] 11 points 2 years ago

4 Stunden ist krass lange.

view more: next ›

BeliefPropagator

0 post score
0 comment score
joined 2 years ago