Show newer

Imagine how different tech spaces could be if folks developed identities that aren’t “I am the tools that I use.”

I’m not saying don’t be amazing at using those tools and be known for being so. I’m just saying don’t be a tool.

: What are your 'comfort games'? I'm especially curious about anything that has some sort of crafting or building mechanic (it can be an unusual one!) :boost_requested:

Snark about so much of Open Science advocacy 

Before you do your Open Science advocacy thing, may I suggest that you ask yourself this question:

Are you just harassing early career researchers and students who don't get to make decisions about these things?

And if the answer is "no," ask yourself:

Really? Are you sure? Maybe double-check.

AI 

I hate that when I write a particularly good email at work, nowadays everyone will just assume I used ChatGPT. Even if I’m still better at it than the bot. Something I’ve always taken pride in has been commoditized. Without getting into whether or not that’s good for the world, it’s a bad feeling for me personally.

Heeft iemand van jullie wel eens mensen met de auto naar station Gouda gebracht en kun je bevestigen dat je daar gewoon van zuid naar noord doorheen kan teleporteren? Apple Maps denkt dat het kan namelijk.

@zHXyHkzWuwUI It's also not deterministic, though; see the second property listed on that page

A TV show about a group of trans people who all live together in a run-down house/apartment, and they live the daily struggle but still manage to find beauty, laughter, and joy between the ugliness, struggle, and sorrow of it all.

From Life With a Side of the Unexpected:

"A lot of disabilities are invisible. Your reaction to them isn't."

#DisabilityPrideMonth #InvisibleDisabilities

@ben There's quite a bit of history of convergent encryption in P2P software, long predating Maidsafe. Some notable ones include Freenet, GNUNet, and Tahoe-LAFS.

But crucially, there are several known attacks: tahoe-lafs.org/hacktahoelafs/d - and so if an implementation claims that it is "as safe as any other modern encryption algorithm", that is a strong claim that requires supporting rationale (which I do not see here).

<mededeling voor algemeen nut>

Lieve mensen. Ik begrijp dat je niet de tekst van een halve krantenpagina als alt-text kunt toevoegen, maar plak dan in iedergeval de link naar dat artikel. Met in de alt-text de woorden 'Zie link in bericht'.

</einde mededeling>

I needed to measure my necklace and grabbed the first ruler in sight. Yeah, not falling for that one, having an off-by-one error tattooed on my body is enough already. :blobhaj:

@ben That library is not very confidence-inspiring, to be honest - I haven't forgotten about Maidsafe's original sketchy business model (that they now pretend they've never had), and it speaks of an "additional obfuscation step" but then doesn't seem to provide any details about how that works or why it would be more secure than other approaches (or its vulnerability or lack thereof to known attacks against convergent encryption).

@dequbed The honest answer is that I have no idea :)

My rationale was something along the lines of: stay as close as possible to the standard recommended approach, and verify that specific deviations do not break the security model (I do not like rolling my own crypto).

By that reasoning, the closest thing that does what I want is "it still has a nonce, but it can be derived from the content/key". It's very possible that that's functionally indistinguishable from a nonce of zero - I simply don't know whether that is true! And so I did not take that step in my approach (yet).

@bananas Isn't a content-derived key scheme inherently secure against those types of attacks (as long as the hash function is)? As there is no way to obtain different ciphertexts from the same key

@unnick Huh. Isn't ed25519 public-key crypto rather than secret-key?

@bananas Yep, I'm aware of confirmation attacks - in this case, that's an acceptable weakness in the scheme (as it seems to be unavoidable if you want convergent encryption)

@benaryorg (Which has been an absolute pain in the design process, but that's a different discussion 🙃)

@benaryorg That's not sufficiently deterministic for my case, unfortunately; part of the protocol involves "checking if encrypted/sharded chunks already exist in the storage cluster, before uploading anything", for which the whole process (encoding, encryption, sharding) needs to be fully deterministic with zero 'external' malleable factors

Show older
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.