#AskFedi: What are your 'comfort games'? I'm especially curious about anything that has some sort of crafting or building mechanic (it can be an unusual one!) :boost_requested:
Snark about so much of Open Science advocacy
Before you do your Open Science advocacy thing, may I suggest that you ask yourself this question:
Are you just harassing early career researchers and students who don't get to make decisions about these things?
And if the answer is "no," ask yourself:
Really? Are you sure? Maybe double-check.
AI
I hate that when I write a particularly good email at work, nowadays everyone will just assume I used ChatGPT. Even if I’m still better at it than the bot. Something I’ve always taken pride in has been commoditized. Without getting into whether or not that’s good for the world, it’s a bad feeling for me personally.
@zHXyHkzWuwUI It's also not deterministic, though; see the second property listed on that page
From Life With a Side of the Unexpected:
"A lot of disabilities are invisible. Your reaction to them isn't."
@ben There's quite a bit of history of convergent encryption in P2P software, long predating Maidsafe. Some notable ones include Freenet, GNUNet, and Tahoe-LAFS.
But crucially, there are several known attacks: https://tahoe-lafs.org/hacktahoelafs/drew_perttula.html - and so if an implementation claims that it is "as safe as any other modern encryption algorithm", that is a strong claim that requires supporting rationale (which I do not see here).
@dequbed What would a more standard approach be for this usecase?
@ben That library is not very confidence-inspiring, to be honest - I haven't forgotten about Maidsafe's original sketchy business model (that they now pretend they've never had), and it speaks of an "additional obfuscation step" but then doesn't seem to provide any details about how that works or why it would be more secure than other approaches (or its vulnerability or lack thereof to known attacks against convergent encryption).
@dequbed The honest answer is that I have no idea :)
My rationale was something along the lines of: stay as close as possible to the standard recommended approach, and verify that specific deviations do not break the security model (I do not like rolling my own crypto).
By that reasoning, the closest thing that does what I want is "it still has a nonce, but it can be derived from the content/key". It's very possible that that's functionally indistinguishable from a nonce of zero - I simply don't know whether that is true! And so I did not take that step in my approach (yet).
@bananas If I can find the relevant documentation, yes 😅
@bananas Isn't a content-derived key scheme inherently secure against those types of attacks (as long as the hash function is)? As there is no way to obtain different ciphertexts from the same key
@unnick Huh. Isn't ed25519 public-key crypto rather than secret-key?
@bananas Yep, I'm aware of confirmation attacks - in this case, that's an acceptable weakness in the scheme (as it seems to be unavoidable if you want convergent encryption)
@benaryorg (Which has been an absolute pain in the design process, but that's a different discussion 🙃)
@benaryorg That's not sufficiently deterministic for my case, unfortunately; part of the protocol involves "checking if encrypted/sharded chunks already exist in the storage cluster, before uploading anything", for which the whole process (encoding, encryption, sharding) needs to be fully deterministic with zero 'external' malleable factors
In the process of moving to @joepie91. This account will stay active for the foreseeable future! But please also follow the other one.
Technical debt collector and general hype-hater. Early 30s, non-binary, ND, poly, relationship anarchist, generally queer.
- No alt text (request) = no boost.
- Boosts OK for all boostable posts.
- DMs are open.
- Flirting welcome, but be explicit if you want something out of it!
- The devil doesn't need an advocate; no combative arguing in my mentions.
Sometimes horny on main (behind CW), very much into kink (bondage, freeuse, CNC, and other stuff), and believe it or not, very much a submissive bottom :p
My spoons are limited, so I may not always have the energy to respond to messages.
Strong views about abolishing oppression, hierarchy, agency, and self-governance - but I also trust people by default and give them room to grow, unless they give me reason not to. That all also applies to technology and how it's built.