this post was submitted on 16 Oct 2023
1760 points (99.3% liked)

internet funeral

6929 readers
2 users here now

ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤart of the internet

What is this place?

[email protected] with text and titles

• post obscure and surreal art with text

• nothing memetic, nothing boring

• unique textural art images

• Post only images or gifs (except for meta posts)

Guidlines

• no video posts are allowed

• No memes. Not even surreal ones. Post your memes on [email protected] instead

• If your submission can be posted to [email protected] (I.e. no text images), It should be posted there instead

This is a curated magazine. Post anything and everything. It will either stay up or be lost into the void.

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] -1 points 1 year ago (1 children)

When there isn't any stored data to be sent, they could easily send fake/random data in requests though. So then it's not detectable if data is stored and sent or not. How would you make up for that?

[–] [email protected] 3 points 1 year ago (1 children)

That's actually a good point! Random data is unlikely since it would be noticable due to differences in size of the compressed traffic (random data doesn't compress), but fake data would not be distinguishable from just looking at traffic.

Luckily there are still things you can do, like analyzing the firmware itself (especially when you can inject your MitM proxy cert). It has been done before, and it's reasonable to assume such a technique would have been found by security researchers by now.

[–] [email protected] 1 points 1 year ago (1 children)

That’s actually a good point!

Wow, the tone of your replies sure has changed.

[–] [email protected] -1 points 1 year ago (1 children)

Any additional analysis of my comments you'd like to share?

[–] [email protected] 0 points 1 year ago

Any additional analysis of my comments you’d like to share?

Damn, and just when you were improving.