alphafalcon

joined 1 year ago
[–] [email protected] 19 points 6 months ago

They occupy a strange niche full of contradictions.

Entering the code on the device itself should increase security as opposed to entering it on a compromised computer.

But plugging it into a compromised computer means the data is compromised anyway.

Their security is way harder to audit than a software solution like PGP. The actual "encryption" varies from actual decent setups to "entering the code connects the data pins with no actual encryption on the storage chip"

Not having to instal/use software to use them means they are suitable for non-technical users which in turn means more support calls for "I forgot the pin, it wiped itself, can you restore my data"

They are kind of useful to check the "data is transported on encrypted media" box for compliance reasons without having to manage something bigger.

[–] [email protected] 1 points 6 months ago

Is that a reference to Angleton?

[–] [email protected] 3 points 6 months ago

Wow, that sounds like a decent start for an architecture.

I'm tempted to spin up a few Jellyfin instances to see how it might work...

[–] [email protected] 25 points 6 months ago* (last edited 6 months ago) (2 children)

Decent writeup by Charles Stross:

https://www.antipope.org/charlie/blog-static/2024/01/worldcon-in-the-news.html

The mode of operation of WorldCon/the Hugos seems interesting as in "May you live in interesting times"

Edit: fixed auto-co-wrecked spelling of Charles Stross

[–] [email protected] 30 points 6 months ago (5 children)

JellyFed(eration) would be awesome. It should use an anonymous overlay network so federation is not limited to people you trust in copyright-zealous jurisdictions.

[–] [email protected] 43 points 6 months ago (1 children)

I didn't know you could hear a picture so clearly.

[–] [email protected] 2 points 6 months ago

Teenagers and a dog sound like Scooby Doo. No idea how specific the rest is.

[–] [email protected] 1 points 6 months ago

It doesn't. It carries you by having a module for absolutely everything even shooting yourself in the foot.

[–] [email protected] 5 points 6 months ago (1 children)

That's the equivalent of leaving the door open and hanging a sign "Internet over there" pointing at a wall.

Programs don't need to respect those registry keys. If you're worried about internet access, set up a firewall.

Also, if you're worried about malware, the damage is probably done before anything connects to the internet.

[–] [email protected] 1 points 7 months ago

For all Mankind x Delta-V: Rings of Saturn

Same universe as far as I'm concerned

[–] [email protected] 5 points 7 months ago

B stands for Billion (Parameters) IIRC

[–] [email protected] 4 points 7 months ago

Should not be a problem with proper planning. Assuming the Trace tracks side along apparition and shows the destination, just have another mode of transport waiting at the destination.
Apparition -> broomstick -> knight bus would be a simple chain to set up.

Alternatively, depending on the exact mechanics of the trace, multiple apparitions from the same spot could be confusing as well, possibly even in addition to the poly juice plan.

If the trace does not record the identity of the underage wizard that's causing the alert, adding more underage wizards to the equation would cause total mayhem, especially given the usual "competence" of the ministry.

Depending on how cunning you get, using an information channel you control to feed the opposition false information should be possible as well. Set up a plan requiring specific spells, cast them near "traced" Harry and walk the opposite direction.

view more: ‹ prev next ›