• 0 Posts
  • 70 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle
  • Why do you assume they haven’t warned Mozilla in advance?

    Also, Mozilla was fully aware that what they were doing is in breach of GDPR. I find it extremely hard to believe that the makers of Firefox are not fully familiarized with it by now.

    Last but not least Mozilla is doing this for financial gain. It’s selling pur data to advertisers. Why should we excuse it? It’s a very hostile act.

    If Mozilla has hit rock bottom and has been reduced to selling our data to survive then that’s that. We’ll find another way and another FOSS browser. Accepting it is not an option.













  • It’s not a cost issue. It’s about taking responsibility for maintaining a reliable, highly-available service.

    I’m pretty sure a solution will be found eventually. EU institutions need IT infrastructure to work and communicate like everybody else and all EU countries have highly available infrastructure like emergency services, secure channels etc. It’s just a matter of putting this task in the right context.

    It’s a very good thing that they’ve stumbled across this snag because solving it can also open the way for running more internet public services in the EU in an open, transparent manner, and may open the way to weaning ourselves off commercial platforms.

    Having a distributed, federated, secure, privacy-friendly and open EU-run messaging platform for example would be a huge boon for its citizens and have wide implications for other regions as well.


  • Passkeys are. more similar to TOTP codes than passwords. Everything about passkeys is autogenerated. Browser negotiates with website to generate a key pair that will establish your identity on that site. Every time you “login” they exchange unique autogenerated keys to prove to each other who they are. That’s it. You never have to remember anything again and it’s impervious to many attacks that affect passwords and 2fa codes.

    Where they fucked up is allowing big tech to call the shots so now instead of simply having passkeys in your browser you have to go to a higher authority to have them validated. And goes who that is — Google, Microsoft, Apple. So it’s basically gatekeep and you can’t touch them without depending on them.


  • As long as you can reduce something to a pattern, it will work with a LLM. That’s what they’re great at, matching and recognizing patterns.

    You might still do better with random moves. Depends on a couple of things.

    First, a LLM is only as good as its training data. Depends on whether that data contained enough good moves that would work against a random button pusher.

    There’s also the question of whether the random pusher is human or not. Humans are not great at generating random data, we tend to think in patterns and there’s also muscle memory. So I think the moves of a human random masher could easily fit into defendable patterns.

    If the random masher is a computer I think it comes down to how well the game is designed, whether it rewards combos, whether longer patterns that build on each other have a large advantage over a series of completely random individual moves.



  • Their company is attempting to hijack TLS connections to eavesdrop on their browsing.

    It only works with websites that also offer a non-TLS version (which the hijacker uses to fetch content and then re-encrypts with their own certificate after they’ve snooped). But it doesn’t work if the website doesn’t have a non-TLS version and/or specifies it should only be used with TLS.

    Another way for it to work is for the company to get their own certificates on the machine, which is very easy if it’s a work-issued machine. But I’m guessing OP is not using a work machine.



  • And the crux of the matter:

    Less emotionally, I think it’s unwise to assume that an organization that has…

    • demonstrably and continuously made antisocial and sometimes deadly choices on behalf of billions of human beings and
    • allowed its products to be weaponized by covert state-level operations behind multiple genocides and hundreds (thousands? tens of thousands?) of smaller persecutions, all while
    • ducking meaningful oversight,
    • lying about what they do and know, and
    • treating their core extraction machines as fait-accompli inevitabilities that mustn’t be governed except in patently ineffective ways…

    …will be a good citizen after adopting a new, interoperable technical structure.