Hacker, writer, translator, unix & programming nerd.

  • 0 Posts
  • 32 Comments
Joined 1 year ago
cake
Cake day: August 6th, 2024

help-circle
  • I wrote a small script that takes a query as its single argument and if it finds a matching filename in a given directory it shows that in a pager. If it doesn’t, it uses ripgrep to search inside that directory and returns the filenames in a picker. If I prepend the filename with e, it opens that file (either existing or new) in an editor. Then I track that directory with Git.

    This way I have a quick way to store, find and retrieve notes from the terminal itself.


  • I think the goal is to be a browser for daily use for privacy-conscious people who are willing to do some work in telling the browser what information to keep/give and to whom. That means it’s likely not meant for the general public, more like privacy nerds and those so inclined to see the browser as a more fine-grained tool to access information rather than a pragmatic, straightforward interface into various web services.

    Privacy, like security, is usually at odds with convenience. I agree with you it could be made more convenient, and as I said I think the first time you start LibreWolf it should tell you about some of its convenient features such as the address bar toggles.

    So yes, Mullvad is not meant for daily use doing all your browsing, much less Tor Browser. I think you can use LibreWolf as your main browser, particularly if you use several browser profiles. You can e.g. have a separate “work” profile, where you might need to keep/allow more things from corporate systems from personal browsing, where you can block more aggressively and access mostly things you trust. This way you don’t need to have an all-or-nothing approach to your privacy.

    I don’t think storing passwords, cookies and other information should be the default. In fact that is one of my favorite features in LibreWolf. I think it’s an excellent default, but it needs some adjusting to in how you think about the browser. That’s why I think it should have a screen on the first run for the first profile explaining its controls, because it does make all this convenient in some ways, but one has to discover that convenience by themselves and at that point frustration might have already overcome them.




  • I’m focusing on the lock screen as having one single job to do well: protect the session from any access not granted exclusively through the password.

    You posit this as if the attacker and the killing of the lock screen were connected: the attacker can only kill if they already have malware, so “it doesn’t matter”. But the point is, if the lock screen won’t relinquish access upon receiving the kill signal, even if the attacker had compromised this vector, or if there were some other cause behind the lock screen dying, crashing, whatever, access would not be granted in the first place. It stops at that layer.

    Thinking in terms of “if they already can access the system, whatever” is different from thinking about security in depth/layers. So its not so much about the cause of the problem, but where you can contain it. This threat (a physical access attacker) is pretty extreme, but if we are going there, then yes, it’s not unfeasible to think that they could leverage this weakness to go from a possibly limited shell access to a fully unlocked physical session where you could have unrestricted access to e.g. a browser or unlocked password manager or other in-memory information.

    But the two things don’t really need to be connected. The lock screen having a secondary way to allow access that does not require the password is a weakness in itself, that the attacker could exploit, but that should not have been there in the first place.








  • I think the ethos of open source flips this thinking. You should not trust. Microsoft may not be noting down your banking details, but you actually don’t and can’t know if it is. What it is doing is storing other personal data, because that is in its policies. Now, to what extent it takes advantage of this capability and permission, it is again unknown and unknowable.

    Microsoft may be a big corp, but some distros are the backbone of highly critical systems, and collectively they run the vast majority of servers.

    You don’t “trust” your distro. Or your laws. Everything being done is in the open, so you can see for yourself. If you lack the knowledge to do that, there are others who are doing it and many are sharing what they find. You will “trust” on some level, because of its reputation, how established it is, but trust here means something very different from letting a huge blob of unknown code do whatever it does because I trust you.









  • jutty@blendit.bsd.cafetoaww@lemmy.worldThis is a PAINTING
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    5 months ago

    in this thread, as a twist on the more common meme “is this AI” or the more accusatory variant “this is AI”, we doubt human intelligence instead

    I’m disheartened by comments stating “whats the point?” just because it’s hyper realistic. I do prefer less realistic art too, but the amount of dedication it must’ve taken this person to develop these skills and then the work on each painting, it speaks volumes beyond just being a replacement for a picture… You’d hang it on a wall and tell every visitor “this is a painting” and then each and every one of them would go NOOO