Cryptography nerd
Fediverse accounts;
@[email protected] (main)
@[email protected]
@[email protected]
Bluesky: natanael.bsky.social


You can’t call it GPL3 and at the same time claim the copyright.
Weil you can (because you still own the copyright after giving your work that license), but you have given a legally binding promise to not impose additional restrictions so it won’t do you any good to try


Posting for an audience of one


Consumer protection here kicks in after you paid for something, until then you’re just a visitor


A restaurant owner can kick you out for not liking your colors. They rarely do because it’s bad for business.


Two wrongs don’t make a right


This isn’t even remotely strange, all it requires is precoordinated motion. All it takes is synchronized clocks and you can orchestrate any kind of change in pattern moving faster than light, but it’s nothing but an optic illusion because it’s not self-propagating at light speed.


They made the prices so insane that most 3rd party apps couldn’t justify the higher subscription price


They didn’t even evacuate their bases in advance! They didn’t even install air defenses at them! They did nothing whatsoever to prepare! They just assumed instant success!


No he didn’t follow a plan. The plans said things like Iran would counter attack and try to close the strait. Trump and his team didn’t even look at the plans. They went with Netanyahu’s suggestion
The biggest clue to that bombing is them admitting they asked AI for targets and it delivered outdated info


Trump went to war without a plan, the lack of plans didn’t stop him


It does use deniable encryption, but that stops working as a defense the second they take your phone and copy all logs from your device.
And large group chats relies on how well you can vet participants more than it relies on encryption itself, and if they’re too large they may as well not be encrypted.


They changed that. You can make yourself undiscoverable by just the number now


At that point you can rely on nothing but Tor or I2P
Nothing else hides metadata better than Signal, without involving large networks of independent nodes that participate in Sybil resistant routing. The only thing that gets close is threshold schemes where you still need multiple independent entities running servers.


What evidence do you have that Signal collects anything? Traffic logs from the app or something?


Probably because they got slashdotted
Try the Archive.org mirror
Not a fan of the marketing speak on that page, as a cryptography nerd there’s a lot of questionable stuff.
SAS authentication is stone cold dead in the LLM age. P2P with friends is trivially trackable by the ISP and can easily map who knows who. ECDSA isn’t “industry leading”, that would be EdDSA or something based on Risetto, or a pq algorithm like ML-DSA
Depends on how repressive.
Often your main method of staying safe is appearing harmless.
You can find dedicated Mastodon and lemmy hosts more receptive to VPN users.
Anonymous use is hard due to stuff like timing attacks and writing style recognition, etc, especially if you post publicly. You want to mimic another style, for example. And create plausible deniability around timings (like say scheduled posts)

I’m assuming this is the same type of attack as against WiFi passwords in general, bruteforce of weak passwords. But otherwise yes, a PAKE algorithm instead for auth would completely prevent the ability to bruteforce based on watching traffic alone, and WPA3 already uses a PAKE and it should be used for everything which could be low entropy
Yes, a creator can create a closed source copy (independent of the GPL’d work), assuming they have full ownership or permission from all contributors
It’s not fully academic only because it’s common for companies to develop a GPL version and offer commercial licenses where the corporate customer is exempt
But none of this affect the users of the GPL version, so most people don’t care