#TIL The EFF DES Cracker hardware design is free and open source, almost everything was published in the public domain in 1998, including the VHDL code for the ASIC, a simulator, board schematics, and block diagrams. They can be found in the book Cracking DES. Just like the PGP book, the source code was designed to be OCRed into a foreign computer to bypass the U.S. crypto export regulation.

Git is not a secure protocol???? 🤔 actually sound obviosly.

La forma de aceptar cookies en la pagina de kotlin es genial, imaginativo y al mismo tiempo clasico, es anacronico. :pika: :blobrainbow:

"We moved to GitHub because everyone's already there"

"We shut down the mailing lists because most of our users prefer to use GitLab in their web browser"

"We're rewriting in Rust because we don't really have any non-x86_64 users"

"We're leaving IRC because Discord is more user-friendly"

What all of these arguments have in common is that they exclude people, centralize infrastructure, and eschew free software for proprietary solutions, all in the name of some ill-defined measure of "progress".

satanic panic but its over "russian hackers" and linux distros lmao

Par cobre sin trenzar TIA-586B 🤣 cable de uso rudo para interiores/exteriores. El experimento quedo todo guapo, el cable es un cable da cálidad, tiene un forro exterior de plástico un tanto grueso, con recubrimiento de malla de aluminio (como los tubos flexibles de gas), mas una protección de pelicula de papel de aluminio contra interferencias externas... 😊💯 -586B

#Apps #Libres en #Fdroid que cuidan mi #privacidad y/o #anonimato

#Antox #p2p mensajero
#Bitmask #vpn que usa #riseup
#Briar #p2p mensajero local
#Chatsecure #jabber c/ #Tor
#Exodus analisis de #trackers
#FakeTraveler para falsear #ubicacion
#Greentooth para desactivar #Bluetooth
#Jitsi para #videoconferencia
#KeepassDX admin pass
#Kouchat mensajero local
#Manyverse #rrss sobre #Bluetooth
#Monerujo #criptodivisa #anonima
#Nebulo #dns cifrado
#Nextcloud #cloud local

Hmm, I'm looking into 2FA/mutifactor auth/OTP and realizing that most implementations are *much* less secure than I thought.

Consider someone with gAuth/freeOTP on their phone. My previous understanding was that an attacker needed to access the phone *at the time they wanted to log in*. They could not, for example, steal the phone briefly, get the code, return the phone before it was missed, and then log in later… because the code would have changed.

But I now think that was wrong.


OMG, they mention Raspberry Pi in an anime (Dr. Stone) LOL I wasn't expext that.

The #microsoft propagandist whom the #eff foolishly gave an award to is now attacking everyone, using the EFF. The EFF has gone in a bad direction. http://techrights.org/2019/08/17/staying-focused/
Show older

A instance dedicated - but not limited - to people with an interest in the GNU+Linux ecosystem and/or general tech. Sysadmins to enthusiasts, creators to movielovers - Welcome!