• 0 Posts
  • 22 Comments
Joined 10 months ago
cake
Cake day: November 4th, 2023

help-circle

  • (This is not an insult, I just had a realization that I think might affect you)-- do you know what the name comes from?

    Years ago there was a thing called a beeper before everyone had cell phones. It was a one way paging system-- you’d give your friends your beeper number, they’d call it, type in their phone number, and their number (or whatever they dialed in) would appear on your beeper. You’d then use a landline phone to call them back (early versions of the system had no text or reply capability, only numbers and only one-way).

    I always thought it was a cool name. But thinking about it I realize someone less than maybe 25-30 years old might literally have never encountered such a device. Much like a 5.25" floppy disk or rotary dial phone, they went out of style years ago and a young person might never have encountered one.

    Curious if that’s you?



  • This is really not accurate. Matrix is not designed to be a super privacy first protocol. It’s like Lemmy in the it’s designed to solve a problem and be a useful federated collaboration tool. It borrows features from a number of popular messaging platforms. Message history is stored on the server but encrypted client side so privacy is preserved. It supports group chat rooms. It supports voice and video. And most importantly, it supports bridges- you can connect your matrix to other services that are completely incompatible with matrix using a bridge. Perhaps the best example of this is Beeper, which is built on matrix. They are trying to replicate the user experience of the old app Trillian- beeper can link with a number of chat services including Google messages, slack, WhatsApp, telegram, signal, etc. Thus you get all your chats in one place.


  • Oh yes for sure. Wasn’t saying otherwise. Was only pointing out the details because the way the program worked previously, it was kind of an all or nothing thing. And thus, Aqara joining could be taken as a sign that they are going to make everything completely open and interoperable and work perfectly directly with HA. I don’t think that’s the case.

    This is still a very important step. Open standards may be the most important part of home automation, but the second most important part might well be respect. Go back just a year or two and HA and open source in general were basically ignored in the market. Now things are changing.
    Every company that partners with HA further cements HA and open standards in general as a legitimate / major player in the automation market that manufacturers ignore at their own peril. The more that happens, the more products will be developed with open standards in mind.





  • SirEDCaLot@lemmy.todaytoPrivacy@lemmy.mlIs TOR compromised?
    link
    fedilink
    arrow-up
    15
    arrow-down
    2
    ·
    9 days ago

    All the crypto in the world won’t help if you do stupid stuff and have crap OPSEC.

    A big part of that is stay under the radar. If I were NSA I’d be running a great many TOR nodes (both relay nodes and exit nodes) in the hope of generating some correlations. Remember, you don’t need to prove in order to raise suspicion.

    So for example if you have an exit node so you can see the request is CSAM related, and you run a bunch of intermediate nodes and your exit nodes will prefer routing traffic through your intermediate nodes (which also prefer routing traffic through your other intermediate nodes), you can guess that wherever the traffic goes after one or two relay hops through your nodes is whoever requested it.
    If you find a specific IP address frequently relaying CSAM traffic to the public Internet, that doesn’t actually prove anything but it does give you a suspicion ‘maybe the guy who owns that address likes kiddy porn, we should look into him’.

    Doing CSAM with AI tools on the public Internet is pretty stupid. Storing his stash on cell phones was even more stupid. Sharing any of it with anyone was monumentally stupid. All the hard crypto in the world won’t protect you if you do stupid stuff.


    So speaking to OP- First, I’d encourage you to consider moving to a country that has better free speech protections. Or advocate for change in your own country. It’s not always easy though, because sadly it’s the unpopular speech that needs protecting; if you don’t protect the unpopular stuff you jump down a very slippery slope. We figured that out in the USA but we seem to be forgetting it lately (always in the name of ‘protecting kids’ of course).

    That said, OP you should decide what exactly you want to accomplish. Chances are your nation’s shitty law is aimed at public participation type websites / social media. If it’s important for you to participate in those websites, you need to sort of pull an Ender’s Game type strategy (from the beginning of the book)- create an online-only persona, totally separate from your public identity. Only use it from devices you know are secure (and are protected with a lot of crypto). Only connect via TOR or similar privacy techniques (although for merely unpopular political speech, a VPN from a different country should suffice). NEVER use or allude to your real identity from the online persona. Create details about your persona that are different from your own- what city you’re in, what your age and gender are, what your background is, etc. NEVER use any of your real contact info or identity info.









  • It’s actually not that hard. Microinverters have taken a lot of the danger out of it. Every one or two panels has an inverter, they can be individually controlled and tie together with 120 volt AC wiring, so you avoid the issue of 100+ volt DC strings that can’t be turned off. And on the physical side, there are now rack systems that install very easily and look good. Designing and installing the system isn’t hard. Just look up the documentation from Enphase or someone similar, you just need panels, micro inverters, a combiner panel, and maybe one of their computer management units. There’s other manufacturers too but the concept is the same. Installing the solar is the easy part. Getting permits is the hard part. Municipalities throw up a ton of red tape and utilities throw up even more for any sort of grid connected system. So what would be a basic concept that a technician level person could design, ends up being this complicated thing that needs engineering sign-offs and stamped plans that have to be approved by the town and the power company and inspected 18 different ways. This leads a lot of people to do off-grid systems, that is, set up your own solar panels and batteries, and run some portion of your house off at using extension cords rather than hardwired. If you’re just putting panels on the ground or on your deck and running extension cords, no need for permits.