• 0 Posts
  • 9 Comments
Joined 1 year ago
cake
Cake day: June 25th, 2023

help-circle

  • Well even on not being rare, lynxes are stalking predators. Given what noisy clumsy travels us humans are and their keen senses, one is lucky to see a lynx. Since firstly they are always stalking or hiding just naturally and specially so hiding upon most likely spotting human way before human spots them. One could go right by one and not notice it. We aren’t on their menu given our size and not being normally encountered prey species. Also as stalkers unless it is something like a mother lynx protecting its young, it won’t make itself known. Far rather hides and let’s you pass without encounter. Since one less risk of the lynx getting injured in fight, if it can’t just hide away and go unnoticed.

    Though on top of that some species of lynx are very endangered.


  • It will at minimum be a fight. It won’t just sail through. Also whole governments being against means one of them might challenge the law in to European Court of Justice. Since as nation-states also often have, EU itself has charter of rights part in the fundamental EU treaties. It also has normal limit and share of powers. EU Council and Parliament aren’t all powerfull. ECJ can rule a directive or regulation to be against the core treaties like Charter of Fundamental Rights of the European Union.

    Said charter does include in it right to privacy (which explicitly mentions right to privacy in ones communications) and protection of personal data. Obviously none of these are absolute, but it means such wide tampering as making encryption illegal might very well be deemed to wide a breach of right to private communications.

    Oh and those who might worry they wouldn’t dare at ECJ… ECJ has twice struck down the data protection agreement negotiated by EU with USA over “USA privacy laws are simply incompatible, no good enough assurances can be given by USA as long as USA has as powerful spying power laws as it has”. Each time against great consternation and frankly humiliating black eye to the Commission at the time.

    ECJ doesn’t mess around and doesn’t really care their ruling being mighty politically inconvenient and/or expensive to EU or it’s memberstates. They are also known for their stance that privacy is a corner stone civil right (as stated in the charter and human rights conventions also, their legal basis) and take it very seriously as key part of democracy and protection of democracy. Without free and private communications and expression there can be no free political discussion, without free political discussion there can be no democracy.



  • Also I would add, not like this is unanimously supported in EU among memberstates. So this isn’t a done deal, this is a legislative proposal. Ofcourse everyone should activate and campaign on this, but its not like this is “Privacy activists vs all of EU and all the member state governments” situation. Some official government positions on this one are “this should not pass like it is, breaking the encryption is bad idea”.

    Wouldn’t be first time EU commission proposal falls. Plus as you said ECJ would most likely rule it as being against the Charter of Rights of European Union as too wide breach of right to privacy.


  • Seems like a huge headache with stolen/lost phones, wonder how they handle revokation…

    Right maybe should have clarified that. The authentication is facilitated by the trusted middle party aka phone company.

    When you log in using this service, you tell using service your phone number. Well their contacted authentication handler (usually one of the phone operators), they forward the request to your operator, who knows to forward it to the phone (as I understand as a network service SMS, like how operators settings updates also get send to the SIM and phone), this service message is handed by the phone cellular interface to the SIM. SIM applet notices “oh this is authentication request”. It displays the session ID of authentication (generated at the original authentication session and displayed there also) and then asks to enter security code to approve (or decline the request)

    As such revocation is two fold. First your operator will list the certificate/key invalid. Secondly, since operator is handling the message passing anyway, they know to refuse to send the authentication requests in the first place to the compromised SIM. since as the SIM, that also defines where to send the requests. It is both the independent crypto validation, but also the cell network subscriber identity. Compromised sim stops getting any requests, since it is shutout from cellular connection. Can’t make calls, can’t send and receive texts, since the sim isn’t anymore tied to valid subscriber contact.

    Plus with crypto system there is always the option of official public revocation server. Which kind of system is what the national ID smart card system uses. Anyone accepting identifying by those signatures gets told “the official key/certificate/revocation server is this one. Regularly check it for listed revocations by the root trust authority”


  • i don’t agree that it keeps users locked in. convenience wise it should be alot easier with e-SIM, technically you should just be able to open up an app and install a new e-SIM and voila your on a new provider.

    As long as the phone maker and the phone service company play nice. The whole point of physical sims is. “you break your phone screen and phone? You can literally in the minute borrow your buddy’s phone, slap your sim in it”.

    Why would it matter? For example here in Finland we have this thing called The Mobile ID. Which is commercial high security identification method, that works on the SIM. It’s user interface is the phone, but the actually crypto and logging works on the SIM. Just as with PIN number, the phone is just keypad to tell the SIM the security code to unlock it and operate. Not only does it work on SIM, due to security it is tied to the SIM. Each ID is a cryptographic key living physically in the SIM. never to leave it. public-private key exchange between the authentication server and SIM. on first boot/activation, SIM generates in-situ the private key, sends the public key to phone company, normal registrations hand shakes. Only thing anyone else has is the publickey. they private key lives it’s live in the SIM and just on getting signatory request and then correct unlock PIN signs the request and sends it back.

    Which again means in the “oh my phone broke” situation means I haven’t lost my mobile ID. Just yank the SIM out of the husk of the broken flagship expensive smart phone and slap it into the cheapest 30 euro “I make calls and send text” budget phone. Still works just as well. Any phone you find (that isn’t SIM locked) will work, since as said the ID is the SIM, the phone is just keypad interface.

    Also physical external sim allows physical update of the crypto processor. with eSim, if there is hardware fault or vulnerability found with the eSim, you are toast. With physical sim? So sorry customer, there has been vulnerability wound with the Sim crypto. Do you come to visit nearest operator store to get your new sim for your phone or do you want it sent by mail. Specially on say long lasting equipment… It is a very good thing there is a physically exchangeable cryptographic component. Rest of the equipment isn’t toast, just because someone cracked the SIM crypto.


  • I get the “but different states sales taxes thing”, for national advert. However even then, just make them present example price

    Get the new Moborola Bazer, only 549 dollars*
    * price example for Buffalo new York, including taxes and fees

    Since if one is going with “well the final price you pay might not be what was advertised”, make it be more representative and real. Yeah the final price might be different sometimes even lower depending on your local taxes compared to the example prices calculation locations taxes.

    Local advertising or on the shelf prices? There is no excuse, you are selling in that location. You know what the taxes and fees are just add them in. Any rare special discount and discrepancy cases, well the people eligible for those know to expect the difference.


  • CAT, Cat Anti Tank. Disables armored fighting vehicles by missiling up to the vehicle, climbing on top and driving through the hatches to scratchs the hell out of the on board crew. Dont ask how the CAT, gets through closed hatches, practical experience just shows they do.

    When asked about the hatches matter, the CAT complained about:

    • questioners lack of understanding importance of operational security around classified war technology.
    • where is their food, they don’t disable couple enemy tanks per day for free.

    Benefit of CAT over other AT weaponry is they leave the vehicle in good technical condition to be captured. Minus gory remains of the previous crew inside.