Shout out to @redmaple for the flowchart feedback.
Courtesy mention: The community Namecoins have had their registrations updated.
Background: Namecoin was the first altcoin to Bitcoin. Satoshi himself posted to the development fund. The goal was to use the blockchain to compete with traditional DNS.
It has had very quiet development over the years. Notably: Tor Browser nightly builds ship with Namecoin support. The idea is to resolve long unreadable .onions to readable .bit addresses natively in Tor browser.
You're welcome in advance.
🟡 Relay operators: if you are running OpenSSL 3 please be aware that you might need to upgrade it to 3.0.7 on next Tuesday (Nov 1).
Operators running OpenSSL on the 1.1 series are fine as far as we know.
@ze Right, that makes sense! AppImages can integrate with Firejail for greater sandboxing and you can pass an MTU value into Firejail at runtime.
PSA: Regarding Tor onion reliability... if you are noticing communication with an onion is shaky/intermittent/unreliable, and you control that onion, look into reducing the MTU on the network interface to 1400 or 1350.
What happens in the real world: All gear is configured to a default of 1500, and when you add tunneling to packets as they are passed up, it results in packet splitting or loss.
Onions that seem like dog shit can be turned rock solid with the interface setting change.
The systemd creator now works for Microsoft. I will have a glowing "I warned you" down the line. Worm is turning a bit: https://news.ycombinator.com/item?id=33340866
News: FL SURGEON GENERAL ON COVID VAX MANDATE: "A SNOWFLAKE HAS A BETTER CHANCE IN HELL."
When they were doing the vax push there were a string of local vehicle accidents. One was an instant fatality with several injured (car crossed lane head-on into much larger vehicle).
And I was nearly killed in a head on collision. Person drove at me with no lights on, at night, head on, and in my lane. I went off-roading to miss them.
We almost didn't have an OT protocol!
"yeah I been like that"
submitted by Dazzling_Sir5300
How the mathematician process actually works: Work tirelessly on a problem. Repeatedly fall asleep wherever while thinking about it. Repeat this process for days on end for months. Endless piles of notes form that start to look like crazy ramblings of a madman. Take a break out of frustration and exhaustion. Comb over the smaller finds again. See things you overlooked while tired. Wonder if what you are now seeing is a breakthrough or a stroke.
Qubes PSA: Beware how easy it is to leak to the clearnet. Anything not in sys-whonix OR if the (net,whonix,firewall) templates make automatic requests (e.g. looking for upgrades) it will leak the DNS requests up to your router even if you are otherwise configured to use Tor for everything.
Also be mindful that in the case of travel (roaming) your MAC is not morphing with every hotspot you hit. Tails, in contrast, enforces this and won't even allow your interface to come up if mac spoof fails.
For those who need an explanation about the "arbitrary" limit of password lengths in Android device encryption: it is so the upper threshold is within the capacity of a supercomputer to break. That means roughly 80~ bits of strength at maximum.
How do I know this?
(1) If you try different passwords at about that length you come to 80~ bits.
(2) Encryption mathematics (the actual mathematics) require 80+ bits of security to be considered "not broken".
Eating my wings to make me tame.
A club for red-pilled exiles.