Re: voting mechanisms -

There have been privacy preserving vote-counting cryptographic mechanisms since the 1990s.

I'm not sure if it's better to have your family connectivity ripped apart as a child like @Tfmonkey or to have it slowly pulled apart over decades.

My current conclusion is... there is no "better" when it comes to Marxism.

A Tale of Two Families:
youtube.com/watch?v=2GLkSIZ3UH

Courtesy mention: The community Namecoins have had their registrations updated.

Background: Namecoin was the first altcoin to Bitcoin. Satoshi himself posted to the development fund. The goal was to use the blockchain to compete with traditional DNS.

It has had very quiet development over the years. Notably: Tor Browser nightly builds ship with Namecoin support. The idea is to resolve long unreadable .onions to readable .bit addresses natively in Tor browser.

You're welcome in advance.

Breakthroughs happen in the quiet... when few are paying attention.

🟡 Relay operators: if you are running OpenSSL 3 please be aware that you might need to upgrade it to 3.0.7 on next Tuesday (Nov 1).

Operators running OpenSSL on the 1.1 series are fine as far as we know.

forum.torproject.net/t/tor-rel

@ze Right, that makes sense! AppImages can integrate with Firejail for greater sandboxing and you can pass an MTU value into Firejail at runtime.

PSA: Regarding Tor onion reliability... if you are noticing communication with an onion is shaky/intermittent/unreliable, and you control that onion, look into reducing the MTU on the network interface to 1400 or 1350.

What happens in the real world: All gear is configured to a default of 1500, and when you add tunneling to packets as they are passed up, it results in packet splitting or loss.

Onions that seem like dog shit can be turned rock solid with the interface setting change.

The systemd creator now works for Microsoft. I will have a glowing "I warned you" down the line. Worm is turning a bit: news.ycombinator.com/item?id=3

My mathematical notes span 45,000 lines. Before me now sits a reduction of those notes which amounts to a grand total of 4 lines.

Will have to set this down for a hot minute to handle practical matters.

The phrase "set down" translates to "peel myself away from with a crowbar".

Embedded devices are similar to git in a lot of ways. Those ways are: when the config is munged you delete the whole thing and clone it again.

Will probably drop this in a video at some point, but worth a mention here since @spectre and @redmaple reminded me.

When they were doing the vax push there were a string of local vehicle accidents. One was an instant fatality with several injured (car crossed lane head-on into much larger vehicle).

And I was nearly killed in a head on collision. Person drove at me with no lights on, at night, head on, and in my lane. I went off-roading to miss them.

We almost didn't have an OT protocol!

How the mathematician process actually works: Work tirelessly on a problem. Repeatedly fall asleep wherever while thinking about it. Repeat this process for days on end for months. Endless piles of notes form that start to look like crazy ramblings of a madman. Take a break out of frustration and exhaustion. Comb over the smaller finds again. See things you overlooked while tired. Wonder if what you are now seeing is a breakthrough or a stroke.

Qubes PSA: Beware how easy it is to leak to the clearnet. Anything not in sys-whonix OR if the (net,whonix,firewall) templates make automatic requests (e.g. looking for upgrades) it will leak the DNS requests up to your router even if you are otherwise configured to use Tor for everything.

Also be mindful that in the case of travel (roaming) your MAC is not morphing with every hotspot you hit. Tails, in contrast, enforces this and won't even allow your interface to come up if mac spoof fails.

For those who need an explanation about the "arbitrary" limit of password lengths in Android device encryption: it is so the upper threshold is within the capacity of a supercomputer to break. That means roughly 80~ bits of strength at maximum.

How do I know this?

Two reasons:

(1) If you try different passwords at about that length you come to 80~ bits.

(2) Encryption mathematics (the actual mathematics) require 80+ bits of security to be considered "not broken".

Download ETA: 3 hours.

I didn't have anything to do today anyway!

Show older
Merovingian Club

A club for red-pilled exiles.