[-] TaviRider@reddthat.com 3 points 2 weeks ago

ICMP reveals your IP address, which is easily correlated with other traffic…

[-] TaviRider@reddthat.com 9 points 3 weeks ago

Ahh, “Weev” is a four-letter version of “Weave” the same way “Chex” is a shortened “Checkerboard”, perhaps referring to the Ralston Purina checkerboard logo.

[-] TaviRider@reddthat.com 5 points 3 weeks ago

But what’s Weev?

[-] TaviRider@reddthat.com 71 points 1 month ago

I still wouldn’t trust it because of homograph attacks.

[-] TaviRider@reddthat.com 30 points 2 months ago

There’s a fatal flaw in the premise. It is impossible to fasten something to a cat.

[-] TaviRider@reddthat.com 2 points 2 months ago

Yeah. The huge legal distinctions between different ways of unlocking a device seem absurd. Comprehensive privacy legislation would help.

[-] TaviRider@reddthat.com 48 points 2 months ago

Authorities with a warrant can drill into a safe to get to its contents. That’s legally distinct from forcing someone to unlock the safe by entering the combination. It takes some mental effort to enter a combination, so it counts as “testimony”, and in the USA people can’t be forced to testify against themselves.

The parallel in US law is that people can be forced to unlock a phone using biometrics, but they can’t be forced to unlock a phone by entering a passcode. The absurd part here is that the actions have the same effect, but one of them can be compelled and the other cannot.

328
submitted 2 months ago by TaviRider@reddthat.com to c/privacy@lemmy.ml

The legal situation is more complex and nuanced than the headline implies, so the article is worth reading. This adds another ruling to the confusing case history regarding forced biometric unlocking.

[-] TaviRider@reddthat.com 2 points 5 months ago

The downloadable shortcut described here also worked for me.

[-] TaviRider@reddthat.com 3 points 5 months ago

I assume you’re referring to Safari on iOS. I was able to select all on that Project Gutenberg page with a little-known scrolling trick:

  1. Scroll to the bottom of the page. Yes, this part is a bit annoying but I was able to do that in 8 seconds with 25 full-screen flicks.
  2. Long-press near the bottom of the page to start text selection.
  3. Grab the bottom lollipop and drag it to the end of the page to select the last character.
  4. Grab the top lollipop and drag it around a little to select more text. Don’t release it, and hold it still.
  5. With a different finger, tap the status bar at the top of the screen. This is a shortcut for scrolling to the top of the page. Give it a couple seconds to finish scrolling. If you move the lollipop at all while it’s scrolling it will interrupt the scrolling, so keep that finger still until it’s done.
  6. Now that you’re near the top of the page, drag the lollipop to the very top of the page and release it. The copy option should appear.
[-] TaviRider@reddthat.com 7 points 6 months ago

There’s no way to prove that something is secure. (It reduces to the halting problem.)

[-] TaviRider@reddthat.com 17 points 6 months ago

This is a terrible idea. It’s negligibly better than writing down the passwords, because it’s trivially easy to try every password represented on this card. Once someone has the card, your entropy is just two characters, which is the two characters you memorize for the site. In effect, you have a 2 character password.

[-] TaviRider@reddthat.com 2 points 9 months ago

I’d prefer a commander from Supreme Commander. It can raise an entire military by itself, and it’s much hardier than basic builders. It’s deadly up close. Even if you somehow defeat it, your reward is a nuclear explosion.

view more: next ›

TaviRider

joined 1 year ago