Trump cuts funding to FOSS projects.
-
cross-posted from: https://programming.dev/post/28204065
As far as Let's Encrypt goes, the easy way to solve that is self-signed SSL certificates and Tofu. Just make it stupid obvious if an SSL certificate changes on a site that you go to. Like, turn your browser into a giant red screen that says that the security of the website has changed and may be broken obvious. Maybe you could have search engines also index SSL certificates so you could see if Google and Bing and DuckDuckGo and whoever else all say that this website has the same SSL certificate that it has had for X amount of time and if the search engines start showing different results you get suspicious
-
... Except not using it would be less secure, so I'm not sure I'm following..
-
cross-posted from: https://programming.dev/post/28204065
Well, tbh. If its my last time being president, I would also burn everything to show how the country sucks an is irrepairable.
-
I did not knew that Tor was getting funded by the american state. Thats giving me some spooky vibes.
More exactly by Defense and secret services
-
http://longeepsiteaddress.i2p. Bonus points for having an option for a human-readable domain as well.
-
... Except not using it would be less secure, so I'm not sure I'm following..
Don't confuse TOR with security, you can get exposed to use the Onion without an additional encrytion layer or VPN. TOR cannot encrypt the traffic between an exit relay and the destination server.
-
cross-posted from: https://programming.dev/post/28204065
the guy is literally a political front for techbros, it's not like he would do something else.
-
http://longeepsiteaddress.i2p. Bonus points for having an option for a human-readable domain as well.
But i2p doesnt have PoW DDOS protection. Trust me, that shit helps a fuckton for limiting ddos. I witnessed firsthand nine onion services that upgraded from not having DDOS protection to having DDOS protection while under attack and the attack completely stopped.
-
Don't confuse TOR with security, you can get exposed to use the Onion without an additional encrytion layer or VPN. TOR cannot encrypt the traffic between an exit relay and the destination server.
Sure, like any security it operates in layers
Totally disagree that Tor does not address security. The loophole you mention is indeed well known, but again it's an exploit like anything
And like any security thing, you stack a few layers to get the real world security
-
cross-posted from: https://programming.dev/post/28204065
Wait you guys were getting paid to work on open source?
-
the guy is literally a political front for techbros, it's not like he would do something else.
Those mf build their empires on the back of open source.
-
Sure, like any security it operates in layers
Totally disagree that Tor does not address security. The loophole you mention is indeed well known, but again it's an exploit like anything
And like any security thing, you stack a few layers to get the real world security
The TOR network is certainly pretty secure, but it's always advisible to use it in the Onion not without an additional layer, at least with a good VPN. Anyway I think that the future is in a descentralized web (I2P, Hyphanet, Snowflake, Shadowsocks and similar), the normal Internet is to heavy controlled by big companies and govs.
-
cross-posted from: https://programming.dev/post/28204065
Make America great again
-
the enemy is both weak and strong
The appropriate sequence of events would be:
Trump starts tariffs > People switch to FOSS > Trump cuts funding to FOSS
This really isn't double-speak and, if anything, clearly shows the hostility of the admin. They are just incompetent, short-sighted, and overall an enemy of the people.
-
I did not knew that Tor was getting funded by the american state. Thats giving me some spooky vibes.
One theory is that Tor was opened to the public by the United States Naval Research Laboratory only to create a crowd of users for their agents to hide in.
-
.gov is using let's encrypt? That's pathetic.
Theyre more likely paying godaddy thousands a year for each cert on domains that go back decades.
-
But i2p doesnt have PoW DDOS protection. Trust me, that shit helps a fuckton for limiting ddos. I witnessed firsthand nine onion services that upgraded from not having DDOS protection to having DDOS protection while under attack and the attack completely stopped.
Edit: ...a decentralized Monero exchange
There's the Monero shilling I expect in every comment
-
As far as Let's Encrypt goes, the easy way to solve that is self-signed SSL certificates and Tofu. Just make it stupid obvious if an SSL certificate changes on a site that you go to. Like, turn your browser into a giant red screen that says that the security of the website has changed and may be broken obvious. Maybe you could have search engines also index SSL certificates so you could see if Google and Bing and DuckDuckGo and whoever else all say that this website has the same SSL certificate that it has had for X amount of time and if the search engines start showing different results you get suspicious
Never heard of tofu before (the software). What is it?
I had heard about DANE and how that would help in scaling back the need for big CAs but I could never grasp how one would do that. Do you know about it? I'm looking for someone to explain it to me.
-
the guy is literally a political front for techbros, it's not like he would do something else.
Tech bros are only interested in getting the results from open source. They want the free software from their slaves, they aren't interested in paying anything.
Tech companies, for a while, added a bit to open source as it was in their own self interest, but they still shut out everything that wasn't them, they still make the internet in the horrible stonewalled garden that it is today. No account? Half the internet isn't accessible to you anymore
Fuck all the big tech and social media companies
-
Never heard of tofu before (the software). What is it?
I had heard about DANE and how that would help in scaling back the need for big CAs but I could never grasp how one would do that. Do you know about it? I'm looking for someone to explain it to me.
Tofu stands for Trust on First Use. So basically, you would get an SSL certificate from the website the very first time you connected to it, instead of trusting a certificate authority. Then, if the SSL certificate changed, you would then be warned that the certificate had changed and would have to decide whether to trust the new certificate or not trust the new certificate. That's why I said perhaps search engines could index certificates and tell you how long the certificate has been active and you could check several engines quickly to determine whether each engine has the same certificate indexed for the same website and if they did not then you would know something might be up.