Arthur Besse
cultural reviewer and dabbler in stylistic premonitions
- 33 Posts
- 190 Comments
Obviously the criminal here is the person who asked the question and posted a screenshot of the answer.
1 reason it’s wrong to me: https://nosystemd.org/
Under “Notable bugs and security issues” there is a big list of issues which were all (afaict) fixed many years ago.
There have been reasonable philosophical objections to systemd, some of which are still relevant, and as that site shows there are still many distros without it, but for the vast majority of desktop users who want something that JustWorks… using a mainstream distro with systemd is the way to go.
This blog post from pmOS covers some of the pain of trying to use KDE or GNOME without it.
Arthur Besse@lemmy.mlto
Asklemmy@lemmy.ml•What's the oldest video game you still find yourself playing?English
1·3 days agoMicrochess was first commercially available in 1976, but chess software was being published long before that.
See also: https://www.chessprogramming.org/History#Famous_Historic_Computers_and_Programs
Arthur Besse@lemmy.mlOPMto
Linux@lemmy.ml•Linux kernel version numbers (Greg Kroah-Hartman's blog)English
21·5 days agoWould be easier to know how old a kernel release is without looking it up.
I concur, but it would be much easier to make the major version the current year (as many projects do, and Linux should imo) rather than the whole project’s age at the time of a release.
Linux is only 34 years old, btw.
Arthur Besse@lemmy.mlto
Privacy@lemmy.ml•A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip CodeEnglish
1·9 days agoNo. Unless Stripe has also implemented the ZK protocol in their whitepaper (which i’m sure they haven’t) then whatever PCI stuff Stripe does is entirely unrelated to the privacy guarantees implied by phreeli’s new protocol.
Arthur Besse@lemmy.mlto
Privacy@lemmy.ml•A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip CodeEnglish
2·11 days agoIf a payment processor implemented this (or some other anonymous payment protocol), and customers paid them on their website instead of on the website of the company selling the phone number, yeah, it could make sense.
But that is not what is happening here: I clicked through on phreeli’s website and they’re loading Stripe js on their own site for credit cards and evidently using their own self-hosted thing for accepting a hilariously large number of cryptocurrencies (though all of the handful of common ones i tried yielded various errors rather than a payment address).
Arthur Besse@lemmy.mlto
Privacy@lemmy.ml•A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip CodeEnglish
4·11 days agoSo like, it’s a situation where the “lock” has 2 keys, one that locks it and one that unlocks it
Precisely :) This is called asymmetric encryption, see https://en.wikipedia.org/wiki/Public-key_cryptography to learn more, or read on for a simple example.
I thought if you encrypt something with a key, you could basically “do it backwards” to get the original information
That is how it works in symmetric encryption.
In many real-world applications, a combination of the two is used: asymmetric encryption is used to encrypt - or to agree upon - a symmetric key which is used for encrypting the actual data.
Here is a simplified version of the Diffie–Hellman key exchange (which is an asymmetric encryption system which can be used to agree on a symmetric key while communicating over a non-confidential communication medium) using small numbers to help you wrap your head around the relationship between public and private keys. The only math you need to do to be able to reproduce this example on paper is exponentiation (which is just repeated multiplication).
Here is the setup:
- There is a base number which everyone uses (its part of the protocol), we’ll call it
gand say it’s 2 - Alice picks a secret key
awhich we’ll say is 3. Alice’s public keyAis ga (23, or2*2*2) which is 8 - Bob picks a secret key
bwhich we’ll say is 4. Bob’s public keyBis gb (24, or2*2*2*2) which is 16 - Alice and Bob publish their public keys.
Now, using the other’s public key and their own private key, both Alice and Bob can arrive at a shared secret by using the fact that Ba is equal to Ab (because (ga)b is equal to g(ab), which due to multiplication being commutative is also equal to g(ba)).
So:
- Alice raises Bob’s public key to the power of her private key (163, or
16*16*16) and gets 4096 - Bob raises Alices’s public key to the power of his private key (84, or
8*8*8*8) and gets 4096
The result, which the two parties arrived at via different calculations, is the “shared secret” which can be used as a symmetric key to encrypt messages using some symmetric encryption system.
You can try this with other values for
g,a, andband confirm that Alice and Bob will always arrive at the same shared secret result.Going from the above example to actually-useful cryptography requires a bit of less-simple math, but in summary:
To break this system and learn the shared secret, an adversary would want to learn the private key for one of the parties. To do this, they can simply undo the exponentiation: find the logarithm. With these small numbers, this is not difficult at all: knowing the base (2) and Alice’s public key (8) it is easy to compute the base-2 log of 8 and learn that
ais 3.The difficulty of computing the logarithm is the difficulty of breaking this system.
It turns out you can do arithmetic in a cyclic group (a concept which actually everyone has encountered from the way that we keep time - you’re performing
mod 12when you add 2 hours to 11pm and get 1am). A logarithm in a cyclic group is called a discrete logarithm, and finding it is a computationally hard problem. This means that (when using sufficiently large numbers for the keys and size of the cyclic group) this system can actually be secure. (However, it will break if/when someone builds a big enough quantum computer to run this algorithm…)- There is a base number which everyone uses (its part of the protocol), we’ll call it
Arthur Besse@lemmy.mlto
Privacy@lemmy.ml•A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip CodeEnglish
8·11 days agoMuch respect to Nick for fighting for eleven years against the gag order he received, but i’m disappointed that he is now selling this service with cryptography theater privacy features.
Arthur Besse@lemmy.mlto
Privacy@lemmy.ml•A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip CodeEnglish
4·11 days agoCan someone with experience doing ZK Proofs please poke holes in this design?
One doesn’t need to know about zero-knowledge proofs to poke holes in this design.
Just read their whitepaper:
You can read the whole thing here but I’ll quote the important part: (emphasis mine)
Double-Blind Armadillo (aka Double Privacy Pass with Commitments) is a privacy-focused system architecture and cryptographic protocol designed around the principle that no single party should be able to link an individual’s real identity, payments, and phone records. Customers should be able to access services, manage payments, and make calls without having their activity tracked across systems. The system achieves this by partitioning critical information related to customer identities, payments, and phone usage into separate service components that communicate only through carefully controlled channels. Each component knows only the information necessary to perform its function and nothing more. For example, the payment service never learns which phone number belongs to a person, and the phone service never learns their name.
Note that parties (as in “no single party”) here are synonymous with service components.
So, if we assume that all of the cryptography does what it says it does, how would an attacker break this system?
By compromising (or simply controlling in the first place) more than one service component.
And:

I don’t see any claim that any of the service components are actually run by independent entities. And, even if they were supposedly run by different people, for the privacy of this system to stop being dependent on a single company behind it doing what they say they’re doing, there would also need to be some cryptographic mechanism for customers to verify that the independent entities supposedly operating different parts were in fact doing so.
In conclusion, yes, this is mostly cryptography-washing. Assuming good intentions (eg not being compromised from the start), the cryptographic system here would make it slightly more work for them to become compromised but does not really prevent anything.
The primary thing accomplished by cryptography here over just having a simple understandable “we don’t record the link between payment info and phone numbers, but you’ll just have to trust us on that” policy is to give potential customers a (false) sense of security.
Arthur Besse@lemmy.mlto
Privacy@lemmy.ml•A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip CodeEnglish
2·11 days agoSMS can have end to end encryption
in theory it can, but in practice i’m not aware of any software anyone uses today which does that. (are you? which?)
TextSecure, the predecessor to Signal, did actually originally use SMS to transport OTR-encrypted messages, but it stopped doing that and switched to requiring a data connection and using Amazon Web Services as an intermediary long ago (before it was merged with their calling app RedPhone and renamed to Signal).
edit: i forgot, there was also an SMS-encrypting fork of TextSecure called SMSSecure, later renamed Silence. It hasn’t been updated in 5 (on github) or 6 (on f-droid) years but maybe it still works? 🤷
Arthur Besse@lemmy.mlto
Privacy@lemmy.ml•A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip CodeEnglish
5·11 days agoa summary can be helpfull
No. LLMs can’t reliably summarize without inserting made-up things, which your now-deleted comment (which can still be read in the modlog here) is a great example of. I’m not going to waste my time reading the whole thing to see how much is right or wrong but it literally fabricated a nonexistent URL 😂
Please don’t ever post an LLM summary again.
your commitment to the bit is truly laudable 🤣
how about we just try it first
😭
when this is over […] we can finally go back

Arthur Besse@lemmy.mlto
Open Source@lemmy.ml•MPV: The Ultimate Self-Hosted Media Solution You're Probably Sleeping OnEnglish
1·21 days agono transcoding quality loss
is jellyfin actually transcoding when people don’t want it to?!
otherwise, “no transcoding” doesn’t sound like a feature. transcoding is very useful when you actually need it, eg watching something remotely which is stored at a higher bitrate than your network connection can stream. one way to do it with mpv is ffmpegfs, btw.
(fellow mpv user here; i’ve only used other people’s jellyfin instances… but i’d be very surprised if they’re always unnecessarily transcoding everything they watch.)
Arthur Besse@lemmy.mlMto
Memes@lemmy.ml•We'll Hang Don Chafin From a Sour Apple TreeEnglish
3·21 days ago
Arthur Besse@lemmy.mlMto
Memes@lemmy.ml•We'll Hang Don Chafin From a Sour Apple TreeEnglish
41·21 days agoDon’t do this stupid shit. Advocating for violence like this
I’m curious, did you read about Don Chafin before posting this comment?
check out the song too: Hang Don Chafin
Arthur Besse@lemmy.mlto
Asklemmy@lemmy.ml•Does anyone remember a mahjong game where the tiles were completely solid different color tiles, it was a digital game I thinkEnglish
41·24 days agothey were just solid colored without symbols
you are describing a tile-based game other than mahjong
Arthur Besse@lemmy.mlMto
Linux@lemmy.ml•The ChromeOS of Linux: Basic use cases, impossible to break, ~1,000 happy(?) users, Nix based. Nixbook OS.English
8·25 days agoI have to ask: what’s with all the obsession with immutable distro?
I guess the promise of having updates JustWork™? I don’t currently use one but I see the appeal.
However FWIW, unlike its namesake ChromeOS, the “Nixbook OS” this post is about is not actually an immutable distro: the instructions are to install NixOS normally and then clone the nixbook repo into
/etc/nixbookand run itsinstall.sh. Among other things it installs an update service which runs git pull on that repo as well as runningnixos-rebuild boot --upgradeandflatpak update --noninteractive --assumeyesetc.Cheers to this guy for what he’s doing, but the name is a little confusing. This approach works but it is not nearly as robust as the immutable distro paradigm implied by the name.












https://en.wikipedia.org/wiki/Outdoor_advertising#Regulations billboards are banned in several cities and, surprisingly, in four entire states of the US.