CameronDev

joined 1 year ago
MODERATOR OF
[–] [email protected] 1 points 5 hours ago* (last edited 5 hours ago) (1 children)

Very weird. Maybe its the client. Can't see it in the browser either

Ah, I see whats happened, you didnt put anything in the square brackets:

[](https://www.freecodecamp.org/news/shell-scripting-crash-course-how-to-write-bash-scripts-in-linux/)

should be:

[Cool Tutorial](https://www.freecodecamp.org/news/shell-scripting-crash-course-how-to-write-bash-scripts-in-linux/)

resulting in:

Cool Tutorial

[–] [email protected] 2 points 7 hours ago (3 children)

Psst, you link has gone missing

[–] [email protected] 2 points 11 hours ago* (last edited 11 hours ago) (1 children)

~~See the red and white dashed line? That's the width of a 6 lane freeway.~~

Edit: joke clearly unappreciated, here is a photo with people standing next to it: https://arpa-e.energy.gov/news-and-media/blog-posts/arpa-e-investor-update-vol-17-realta-fusion-magnetic-mirror

[–] [email protected] 20 points 1 day ago (1 children)

Or the stats are just bad. There is a lot of volatility in those numbers.

Also, crowd strike predominately affected enterprises, which aren't going to pivot to Linux in a month, it would be a many year long plan and rollout.

[–] [email protected] 16 points 1 day ago

That honestly sounds like a great idea for everyone. You can try on clothes and see how they look in different light levels.

[–] [email protected] 1 points 2 days ago (1 children)

I think both solutions are fine, but 2 might be the best usability?

I think those docs are typically called white papers.

Its hard to get past those biases, but its a valuable skill to critically review your own work. And it feels better on your wallet to find bugs before paying for a third party review :)

I'm not an expert in this field, so I have never heard of ProVerif, it definitely looks interesting though, and wouldn't hurt to try?

[–] [email protected] 1 points 3 days ago* (last edited 3 days ago) (3 children)

I am not really sure what the real solution is beyond creating the out of band method of validating the public key. Historically, this would be done by publishing your public gpg key to a 3rd party key server. Most modern apps use a qr code (I don't know how this works, may require research) you can scan when you physically meet, or scan over a different medium (email, SMS etc).

The problem with relying on the random number is that E can decrypt the message from A, and then reencrypt it and send it to B. B won't know it has been inspected enroute. So B could call A and tell them the random number, but it wouldnt actually be secure. Also, if later in the chat A were to tell B, "My public key is XYZ", E could detect that and alter it to " My public key is ABC" before sending it on to B.

If A can generate a hash of the B's public key, and B also makes a hash, they can call each other and compare, and if the hashes don't match, E is listening. I think that is all you need, a way to present the public key to the users so they can validate it manually.

Aside, but I don't think it is a good idea for you to spend money on an audit yet. Spend some time trying to break your own system, by creating the malicious E server. You can then tweak and adjust your scheme until E is either impossible or trivially detectable. Unless this become a large scale venture, an audit isn't worth it, and I get the impression this is more of a learning exercise for yourself? Also, once you are finalised, write up a paper on your scheme. Something like: https://signal.org/docs/specifications/x3dh/. Crypto experts will be able to easily validate that your scheme based on the paper. Crypto people can easily validate your scheme based on the paper..

[–] [email protected] 1 points 3 days ago (5 children)

Okay, that is not a way to validate the other users public key, all that does is validate the other ends public key. The other end and the other user are not the same thing.

If this was a malicious server (or a MitM server), the way it would work is:

A wants to speak to B. The server lies, and instead of giving B's public key, gives E. The server has the public and private keys for E.

A generates the hash, and encrypts it with what it thinks is B's public key. The server completes the rest of your "handshake". A has no idea that A is handshaking with E instead of B. B will also handshake with E. The server can then decrypt everything between A and B, and A and B have no idea they are using the wrong keys.

Unless A and B meet and compare public keys, they can't know that something is up.

[–] [email protected] 4 points 3 days ago

There is new futerama episodes! I have clearly been hiding under a rock. Seems its trapped on Disney+ for me, shame.

[–] [email protected] 1 points 3 days ago (7 children)

I wasn't planning on reusing that ID, it was an incognito tab.

Without a way for users to validate each others public keys, at most I think you can claim is that your chat has encryption. To be properly e2ee, users need a way to validate each others public keys via a side channel, so they can be sure there is no MitM.

Also, I notice that you claim your app is decentralised, but I don't think that is true? There is no federation or similar, so if two users want to talk, they must use the same server?

[–] [email protected] 1 points 3 days ago (9 children)

Less code/complexity is less chance for bugs, which is why I suggest it might not be wise to add more layers.

The extra layer of encryption may give you something if the webrtc connection is assumed to be mitm'd, but you still need a way the ensure that your internal crypt is appropriately mitm resistant. On signal, this is achieved with the safety numbers that you must verify in a separate channel (IRL/email/other).

Do you have a way to do that? Is the last part of the invite URL the public key? - https://chat.positive-intentions.com/#/login/60c01cecb60530e79c0f9d90cee6642d

If not, the malicious server can simply do the handshake to both clients separately and decrypt/log/reencrypt the messages. If I am not explaining it clearly, let me know and I'll try again.

[–] [email protected] -1 points 3 days ago (11 children)

I am not an expert either (anyone claiming to be so is knee-deep in dunning-kruger), but here are some thoughts:

Why are you adding an additional layer of complexity to webrtc? It has e2ee already?

How does a user validate that they are actually e2ee? Could a malicious server pretend to support your protocol and decrypt everything?

 

Hi All. I have been watching a lot of House lately, and just started "Extrodinary Attorney Woo". I am curious to know what you all think of their portrails of Autism. Is it pandering? Representation? Romantisation?

Also see "The Good Doctor", "Atypical", "Love on the spectrum" etc.

12
Cutting Garolite (G10) (programming.dev)
submitted 6 months ago* (last edited 6 months ago) by [email protected] to c/[email protected]
 

I posted here a while back when my glass bed failed. One of the suggestions was to replace with Garolite or G10. My sheet finally arrived and i set about cutting it down to size.

...

Within 4cm, my basically unused jigsaw blade was worn flat, and by the end of the first cut (20cm), there is basically no more teeth.

For the second side, I tried using a multitool cutter, and within a few millimeters it was visibly blunt (plastic and metal tools). Finished it off with a standard wood hand saw, which seemed to go better.

So warning to anyone considering garolite, dont use power tools, it will fuck them up.

9
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Day 25: Snowverload

Megathread guidelines

  • Keep top level comments as only solutions, if you want to say something other than a solution put it in a new post. (replies to comments can be whatever)
  • You can send code in code blocks by using three backticks, the code, and then three backticks or use something such as https://topaz.github.io/paste/ if you prefer sending it through a URL

FAQ

8
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Day 24: Odds

Megathread guidelines

  • Keep top level comments as only solutions, if you want to say something other than a solution put it in a new post. (replies to comments can be whatever)
  • You can send code in code blocks by using three backticks, the code, and then three backticks or use something such as https://topaz.github.io/paste/ if you prefer sending it through a URL

FAQ

8
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Day 22: A Long Walk

Megathread guidelines

  • Keep top level comments as only solutions, if you want to say something other than a solution put it in a new post. (replies to comments can be whatever)
  • You can send code in code blocks by using three backticks, the code, and then three backticks or use something such as https://topaz.github.io/paste/ if you prefer sending it through a URL

FAQ

6
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Day 22: Sand

Megathread guidelines

  • Keep top level comments as only solutions, if you want to say something other than a solution put it in a new post. (replies to comments can be whatever)
  • You can send code in code blocks by using three backticks, the code, and then three backticks or use something such as https://topaz.github.io/paste/ if you prefer sending it through a URL

FAQ

12
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Day 21: Step

Megathread guidelines

  • Keep top level comments as only solutions, if you want to say something other than a solution put it in a new post. (replies to comments can be whatever)
  • You can send code in code blocks by using three backticks, the code, and then three backticks or use something such as https://topaz.github.io/paste/ if you prefer sending it through a URL

FAQ

13
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Day 20: Pulse

Megathread guidelines

  • Keep top level comments as only solutions, if you want to say something other than a solution put it in a new post. (replies to comments can be whatever)
  • You can send code in code blocks by using three backticks, the code, and then three backticks or use something such as https://topaz.github.io/paste/ if you prefer sending it through a URL

FAQ

5
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Day 19: Aplenty

Megathread guidelines

  • Keep top level comments as only solutions, if you want to say something other than a solution put it in a new post. (replies to comments can be whatever)
  • You can send code in code blocks by using three backticks, the code, and then three backticks or use something such as https://topaz.github.io/paste/ if you prefer sending it through a URL

FAQ

11
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Day 18: Lavaduct Lagoon

Megathread guidelines

  • Keep top level comments as only solutions, if you want to say something other than a solution put it in a new post. (replies to comments can be whatever)
  • You can send code in code blocks by using three backticks, the code, and then three backticks or use something such as https://topaz.github.io/paste/ if you prefer sending it through a URL

FAQ

12
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Day 17: Clumsy Crucible

Megathread guidelines

  • Keep top level comments as only solutions, if you want to say something other than a solution put it in a new post. (replies to comments can be whatever)
  • You can send code in code blocks by using three backticks, the code, and then three backticks or use something such as https://topaz.github.io/paste/ if you prefer sending it through a URL

FAQ

 

I have a moderately long HDMI cable running to a screen that has worked for quite a while. Recently the screen lost its connection. I replaced the cable with the exact same model of HDMI cable, and its all good. The cables arent frequently inserted or removed, and they are otherwise in good condition. I have no idea how or why this could happen. Any ideas?

view more: next ›