• 0 Posts
  • 237 Comments
Joined 1 year ago
cake
Cake day: July 29th, 2023

help-circle







  • ITT: Braindeads defending government censorship of the internet as if Zuckerberg won’t immediately replace the void with his own platform or by buying out TikTok in a bid.

    Banning one platform would not magically get rid of short attention span and brainrot you fools. Every social media company already copied or utilizes the same techniques as TikTok, which is already a massive platform because they don’t spam ban or regulate content as hard as Facebook and YouTube do.

    It is insulting that a Chinese run social media platform provides more freedom of speech online than its US competitors.

    They’re banning it to remove competition, congress does not care about its effects on privacy or health, otherwise they’d have done something about Faceebook, Insta, Twiiter, and YouTube decades ago. They pulled their usual committee shenanigans to pretend to care by calling in CEOs to testify, and then promptly accepting a shitload of lobbying money.



  • The TPM is not a dedicated cryptographic processor, it’s an external keystore with a few select functions. You’re thinking of an HSM which is used almost exclusively in servers that have to handle thousands of secrets per second.

    CPUs have had dedicated AES hardware for decades which is why LUKS and Bitlocler use it by default.

    The TPM just allows certain keys and secrets to be generated and stored physically separate from the CPU as a security measure.

    Bitlocker and LUKS will store a master key in the TPM so that you don’t have to enter a password every time you boot. They retrieve it from the TPM and then use it to unlock the actual encryption key which is done entirely in the CPU. If the TPM detects foul play such as secure boot alteration, it will refuse to give the key or clear itself.

    Using the TPM for constant encryption like at rest disk encryption would be way too slow.

    It’s so so small that most modern TPMs have been integrated into the CPU or even simulated via the motherboard firmware (fTPM and PTT).


  • I still fail to see how windows 11 was anything but a collusion scam to sell new hardware.

    None of the changes including TPM requirements required a new iteration. Nothing about the underlying NT dropped any of the old and antiquated BS despite Microsoft hiring some morons to advertise the fact on reddit to all the insiders asking questions.

    They even let the media pick up a fake report that Windows 11 was related to the Core OS and a brand new kernel was in the works.

    If Microsoft wanted a marketing strategy, they could have properly started naming feature updates and adverising them similar to Apple.

    8, 10, and 11 have also been a pain on enterprise because Microsoft axed their QA team. I seriously hope any new firms start considering linux desktop as a valid option. All they really need is a vendor to offer a solid distro along with an agreement to rapidly create/deploy any software solution so they don’t get scared looking at the cheap entry windows stuff.


  • The Fedora doc on this is a bit old but it’s still mostly the same:

    Secure boot activates a lock-down mode in the Linux kernel which disables various features kernel functionality:

    • Loading kernel modules that are not signed by a trusted key.
    • Using kexec to load an unsigned kernel image.
    • Hibernation and resume from hibernation.
    • User-space access to physical memory and I/O ports.
    • Module parameters that allow setting memory and I/O port addresses.
    • Writing to MSRs through /dev/cpu/*/msr.
    • Use of custom ACPI methods and tables.

    The implementation of secure boot is still questionable to this day, but it is understandable that it doesn’t always play nice with Linux. I do believe you can use hibernate now as long as you have an encrypted swap (LUKS).

    I can definitely see the pain if you happen to be a kernel dev or use linux on any SBC with IO ports you want to mess with in userspace and not make en entire overkill kernel module for.


  • The main thing they are trying to do is make it more difficult to find this stuff via google, which tbh is still easy without reddit.

    But even Switch homebrew has been a pain. Most of it is one off software made years ago because no sane dev wanted to actually keep up with all the firmware releases and limited control of CFW. Github/Gitlab repos keep getting banned left and right for tools not even related to piracy.

    3DS has full fledged apps with teams behind everything and HShop which makes it very easy for everyone. Switch still doesn’t have a definitive method of handling NSP/XCIs, and all the auto download internet repos are invite only to hide from Nintendo.

    I’m really hoping someone finds some serious hardware bypass in their next console after what they did to the emulation scene. They really deserve to go through the insane R4 piracy age all over again for nuking everything online.






  • Feature per dollar possibly yes. Technology itself not necessarily.

    The issue is the market was much more competitive 10+ years ago which led to rapid innovation and the need for rivals to keep up.

    Today that no longer exists in so many areas so a lot of existing tech has stagnated heavily.

    For example, Google Maps was a very solid platform in 2014 bringing in a ton of new navigation features and map generation tech.

    Today, the most solid consumer map nav is probably Tesla’s map which utilizes Valhalla, a very powerful open source routing engine, that’s also used on openstreetmap and OSMAnd.

    This is a very huge improvement from 2014 Google Maps.

    Except the most used map app is still essentially 2014 Google Maps because Google cornered the market so they no longer have any need to innovate or keep up. In fact it’s actually worse since they keep removing or breaking features every update in an attempt to lower their cloud running costs.

    You can apply this to a lot of tech markets. Android is so heavily owned by Google, no one can make a true competitor OS. Nintendo no longer needs to add big handheld features because the PSP no longer exists. Smart home devices run like total junk because everyone just plugs it into the same cloud backend to sell hardware. The de facto way to order things online is Amazon. Amazon is capable of shipping within a week, but chooses not to for free shipping to entice you into buying prime, and because they don’t have a significant competitor. Every PC sold is still spyware windows because every OEM gets deals with Microsoft to sell their OS package.

    Even though the hardware always improves, the final OEM can screw it all up by simply delivering an underwhelming product in a market they basically own, and people will buy because there is no other choice or competition to compare to.


  • mlg@lemmy.worldtoFediverse@lemmy.worldI really want to like Lemmy
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    1 month ago

    Jokes on you the political content here is from the redditors who pretended to quit their award fueled addiction by also joining lemmy.

    Seriously though, compare c/Politics to c/Worldnews or c/News. There is a very large dissonance between the comments shared despite both communities posting the same news info…


  • I thought it was already fairly well established that symmetric encryption is not something that a quantum computer could potentially crack, only asymmetric encryption is theoretically possible due to its use of a prime order field.

    Shor’s algorithm is a quantum algorithm for finding the prime factors of an integer. It was developed in 1994 by the American mathematician Peter Shor.[1][2] It is one of the few known quantum algorithms with compelling potential applications and strong evidence of superpolynomial speedup compared to best known classical (non-quantum) algorithms

    a quantum computer with a sufficient number of qubits could operate without succumbing to quantum noise and other quantum-decoherence phenomena, then Shor’s algorithm could be used to break public-key cryptography schemes, such as

    • The RSA scheme
    • The Finite Field Diffie-Hellman key exchange
    • The Elliptic Curve Diffie-Hellman key exchange

    Moreover:

    The largest number reliably factored by Shor’s algorithm is 21 which was factored in 2012 (ie faster than a regular computer, the much higher records like 48 bit utilized pre and post processing and was faster on a regular computer).

    Even if we go with the assumption that the military is 10 years ahead in technology and can factor 221 with Shor’s, that’s still nowhere near enough to break RSA. Much more efficient to attack all the systemic flaws in RSA, hence why 1024 is no longer considered secure, 2048 is assumed to be breakable by any 3 letter agency, 4096 is assumed to be safe (for now), but mostly the latest and greatest is elliptical ECDSA/Ed25519 (of which NIST has been accused of rigging ECDSA for easier cracking lol).