• 4 Posts
  • 93 Comments
Joined 1 year ago
cake
Cake day: August 10th, 2023

help-circle
  • You’re probably going to end up on Jitsi meet, but I’m also going to drop a recommendation for bigbluebutton.

    I recently noticed that it was integrated into the open source Learning-Management-System Canvas, which every school I have gone to so far uses.

    Although bigbluebutton doesn’t seem to explicitly support e2ee (but maybe this counts for something), if you are already using Canvas, BigBlueButton definitely worth looking at.

    I really, really wish people at my school would use the integrated bigbluebutton instead of using zoom, especially given I’ve seen people occasionally have issues with authentication for zoom, but all of that stuff is handled with bigbluebutton because it’s fully browser based and integrated into Canvas.









  • https://help.kagi.com/orion/faq/faq.html#oss

    We’re working on it! We’ve started with some of our components and intend to open more in the future.

    The idea that “open-source = trustworthy” only goes so far. For example, the same tech company that offers a popular open-source browser also has the largest ad/tracking network in history, with that browser playing a significant role in it. Another company with a closed-source browser (using WebKit like Orion) is on the forefront of privacy awareness and technologies in its products.

    So, does anyone here remember when all chromium browsers had a secret api that sent extra data to google? Brave, Opera, and Edge got hit by this one, but I think Vivaldi dodged it. They all removed this after they found out, but still…

    When it comes to things like browsers, due to the sheer complexity and difficulty to truly audit chromium, I don’t really consider chromium to be “open source” in the same sense as many other apps. Legally, you can see and edit the code. But in practice, it’s impossible to audit all of it, and the development is controlled by a single corporation who puts secrets in it, or removes features that harm their interests (manifest v3). Personally, I consider Minecraft Java to be closer to open source than chromium is.

    To say that:

    The idea that “open-source = trustworthy” only goes so far

    is really just a cop-out and excuse for not being transparent with their code and what they are doing.


  • Yeah. this was in high school, in my math class, and we were playing a math game.

    The way it worked, was that every table was a team, and each team had a “castle” drawn up onto the whiteboard. A random spinner was used to determine a team, who would then solve a problem the teacher assigned. If you successfully solved the problem, you could draw an X on another teams castle. 3 X’s mean that you are out.

    My team was out. But, since this was a class, we could still solve problems, and still draw X’s. Our table got selected to solve a problem, and I did successfully. I looked at the board, and realized that only two teams had a single X, every other team had either two or three. In other words, I could choose who won the game, even though I could not win.

    So, I started trying to get bids. I tried to get real money, but someone tried to scam me with some “draw the X first” nonsense. But, the other team offered to pay me four of the school’s fake money, and I accepted that and allowed them to win.

    I may not have won the game, but I certainly felt victorious that day.




  • Is it possible to allow DRM content for just 1 website ( Netflix ) , while other websites on the same browsers are not allowed to do it?

    I would use multiple firefox profiles for this. If you go to about:profiles or use the command firefox -P to launch firefox, you can view and create other firefox profiles. Each firefox profile is essentially it’s own instance of firefox, complete with different history, extensions, and setting. You could have a “Netflix” profile and a regular browsing profile.


  • Stallman doesn’t seem to get that pedophilia is wrong because of the hierarchy of power, and the power imbalances between older/younger people, not because of some inherent wrongness about being attracted to a prepubescent person. This is shown by how he condemns some pedophilia, but is accepting of 12+/past puberty. (I despise this logic, because it would also make gay sex and sodomy wrong, as well).

    I find this deeply ironic, because his primary issue with proprietary software is the way that it gives developers levels of power over users. From his article Why Open Source Misses the Point

    But software can be said to serve its users only if it respects their freedom. What if the software is designed to put chains on its users? Then powerfulness means the chains are more constricting, and reliability that they are harder to remove.

    You would expect someone who is so in tune with the hierarchies that appear with software developers, publishers, and users, to also see those same hierarchies echoed in relationships between people of vastly different ages, but instead, we get this. I’m extremely disappointed.

    These failures to understand hierarchy and power, are exactly why Stallman shouldn’t be in a position of power. Leaders should continually prove that they understand hierarchy and the effects of their actions on those below them. Someone who doesn’t understand how their power could affect another, shouldn’t be a leader.



  • Thorium’s entire focus is on performance. As another commenter has noted, that means no security updates, and no privacy features.

    I wouldn’t recommend it for daily use, but if you are playing a browser based game it’s worth testing out. I used to play krunker.io and I tested it to see if I could get more FPS (FPS equaled faster movement speed back then), but I didn’t see any major performance improvements over the major krunker clients or Microsoft Edge (other most performant browser).


  • I cannot find anything related to that in their documentation, their about page, or their whitepaper.

    They talk a lot about decentralized computing, but any form of secure enclave or code verification isn’t mentioned.

    Compare that to this project, which is similar, but incomplete. However, quilibrium uses it’s own language instead of python or javascript, like golem does. The docs for golem do not explain how I am supposed to verify a remote server is actually running my python/javascript code.




  • There is concern amongst critics that it will not always be possible to examine the hardware components on which Trusted Computing relies, the Trusted Platform Module, which is the ultimate hardware system where the core ‘root’ of trust in the platform has to reside.[10] If not implemented correctly, it presents a security risk to overall platform integrity and protected data

    https://en.m.wikipedia.org/wiki/Trusted_Computing

    Literally all TPM’s are proprietary. It’s basically a permanent, unauditable backdoor, that has had numerous issues, like this one (software), or this one (hardware).

    We should move away from them, and other proprietary backdoors that deny users control over there own system, rather than towards them, and instead design apps that don’t need to trust the server, like end to end encryption.

    Also: if software is APGL then they are legally required to give you the source code, behind the server software. Of course, they could just lie, but the problem of ensuring that a server runs certain software also has a legal solution.