[-] KLISHDFSDF@lemmy.ml 1 points 1 day ago

A hypothesis requires no evidence.

Correct

It’s then tested through repeatable controlled experiments

repeatable controlled experiments are only one aspect of evidence gathering to falsify a hypothesis. Here are a few other methods:

  • Observational Astronomy
  • Modeling and Simulations
  • Indirect Experiments
  • Lab Experiments
  • Historical Data Analysis

By combining these methods we can still falsify a hypothesis, thus allowing "science to happen".

The events leading to the Big Bang have no evidence.

Correct! There is no evidence for what lead to the big bang because we can't gather any data before it started. But we have mountains of evidence that all point to a "big bang" happening - down to a fraction of a second shortly after it started! [1] [2] [3] [4] [5] [6] [7] [8] .

If science can hypothesize, why can’t religion?

Science is willing to discard ideas that lack evidence or aren't falsifiable. Is religion ready to stop preaching because faith, by definition, is a lack of evidence?

Have you read string theory? It’s no different than Spinoza’s god.

The difference between string theory and Spinoza's god is the falsifiable part. String Theory, being a scientific theory, makes predictions that should be able to be tested through experiments (although testing will likely be a challenge much like Astrophysics and will instead depend on other scientific methods to gather evidence for/against it). Spinoza's God is a philosophical concept and not directly falsifiable through scientific methods. Spinoza's god is the equivalent of me claiming I'm friends with a telepathic unicorn from another dimension, both useless and irrelevant.


[1] Gravitational Waves: https://www.smithsonianmag.com/science-nature/new-cosmic-discovery-could-be-closest-weve-come-beginning-time-180950109/

[2] Redshift: https://socratic.org/questions/how-does-a-redshift-give-evidence-to-the-big-bang-theory

[3] Cosmic Microwave Background Radiation: https://bigthink.com/starts-with-a-bang/cosmic-microwave-background-proves-big-bang/

[4] Abundance of Light Elements: https://map.gsfc.nasa.gov/universe/bb_tests_ele.html

[5] Expansion: https://map.gsfc.nasa.gov/universe/bb_tests_exp.html](https://www.space.com/52-the-expanding-universe-from-the-big-bang-to-today.html

[6] Olbers' Paradox: https://en.wikipedia.org/wiki/Olbers%27s_paradox

[7] Quasars Existence: https://www.astronomy.com/science/60-years-of-quasars/

[8] WMAP Survey: https://en.wikipedia.org/wiki/Wilkinson_Microwave_Anisotropy_Probe](https://www.britannica.com/topic/Wilkinson-Microwave-Anisotropy-Probe

[-] KLISHDFSDF@lemmy.ml 1 points 4 days ago

Are you familiar with Baruch Spinoza? His take is fascinating. His higher power did not concern itself with the fates of mankind, but is responsible for the lawful harmony of existence. It also does not discount or displace science in any way.

That's basic deism but I would disagree and say it does conflict with science. Science is evidence-based, if you claim something exists you must present evidence to support it. I can't just claim there's a 5-ton diamond in my backyard and say "trust me bro". Nobody would believe me, so why should anyone believe in any god without evidence?

[-] KLISHDFSDF@lemmy.ml 1 points 4 days ago

The last time Democrats controlled the House and Senate for more than a single term was with Jimmy Carter, 1977-1981 [0]. It's hard to make progress when Republicans are willing to shut the government down to prove how bad the government is. It's a self-fulfilling prophecy.

[0] https://www.spokesman.com/stories/2020/jun/25/control-house-and-senate-1900/

[-] KLISHDFSDF@lemmy.ml 32 points 5 days ago

... but worse!

[-] KLISHDFSDF@lemmy.ml 60 points 5 days ago

Germany, there's a time and place for everything. This is like supporting a "sovereign citizen's " right to freedom during a murderous rampage. It's giving "blue lives matter" during George Floyd's murder.

[-] KLISHDFSDF@lemmy.ml 30 points 6 days ago

What do terrorist holding hostages have to do with the indiscriminate murder, displacement and starvation of innocent women and children? Genuinely curious. Cops don't kill innocents when there's a hostage situation, why is Israel allowed to commit genocide in this situation? Can you explain?

[-] KLISHDFSDF@lemmy.ml 1 points 6 days ago

Continue to support policies (thus Politicians (i.e. Democrats)) that want to give everyone access to healthcare, regardless of economic status. This would mean never voting for Republicans as they are opposed to this.

38
Android 7.6 features (signalupdateinfo.com)
submitted 1 month ago by KLISHDFSDF@lemmy.ml to c/signal@lemmy.ml
  • Group call reactions 🎉
  • Double-tap a message to edit ✍️
  • Link preview images no longer show in the 'Shared Media' section 🏞️
  • Improvements to missed call handling 📞
  • Updated permissions popup UI 🍾
18
submitted 5 months ago by KLISHDFSDF@lemmy.ml to c/selfhosting@slrpnk.net

cross-posted from: https://lemmy.ml/post/10866175

Check out the live demo at https://demo.usememos.com/

83
submitted 5 months ago by KLISHDFSDF@lemmy.ml to c/selfhosted@lemmy.world

Check out the live demo at https://demo.usememos.com/

[-] KLISHDFSDF@lemmy.ml 190 points 5 months ago* (last edited 5 months ago)

Although completely believable and in-line knowing Meta/Facebook's history, is there any evidence to support this claim? I'm sure it's, unfortunately, just as easily deployed to specific targets so it may be hard to replicate, but this is pretty huge.

Anyone have any links/sources?

EDIT:

Found the source post: https://mastodon.social/@protonmail/111699323585240444

and the article: https://gizmodo.com/meet-link-history-facebook-s-new-way-to-track-the-we-1851134018

[-] KLISHDFSDF@lemmy.ml 232 points 6 months ago* (last edited 6 months ago)

Tangentially related, if you use iMessage, I'd recommend you switch to Signal.

text below from a hackernews comment:


Gonna repeat myself since iMessage hasn't improved one bit after four years. I also added some edits since attacks and Signal have improved.

iMessage has several problems:

  1. iMessage uses RSA instead of Diffie-Hellman. This means there is no forward secrecy. If the endpoint is compromised at any point, it allows the adversary who has

a) been collecting messages in transit from the backbone, or

b) in cases where clients talk to server over forward secret connection, who has been collecting messages from the IM server

to retroactively decrypt all messages encrypted with the corresponding RSA private key. With iMessage the RSA key lasts practically forever, so one key can decrypt years worth of communication.

I've often heard people say "you're wrong, iMessage uses unique per-message key and AES which is unbreakable!" Both of these are true, but the unique AES-key is delivered right next to the message, encrypted with the public RSA-key. It's like transport of safe where the key to that safe sits in a glass box that's strapped against the safe.

  1. The RSA key strength is only 1280 bits. This is dangerously close to what has been publicly broken. On Feb 28 2023, Boudet et. al broke a 829-bit key.

To compare these key sizes, we use https://www.keylength.com/en/2/

1280-bit RSA key has 79 bits of symmetric security. 829-bit RSA key has ~68 bits of symmetric security. So compared to what has publicly been broken, iMessage RSA key is only 11 bits, or, 2048 times stronger.

The same site estimates that in an optimistic scenario, intelligence agencies can only factor about 1507-bit RSA keys in 2024. The conservative (security-consious) estimate assumes they can break 1708-bit RSA keys at the moment.

(Sidenote: Even the optimistic scenario is very close to 1536-bit DH-keys OTR-plugin uses, you might want to switch to OMEMO/Signal protocol ASAP).

Under e.g. keylength.com, no recommendation suggest using anything less than 2048 bits for RSA or classical Diffie-Hellman. iMessage is badly, badly outdated in this respect.

  1. iMessage uses digital signatures instead of MACs. This means that each sender of message generates irrefutable proof that they, and only could have authored the message. The standard practice since 2004 when OTR was released, has been to use Message Authentication Codes (MACs) that provide deniability by using a symmetric secret, shared over Diffie-Hellman.

This means that Alice who talks to Bob can be sure received messages came from Bob, because she knows it wasn't her. But it also means she can't show the message from Bob to a third party and prove Bob wrote it, because she also has the symmetric key that in addition to verifying the message, could have been used to sign it. So Bob can deny he wrote the message.

Now, this most likely does not mean anything in court, but that is no reason not to use best practices, always.

  1. The digital signature algorithm is ECDSA, based on NIST P-256 curve, which according to https://safecurves.cr.yp.to/ is not cryptographically safe. Most notably, it is not fully rigid, but manipulable: "the coefficients of the curve have been generated by hashing the unexplained seed c49d3608 86e70493 6a6678e1 139d26b7 819f7e90".

  2. iMessage is proprietary: You can't be sure it doesn't contain a backdoor that allows retrieval of messages or private keys with some secret control packet from Apple server

  3. iMessage allows undetectable man-in-the-middle attack. Even if we assume there is no backdoor that allows private key / plaintext retrieval from endpoint, it's impossible to ensure the communication is secure. Yes, the private key never leaves the device, but if you encrypt the message with a wrong public key (that you by definition need to receive over the Internet), you might be encrypting messages to wrong party.

You can NOT verify this by e.g. sitting on a park bench with your buddy, and seeing that they receive the message seemingly immediately. It's not like the attack requires that some NSA agent hears their eavesdropping phone 1 beep, and once they have read the message, they type it to eavesdropping phone 2 that then forwards the message to the recipient. The attack can be trivially automated, and is instantaneous.

So with iMessage the problem is, Apple chooses the public key for you. It sends it to your device and says: "Hey Alice, this is Bob's public key. If you send a message encrypted with this public key, only Bob can read it. Pinky promise!"

Proper messaging applications use what are called public key fingerprints that allow you to verify off-band, that the messages your phone outputs, are end-to-end encrypted with the correct public key, i.e. the one that matches the private key of your buddy's device.

  1. iMessage allows undetectable key insertion attacks.

EDIT: This has actually has some improvements made a month ago! Please see the discussion in replies.

When your buddy buys a new iDevice like laptop, they can use iMessage on that device. You won't get a notification about this, but what happens on the background is, that new device of your buddy generates an RSA key pair, and sends the public part to Apple's key management server. Apple will then forward the public key to your device, and when you send a message to that buddy, your device will first encrypt the message with the AES key, and it will then encrypt the AES key with public RSA key of each device of your buddy. The encrypted message and the encrypted AES-keys are then passed to Apple's message server where they sit until the buddy fetches new messages for some device.

Like I said, you will never get a notification like "Hey Alice, looks like Bob has a brand new cool laptop, I'm adding the iMessage public keys for it so they can read iMessages you send them from that device too".

This means that the government who issues a FISA court national security request (stronger form of NSL), or any attacker who hacks iMessage key management server, or any attacker that breaks the TLS-connection between you and the key management server, can send your device a packet that contains RSA-public key of the attacker, and claim that it belongs to some iDevice Bob has.

You could possibly detect this by asking Bob how many iDevices they have, and by stripping down TLS from iMessage and seeing how many encrypted AES-keys are being output. But it's also possible Apple can remove keys from your device too to keep iMessage snappy: they can very possibly replace keys in your device. Even if they can't do that, they can wait until your buddy buys a new iDevice, and only then perform the man-in-the-middle attack against that key.

To sum it up, like Matthew Green said[1]: "Fundamentally the mantra of iMessage is “keep it simple, stupid”. It’s not really designed to be an encryption system as much as it is a text message system that happens to include encryption."

Apple has great security design in many parts of its ecosystem. However, iMessage is EXTREMELY bad design, and should not be used under any circumstances that require verifiable privacy.

In comparison, Signal

  • Uses Diffie Hellman + Kyber, not RSA

  • Uses Curve25519 that is a safe curve with 128-bits of symmetric security, not 79 bits like iMessage.

  • Uses Kyber key exchange for post quantum security

  • Uses MACs instead of digital signatures

  • Is not just free and open source software, but has reproducible builds so you can be sure your binary matches the source code

  • Features public key fingerprints (called safety numbers) that allows verification that there is no MITM attack taking place

  • Does not allow key insertion attacks under any circumstances: You always get a notification that the encryption key changed. If you've verified the safety numbers and marked the safety numbers "verified", you won't even be able to accidentally use the inserted key without manually approving the new keys.

So do yourself a favor and switch to Signal ASAP.

[1] https://blog.cryptographyengineering.com/2015/09/09/lets-tal...

10
submitted 7 months ago by KLISHDFSDF@lemmy.ml to c/jellyfin@lemmy.ml

I know this works if I have, for example:

movies/
    - movie1 - 1080p.mkv
    - movie1 - 2160p.mkv

but what if I have:

movies/
    - movie1 - 1080p.mkv
movies2/
    - movie1 - 2160p.mkv

Because I'm out of space on the driver under "movies". Do I need to have them in the same parent folder?

110
submitted 9 months ago* (last edited 9 months ago) by KLISHDFSDF@lemmy.ml to c/signal@lemmy.ml

cross-posted from: https://lemmy.ca/post/6601917

Edit Message

Now you can edit a message even after it has been sent! Fix a tpyo, include the missing ingredient in grandma's chocolate chip cookie recipe, or add the punchline to a joke if you hit the send button too quickly. The choice is yours.

Messages will always show when they have been edited, and you can tap on the "Edited" indicator to see the full edit history for any edited messages.

Update the past in the present to prevent future confusion today!

Got this today on Signal beta. Editing is one feature I really wanted in Signal.

Anyone else got it?

11
submitted 9 months ago by KLISHDFSDF@lemmy.ml to c/kingofthehill@lemmy.ml

Made these for myself, figured I should share for anyone interested.

59
submitted 9 months ago by KLISHDFSDF@lemmy.ml to c/signal@lemmy.ml

Why is it that so many companies that rely on monetizing the data of their users seem to be extremely hot on AI? If you ask Signal president Meredith Whittaker (and I did), she’ll tell you it’s simply because “AI is a surveillance technology.”

54
submitted 10 months ago* (last edited 10 months ago) by KLISHDFSDF@lemmy.ml to c/selfhosted@lemmy.world

but before I do, I figured I'd ask if anyone's aware of any tools/software that covers my basic needs of setting something basic that may alert me if there are any intruders in the network?

Needs:

  1. Fake ssh login that can trigger a script so I can take care of the rest.
  2. Fake network share (cifs/samba) that can trigger a script if anything tries to access it.

Would be great if there are any docker images I can just pull, make some minor edits, and run.

Thanks!

160
submitted 10 months ago by KLISHDFSDF@lemmy.ml to c/opensource@lemmy.ml

Just found this today and thought I'd share.


Features:

✅ Beautiful, minimal UI
✅ 8-day forecast
✅ Imperial units support
✅ Dark and light themes
✅ No ads or trackers
24
submitted 10 months ago* (last edited 10 months ago) by KLISHDFSDF@lemmy.ml to c/signal@lemmy.ml

One feature of apps such as iMessage and WhatsApp is that your texts or voice calls are scrambled and private from everyone.

With end-to-end encrypted technology, no one but you and the intended recipients can know what you wrote or said — not hackers, the app companies or the police.

Except, not everything is end-to-end encrypted in end-to-end encrypted apps.

That could mean what you type in chats are saved on company computers that corporations such as Apple or your phone provider could read. Details such as the timestamps of every text to your boyfriend might not be under lock and key, either.

That’s not necessarily bad. Each end-to-end encryption choice has trade-offs. More privacy and security could also make it harder for you to use an app, or can shield activity of terrorists and child predators.

The mess I’m describing — end-to-end encryption but with certain exceptions — may be a healthy balance of your privacy and our safety.

The problem is it’s confusing to know what is encrypted and secret in communications apps, what is not and why it might matter to you.

To illuminate the nuances, I broke down five questions about end-to-end encryption for five communications apps.

Is the content of every message automatically end-to-end encrypted?

  • WhatsApp: Yes

  • Apple’s Messages: No

  • Messages by Google: No

  • Meta Messenger: No

  • Signal: Yes

The biggest encryption caveat is for the built-in texting apps on iPhones and most Android phones in the United States. Those are Apple’s Messages app, also known as iMessage, and the Messages by Google app.

If you use Apple’s app, texts that you send and receive are only end-to-end encrypted if everyone else in the chat is using that app.

If the text you see is in blue, the contents of messages are end-to-end encrypted for everyone in the chat.

Even if Apple wanted to read your texts, it doesn’t have a key to unscramble those messages. (There’s a caveat in the next section about backup copies.)

But the dreaded green bubbles are Apple’s warning. If you’re in a group chat with three people using Apple’s chat app and one person on an Android phone, no one’s texts are end-to-end encrypted.

Each of your mobile phone providers might save every word of your communications. Those companies could, in theory, read your messages, lose them to thieves or hand them over to police with valid legal orders.

Google’s chat app has the same encryption loophole. (For most people in the United States, Messages by Google is the standard texting app on Android phones.)

Your texts in Google’s chat app are only end-to-end encrypted if everyone else is using that app.

Google shows if your texts are end-to-end encrypted with signs such as a lock icon under texts and another on the send button.

Are backup copies of your messages automatically encrypted, with no option for the app company to unscramble them?

  • WhatsApp: Yes

  • Apple’s Messages: No

  • Messages by Google: Yes*

  • Meta Messenger: No

  • Signal: Yes

WhatsApp and Signal don’t let you save copies of your texts or call logs to the app makers’ computers.

That means they don’t have saved message copies in a cloud that crooks could break into.

But if you buy a new phone and forget your password, WhatsApp and Signal can’t really help you transfer all your old texts.

If you back up copies from Apple’s chat app and Meta Messenger, the companies have the keys to unscramble what’s written in encrypted chat copies. Again, these unscrambled text copies can help in criminal investigations or they could be stolen or misused.

Apple recently introduced a choice to fully end-to-end encrypt backup copies of iCloud accounts, which means not even Apple could unlock your scrambled backup texts.

If you pick that option, Apple can’t help recover your chats if you forget your account password.

This risk is why Apple makes this feature a pain to turn on, and requires you to list a plan B if you forget your password, such as a personal contact who knows your decryption code.

WhatsApp has an option to save backup copies of your messages to Apple’s or Google’s cloud. WhatsApp doesn’t save those backups.

For Messages by Google, the company says chats backed up to the company’s computers are automatically encrypted – as long as your Android phone has a screen that you need to unlock with a password or another method.

Google gets an asterisk because it says it cannot unscramble your backup texts in its cloud. But it can for attachments like photos.

Meta Messenger has been testing an option for people to turn on fully end-to-end encrypted backups.

Does the app save your account details in a way it can access?

  • WhatsApp: Yes

  • Apple’s Messages: Yes

  • Messages by Google: Yes

  • Meta Messenger: Yes

  • Signal: Yes*

Most end-to-end encrypted apps save some “metadata,” or details about you or what you do with the app. They can retrieve the metadata if necessary.

The app companies aren’t necessarily specific about which metadata they save and can unlock. This information can make you less private– and it can help in criminal prosecutions.

WhatsApp, for example, may have your general physical location when you use the app and the names of your group chats. Under legal orders, WhatsApp has the ability to log the phone numbers your number communicates with.

WhatsApp says these details can help identify spammers and aid in investigations of potential criminal activity including people who share images of child sexual abuse.

Signal is a yes with an asterisk because it doesn’t save much the app can retrieve – just a phone number used to set up an account and the last time the account connected to Signal.

Are disappearing messages an option?

  • WhatsApp: Yes

  • Apple’s Messages: No

  • Messages by Google: No

  • Meta Messenger: Yes

  • Signal: Yes

Even with end-to-end encrypted texts, someone on the receiving end could leak them or turn them into the police.

For extra privacy, WhatsApp, Meta Messenger, and Signal have an option to set texts to automatically delete in as little as 24 hours from the phones of everyone in a chat.

This isn’t ironclad, either. Someone could take a photo of your messages before they disappear.

Does the app use the Signal protocol?

  • WhatsApp: Yes

  • Apple’s Messages: No

  • Messages by Google: Yes

  • Meta Messenger: Yes

  • Signal: Yes

The Signal protocol is considered a gold standard. No one yet has found holes in the end-to-end encryption technology.

Read more:

[-] KLISHDFSDF@lemmy.ml 130 points 10 months ago

for anyone wanting to avoid giving "X", formerly known as Twitter, any traffic, here it is.

1
submitted 10 months ago by KLISHDFSDF@lemmy.ml to c/signal@lemmy.ml
1
submitted 1 year ago by KLISHDFSDF@lemmy.ml to c/signal@lemmy.ml
view more: next ›

KLISHDFSDF

joined 3 years ago