cypherpunks

joined 4 years ago
MODERATOR OF
[–] cypherpunks@lemmy.ml 8 points 16 hours ago

thank you OP for allowing me the opportunity to read this entire image here on lemmy prior to seeing the creator's mastodon username, so that i could believe it was real for a minute :)

(for anyone unfamiliar with it, check out her other amazing work...)

also ping and thankyou to @NanoRaptor@bitbang.social (in case mentions on lemmy notify mastodon users?)

[–] cypherpunks@lemmy.ml 4 points 17 hours ago (1 children)
[–] cypherpunks@lemmy.ml 3 points 17 hours ago

Sadly there are none I can recommend wholeheartedly, all have various problems 😢

[–] cypherpunks@lemmy.ml 1 points 1 day ago* (last edited 1 day ago) (2 children)

There are some controversial picks in there like Proton Mail or Brave. They do have a pretty wide adoption but have severe downsides. I’ll probably remove them again. What do you think?

here is a comment i wrote recently listing some of the reasons not to use proton. i'd also recommend against vivaldi (proprietary), brave (so many reasons), and everything in your messaging category besides matrix (and matrix also has lots of problems but it is the least bad of the ones you're recommending). sorry that i don't have time to elaborate right now (it's a lot), but for the inevitable "what about signal" question see my comment here and more here.

ps. if you do use signal, consider adjusting your Who Can Find Me By Number setting (see that link for a fun implementation of the attack against signal users who leave it as it is by default). note that the same thing could technically be done in matrix too, albeit by matrix ID instead of phone number. 😬

pps: here are my comments about tuta 🙄

[–] cypherpunks@lemmy.ml 1 points 1 day ago* (last edited 1 day ago)

Why not just use proton?

A few of the many reasons not to use Proton:

  • their e2ee is snakeoil (see my comment here about why - but tldr it requires completely trusting them and if you completely trust them you wouldn't need e2ee, the point of e2ee is to avoid needing to trust the service provider)
  • their server-side code is closed-source
  • they're a freemium service which can and does arbitrarily decide to start charging for previously-free features
  • they've suspended a number of users who they should not have
  • their CEO is a trump fanboy.

...

Its Swiss based.

You know who else was Swiss based? 🙄

Not sure about purism but I think its US so avoid it like a plague.

I don't know enough about Purism to endorse them but afaict they don't have any of the above problems.

Purism's e2ee is PGP; you can use their service via their client software or whatever other client you want, and can communicate with people who are using different implementations with different mail providers. I don't see any mention of them even offering webmail but I expect that if they do they would probably offer PGP there using a browser extension instead of having extremely-impractical-to-verify-before-running-it js code being sent anew from the server every time you load the page (which is how Proton's webmail works, and also what they offer for non-Proton users to receive mail encrypted using their nonstandard encryption).

I'd rather have US legal jurisdiction and credible e2ee which doesn't allow the operator to trivially circumvent it for targeted users than to have Swiss jurisdiction and snake oil.

[–] cypherpunks@lemmy.ml 5 points 3 days ago* (last edited 3 days ago)

the suggestion that you should maybe write down an eight digit hex string "in case you need it" is just adding insult to injury. i guess anything less than a 32bit space for error codes would be insufficient

[–] cypherpunks@lemmy.ml 5 points 4 days ago* (last edited 4 days ago)

The "girls FTW" mail in that bluesky post is indeed fake, but the daily beast article linked by this post does not include that one.

It is noteworthy how the existence of a fake thing which can be debunked can cause people to assume that similar-but-real things are also fake 😭

[–] cypherpunks@lemmy.ml 2 points 4 days ago (1 children)

that screenshot is almost^[i say only almost because there have been some documents removed from previous batches after they were released, but there are no credible reports about the one in your comment] definitely fake; unlike the ones in the dailybeast article, phrases from it do not find anything in the search.

 

this post is actually mostly good news; the bad news is that (1) LLMs exist and will continue to be used to edit Wikipedia, and (2) Wiki Education's analysis and cleanup only covered articles created through their own programs, and (3) their system to use an LLM detector to screen new edits is only being applied to their own editors.

[–] cypherpunks@lemmy.ml 3 points 4 days ago* (last edited 4 days ago) (2 children)

Yeah, thinking about it more, it's not really that weird to call adults of any age "kid", and it's somewhat common when talking about people substantially younger than oneself. it is maybe more common when referring to men though? 🤔

 

cross-posted from: https://lemmy.ml/post/42406120

screenshot of text:CP/M-86 Bootstrap Loader 1.8Reading Track 8 1234CP/M-86 for the IBM Personal Computer.Version 1.8Copyright 1982, Digital Research Inc.Hardware Supported:Diskette(s) : 2Printer(s) : 1Serial Port(s) : 1Memory (Kb) : 256A>U=00| 02/10/82 | 00:00:16

Note that while CP/M-86 for the IBM Personal Computer Version 1.0 says Copyright 1982 on it, CP/M-86 was already shipping for other machines prior to then, as documented by the article CP/M-86 Captures Leading Share in 16-Bit World Market in a 1981 issue of Digital Research News:

IBM recently announced its 16-bit personal computer, which will use CP/M-86 as its alternate operating system. With this long-awaited move, IBM joins Piiceon, Artelonics and Sirius Systems, which have all introduced 16-bit computers with CP/M-86 in the last six months.

Can CP/M-86 achieve the same widespread acceptance in the 16-bit world as CP/M has in the 8-bit world? More than 400 different computer manufacturers use CP/M, prompting Business Week to hail it as the de-facto standard of 8-bit operating systems. As yet, only a few computer manufacturers use CP/M-86. But behind the raw number is a more revealing statistic. "There are only a few hundred 16-bit machines on the market today," said John Katsaros, director of marketing. "We estimate that about 25 percent of the 16-bit installations use CP/M-86. That makes it the most widely used 16-bit microcomputer operating system."

Other browser-based CP/M emulation includes:

 

screenshot of text:CP/M-86 Bootstrap Loader 1.8Reading Track 8 1234CP/M-86 for the IBM Personal Computer.Version 1.8Copyright 1982, Digital Research Inc.Hardware Supported:Diskette(s) : 2Printer(s) : 1Serial Port(s) : 1Memory (Kb) : 256A>U=00| 02/10/82 | 00:00:16

Note that while CP/M-86 for the IBM Personal Computer Version 1.0 says Copyright 1982 on it, CP/M-86 was already shipping for other machines prior to then, as documented by the article CP/M-86 Captures Leading Share in 16-Bit World Market in a 1981 issue of Digital Research News:

IBM recently announced its 16-bit personal computer, which will use CP/M-86 as its alternate operating system. With this long-awaited move, IBM joins Piiceon, Artelonics and Sirius Systems, which have all introduced 16-bit computers with CP/M-86 in the last six months.

Can CP/M-86 achieve the same widespread acceptance in the 16-bit world as CP/M has in the 8-bit world? More than 400 different computer manufacturers use CP/M, prompting Business Week to hail it as the de-facto standard of 8-bit operating systems. As yet, only a few computer manufacturers use CP/M-86. But behind the raw number is a more revealing statistic. "There are only a few hundred 16-bit machines on the market today," said John Katsaros, director of marketing. "We estimate that about 25 percent of the 16-bit installations use CP/M-86. That makes it the most widely used 16-bit microcomputer operating system."

Other browser-based CP/M emulation includes:

view more: next ›