floofloof

joined 2 years ago
[–] floofloof@lemmy.ca 87 points 2 days ago (4 children)

Mamdani. I wouldn't be picky but Cuomo made it a deliberate act of disrespect to get his name wrong.

[–] floofloof@lemmy.ca 15 points 2 days ago (4 children)

Since they give no indication of how they're doing it or what information they're gathering, no one can really explain. It may be some kind of traffic analysis where an AI provides heuristic recognition of probable VPN traffic.

[–] floofloof@lemmy.ca 4 points 3 days ago

One of the few upsides of not having much money is there being no risk of turning into these rich guys.

[–] floofloof@lemmy.ca 6 points 3 days ago (2 children)

Why is this notion that science is some great scam so prominent in American culture? Where does it come from? Is it just that people don't understand it and want to feel better about their ignorance?

[–] floofloof@lemmy.ca 2 points 3 days ago (6 children)

I see they're promoting something called the Helium network. What's the relationship between that and Meshtastic? Are they completely different things?

[–] floofloof@lemmy.ca 19 points 3 days ago* (last edited 3 days ago) (6 children)

Here's the smarter way of saying it:

Feynman: Magnets (and Why?)

[–] floofloof@lemmy.ca 97 points 3 days ago* (last edited 3 days ago)

This is common with these sociopaths. Our middle-aged techbro overlords too are hugely ignorant, yet convinced that the only knowledge worth having is what they already know, and the only jobs worth doing are the ones they can do.

[–] floofloof@lemmy.ca 42 points 3 days ago (1 children)

Bill Gates walked into the meeting “riding high” because he acquired patents for malaria treatments. Reality beats satire every time.

Bill Gates will never be a good guy.

[–] floofloof@lemmy.ca 1 points 3 days ago (1 children)

Your posts are a bit confusing to read because you don't capitalize Windows To Go. Capitalizing it would make it easier to understand.

[–] floofloof@lemmy.ca 23 points 3 days ago (1 children)

So then it's safe to give to trans people too, and we won't hear Republicans pretending it isn't?

[–] floofloof@lemmy.ca 10 points 3 days ago* (last edited 3 days ago)

The Republicans know the free market is a myth and the only way to win in a capitalist system is to start rich and cheat. This involves convincing the plebs to believe in a free market.

 
 

cross-posted from: https://lemmy.sdf.org/post/45192400

cross-posted from: https://lemmy.sdf.org/post/45192281

Archived

[...]

In a historic breach of China’s censorship infrastructure, internal data were leaked from Chinese infrastructure firms associated with the Great Firewall (GFW) in September this year. Researchers now estimate that the data has a volume of approximately 600 GB.

The material includes more than 100,000 documents, internal source code, work logs, configuration files, emails, technical manuals, and operational runbooks. The number of files in the dump is reported to be in the thousands, though exact totals vary by source.

[...]

An unexpected but critical component of the breach is the metadata embedded within documents and logs. Authorship tags, file paths, and computer hostnames have linked hundreds of documents to individual users, systems, and organizations. These human fingerprints offer unprecedented visibility into the organizational structure behind the GFW’s operation. Engineers, data analysts, lab researchers, and regional technicians are all traceable by name or system alias. Many entries refer to known ISPs, national labs, or university-affiliated nodes, suggesting that the enforcement apparatus spans a wide constellation of public-private partnerships, military-academic collaborations, and centralized policy deployment.

Together, these findings constitute a unique technical cross-section of the Chinese censorship-industrial complex, revealing not just what is filtered or how, but who enforces it, who maintains the infrastructure, and how decisions flow through the layered topology of digital control.

[...]

The current report represents only the first installment in a three-part investigative series into the unprecedented breach of China’s censorship apparatus. While this Part 1 has centered on exposing the dataset’s contents and evaluating its technical, organizational, and strategic significance, it is only the beginning. The sheer scale and complexity of the leak, over 500GB of internal GFW infrastructure data, demands a methodical, layered approach to fully grasp its implications.

The next two parts in this series will delve even deeper, uncovering the architecture of China’s censorship regime and examining the wider consequences for global digital governance.

Part 2 of the series will look into the architecture and will offer a forensic reconstruction of how the Great Firewall actually works at the technical level, mapping the core design of the censorship stack. This includes how packets are intercepted, filtered, redirected, or dropped; how apps like Psiphon and V2Ray are detected at the protocol level; and how traffic shaping is deployed based on geography, ISP, or session context.

Part 3 will the geopolitics and the fallout will address the broader implications. This breach does more than just reveal technical controls, it changes the strategic calculus of censorship resistance. We will assess how the exposure reshapes China’s ability to sustain its domestic information control and international cyber operations, and how it informs countermeasures by VPN developers, privacy advocates, and democratic governments. Ethical and legal questions will also be raised: what does responsible engagement with such data look like?

[...]

With this series, we aim to present not just the most complete picture yet of the GFW, but a roadmap for pushing back against the machinery of state censorship.

 

cross-posted from: https://lemmy.sdf.org/post/45192400

cross-posted from: https://lemmy.sdf.org/post/45192281

Archived

[...]

In a historic breach of China’s censorship infrastructure, internal data were leaked from Chinese infrastructure firms associated with the Great Firewall (GFW) in September this year. Researchers now estimate that the data has a volume of approximately 600 GB.

The material includes more than 100,000 documents, internal source code, work logs, configuration files, emails, technical manuals, and operational runbooks. The number of files in the dump is reported to be in the thousands, though exact totals vary by source.

[...]

An unexpected but critical component of the breach is the metadata embedded within documents and logs. Authorship tags, file paths, and computer hostnames have linked hundreds of documents to individual users, systems, and organizations. These human fingerprints offer unprecedented visibility into the organizational structure behind the GFW’s operation. Engineers, data analysts, lab researchers, and regional technicians are all traceable by name or system alias. Many entries refer to known ISPs, national labs, or university-affiliated nodes, suggesting that the enforcement apparatus spans a wide constellation of public-private partnerships, military-academic collaborations, and centralized policy deployment.

Together, these findings constitute a unique technical cross-section of the Chinese censorship-industrial complex, revealing not just what is filtered or how, but who enforces it, who maintains the infrastructure, and how decisions flow through the layered topology of digital control.

[...]

The current report represents only the first installment in a three-part investigative series into the unprecedented breach of China’s censorship apparatus. While this Part 1 has centered on exposing the dataset’s contents and evaluating its technical, organizational, and strategic significance, it is only the beginning. The sheer scale and complexity of the leak, over 500GB of internal GFW infrastructure data, demands a methodical, layered approach to fully grasp its implications.

The next two parts in this series will delve even deeper, uncovering the architecture of China’s censorship regime and examining the wider consequences for global digital governance.

Part 2 of the series will look into the architecture and will offer a forensic reconstruction of how the Great Firewall actually works at the technical level, mapping the core design of the censorship stack. This includes how packets are intercepted, filtered, redirected, or dropped; how apps like Psiphon and V2Ray are detected at the protocol level; and how traffic shaping is deployed based on geography, ISP, or session context.

Part 3 will the geopolitics and the fallout will address the broader implications. This breach does more than just reveal technical controls, it changes the strategic calculus of censorship resistance. We will assess how the exposure reshapes China’s ability to sustain its domestic information control and international cyber operations, and how it informs countermeasures by VPN developers, privacy advocates, and democratic governments. Ethical and legal questions will also be raised: what does responsible engagement with such data look like?

[...]

With this series, we aim to present not just the most complete picture yet of the GFW, but a roadmap for pushing back against the machinery of state censorship.

 

cross-posted from: https://lemmy.zip/post/52481309

ZKPs are often advanced as a technical remedy, promising privacy-preserving attestations of age or eligibility. Yet their deployment in practice exposes both conceptual and practical limits.

 

cross-posted from: https://lemmy.world/post/38345975

Zohran Mamdani was elected mayor of New York City on Tuesday, capping a stunning ascent for the 34-year-old state lawmaker, who was set to become the city’s most liberal mayor in generations.

In a victory for the Democratic party’s progressive wing, Mamdani defeated former Gov. Andrew Cuomo and Republican Curtis Sliwa. Mamdani must now navigate the unending demands of America’s biggest city and deliver on ambitious — skeptics say unrealistic — campaign promises.

With the victory, the democratic socialist will etch his place in history as the city’s first Muslim mayor, the first of South Asian heritage and the first born in Africa. He will also become the city’s youngest mayor in more than a century when he takes office on Jan. 1.

 

cross-posted from: https://lemmy.world/post/38345975

Zohran Mamdani was elected mayor of New York City on Tuesday, capping a stunning ascent for the 34-year-old state lawmaker, who was set to become the city’s most liberal mayor in generations.

In a victory for the Democratic party’s progressive wing, Mamdani defeated former Gov. Andrew Cuomo and Republican Curtis Sliwa. Mamdani must now navigate the unending demands of America’s biggest city and deliver on ambitious — skeptics say unrealistic — campaign promises.

With the victory, the democratic socialist will etch his place in history as the city’s first Muslim mayor, the first of South Asian heritage and the first born in Africa. He will also become the city’s youngest mayor in more than a century when he takes office on Jan. 1.

view more: ‹ prev next ›