Dev from Germany, also interested in DnD and some video games

  • 0 Posts
  • 42 Comments
Joined 3 years ago
cake
Cake day: June 28th, 2023

help-circle
  • The problem is that companies will no longer publish the source code for their projects, as they are not in control of what happens to it and they can’t restrict competitors anymore.

    Im not a big fan of fake open source, but source available is better than closed source.

    And license laundering will not primarily be used to make projects with less restrictive licenses, its main purpose will be using copyleft or noncommercial projects in closed source products.





  • M1k3ytoMildly Infuriating@lemmy.worldWhen people recommend Brave browser.
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    1
    ·
    27 days ago

    That you’re even suggesting this tells me that you don’t use tor regularly. Many clearnet sites dont want to be accessed through tor and will just block you. If you encounter any recaptchas thats basically a dead end. The time from opening the browser to having a fully loaded site is minutes.

    If you don’t plan on doing serious crimes and your not an opposition leader in a totalitarian state, tor is not a good default browser.




  • What would a vpn do for you with snowflake? Hide your IP from tor entry nodes and the bridge user. I mean sure more vpn is always great, but running snowflake without a vpn seems less bad than surfing the web without a vpn.

    There are no legal risks in forwarding traffic to an entry node and your ISP knowing that you use snowflake also isnt really an issue.






  • M1k3ytotechnology@hexbear.netThe Age Verification Trap
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 months ago

    Actually there are even better ways. It involves some complicated crypto, but it is possible to create zero knowledge proofs that require a document signed in a specific way and then allow anonymous and unlinkable presentations. So you can use the same age restricted service multiple times and they have no way of linking your requests to each other.

    Thats whats planned with the European digital identity. Theres still some problems with EUDI, but it’s mostly acceptable.




  • The reason why it works is a bit complicated, but basically the trick is that the signatures are not immutable. Given a valid signature, it is possible to create a new valid signature over the same content that is not linkable to the original one. This means that it is still possible to derive, what authority signed the document, but the authority cannot know in which transaction it has signed that specific document.


  • I wanted to get in contact with a researcher that didn’t have a public university mail and instead linked to his LinkedIn. I wasnt able to see his contact info unless logging in and I couldn’t contact him without paying LinkedIn, so I didn’t contact him…

    Great networking platform /s


  • And if you don’t want the government to know what sites you visit, have sites route the request through a proxy.

    Actually, no on the fly communication with the issuer is required for selective disclose. You just need a signed document with individually salted hashes of different properties and you can create a zero knowledge proof non-interactively. Zero knowledge meaning that truely nothing but the disclosed property (age > 18, County == DE, or whatever) is communicated to anyone.

    Theres a lot of other cool stuff that can be done with zero knowledge digital identity wallets. You could for example hash your pubkey together with the service providers pk and disclose that as a per service ID, but not reveal your pk. This allows linkability within one service (as a login method for example) while preventing cross service linkability.