cypherpunks

joined 2 years ago
MODERATOR OF
[–] [email protected] 8 points 1 month ago

democracy dies in dark mode

[–] [email protected] 1 points 2 months ago

If you use systemd's DHCP client, since version 235 you can set Anonymize=true in your network config to stop sending unique identifiers as per RFC 7844 Anonymity Profiles for DHCP Clients. (Don't forget to also set MACAddressPolicy=random.)

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago)

They only do that if you are a threat.

Lmao. Even CBP does not claim that. On the contrary, they say (and courts have so far agreed) that they can perform these types of border searches without any probable cause, and even without reasonable suspicion (a weaker legal standard than probable cause).

In practice they routinely do it to people who are friends with someone (or recently interacted with someone on social media) who they think could be a threat, as well as to people who have a name similar to someone else they're interested in for whatever reason, or if the CBP officer just feels like it - often because of what the person looks like.

It's nice for you that you feel confident that you won't be subjected to this kind of thing, but you shouldn't assume OP and other people don't need to be prepared for it.

[–] [email protected] 1 points 2 months ago (2 children)

If they ask for a device's password and you decline to give it to them, they will "detain" the device. See this comment for some links on the subject.

[–] [email protected] 12 points 2 months ago* (last edited 2 months ago) (1 children)

I’m pretty sure that immigration in the US can just confiscate your devices if you are not a citizen .

CBP can and does "detain" travelers' devices at (or near) the border, without a warrant or any stated cause, even if they are US citizens.

Here is part of the notice they give people when they do:

Screenshot of the initial paragraphs of CBP Publication No. 3160-0423, Revised April 2023, titled "Border Search of Electronic Devices" with text: All persons, baggage, and merchandise arriving in, or departing from, the United States are subject to inspection by U.S. Customs and Border Protection (CBP). This search authority includes all electronic devices crossing our nation’s borders.  What to Expect You are receiving this document because CBP intends to conduct a border search of your electronic device(s). This may include copying and retaining data contained in the device(s). The CBP officer conducting the examination will speak with you and explain the process.  Travelers are obligated to present electronic devices and the information resident on the device in a condition that allows for the examination of the device and its contents. Failure to assist CBP in accessing the electronic device and its contents for examination may result in the detention of the device in order to complete the inspection.  Throughout CBP’s inspection, you should expect to be treated in a courteous, dignified, and professional manner. As border searches are a law enforcement activity, CBP officers may not be able to answer all of your questions about an examination that is underway. If you have concerns, you can always ask to speak with a CBP supervisor.  CBP will return your electronic device(s) prior to your departure from the port of entry unless CBP identifies a need to temporarily detain the device(s) to complete the search or the device is subject to seizure. If CBP detains or seizes your device(s), you will receive a completed written custody receipt detailing the item(s) being detained or seized, who at CBP will be your point of contact, and how to contact them. To facilitate the return of your property, CBP will request contact information.

[–] [email protected] 11 points 2 months ago* (last edited 2 months ago) (1 children)

Or just removing my biometrics?

Ultimately you shouldn't cross the US border carrying devices or encrypted data which you aren't prepared to unlock for DHS/CBP, unless you're willing to lose the hardware and/or be denied entry if/when you refuse to comply.

If they decide to, you'll be handed this: "You are receiving this document because CBP intends to conduct a border search of your electronic device(s). This may include copying and retaining data contained in the device(s). [...] Failure to assist CBP in accessing the electronic device and its contents for examination may result in the detention of the device in order to complete the inspection."

Device searches were happening a few hundred times each month circa 2009 (the most recent data i could find in a quick search) but, given other CBP trends, presumably they've become more frequent since then.

In 2016 they began asking some visa applicants for social media usernames, and then expanded it to most applicants in 2019, and the new administration has continued that policy. I haven't found any numbers about how often they actually deny people entry for failing to disclose a social media account.

In 2017 they proposed adding the authority to also demand social media passwords but at least that doesn't appear to have been implemented.

[–] [email protected] 6 points 2 months ago

adding all compiled file types including .pyc to .gitignore would fix it

But in this case they didn't accidentally put the token in git; the place where they forgot to put *.pyc was .dockerignore.

[–] [email protected] 24 points 2 months ago* (last edited 2 months ago) (2 children)

It seems to me that switching SIMs provides little privacy benefit, because carriers, data brokers, and the adversaries of privacy-desiring people whom they share data with are obviously able to correlate IMEIs (phones) with IMSIs (SIMs).

What kind of specific privacy threats do you think are mitigated by using different SIMs in the same phone (especially the common practice of using an "anonymous" SIM in a phone where you've previously used a SIM linked to your name)?

[–] [email protected] 9 points 2 months ago (2 children)

At my workplace, we use the string @nocommit to designate code that shouldn’t be checked in

That approach seems useful but it wouldn't have prevented the PyPI incident OP links to: the access token was temporarily entered in a .py python source file, but it was not committed to git. The leak was via .pyc compiled python files which made it into a published docker build.

[–] [email protected] 118 points 2 months ago (7 children)

this isn’t remotely how this meme is used lol

"Robin Holding a Whiteboard" meme format with left column labeled "people who use this meme format correctly" and a tally of one, and the right column labeled "people who use this format like glasses dog" and a tally of 21

[–] [email protected] 42 points 3 months ago* (last edited 3 months ago) (1 children)

python -c 'print((61966753*385408813*916167677<<2).to_bytes(11).decode())'

how?

$ python
>>> b"Hello World".hex()
'48656c6c6f20576f726c64'
>>> 0x48656c6c6f20576f726c64
87521618088882533792115812
$ factor 87521618088882533792115812
87521618088882533792115812: 2 2 61966753 385408813 916167677

611
very upsetting (lemmy.ml)
submitted 7 months ago* (last edited 7 months ago) by [email protected] to c/[email protected]
 

captiona screenshot of the text:

Tech companies argued in comments on the website that the way their models ingested creative content was innovative and legal. The venture capital firm Andreessen Horowitz, which has several investments in A.I. start-ups, warned in its comments that any slowdown for A.I. companies in consuming content “would upset at least a decade’s worth of investment-backed expectations that were premised on the current understanding of the scope of copyright protection in this country.”

underneath the screenshot is the "Oh no! Anyway" meme, featuring two pictures of Jeremy Clarkson saying "Oh no!" and "Anyway"

screenshot (copied from this mastodon post) is of a paragraph of the NYT article "The Sleepy Copyright Office in the Middle of a High-Stakes Clash Over A.I."

 
 

It looks like the paper is paywalled and not yet on scihub but i did find 38 pages of supplemental information with more details than the article.

713
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/[email protected]
 

cross-posted from: https://fed.dyne.org/post/43780

1
submitted 10 months ago* (last edited 10 months ago) by [email protected] to c/[email protected]
 

How to run it:

apt install qemu-system-x86

wget https://www.win.tue.nl/~aeb/ftpdocs/go/hikarunix-0.4.iso

sha256sum -c <<<'1cfcb94b18b4ddc8b1313f47b742b501e119deebd160fd224cdec5a66df0e25a hikarunix-0.4.iso' && qemu-system-i386 -cdrom hikarunix-0.4.iso

 
view more: ‹ prev next ›