Hacker Newsnew | past | comments | ask | show | jobs | submit | tuwtuwtuwtuw's commentslogin

Many people in EU wants to distance themselves wherever possible from US. It's not an all-or-nothing. Of course people will continue to use Nvidia, Netflix and so on, but if there are European options then many people prefer that.

> Many people in EU wants to distance themselves wherever possible from US.

Yes, but only because the trust was broken by the US. For so long the EU was very happy to work with the US with trade, we both benefited.


Yeah. For me threatening to invade Greenland was a super red flag. I have not cared about US privacy & security laws. Even if people have talked about it and snowden exposed a lot, over a decade ago.

But by treating Greenland...

I see a real shift in the political environment from the EU [1]

1. https://www.reuters.com/world/europe/eu-is-crossroads-toward...


Yes, of course. People's willingness to trade with a country goes down when the country threatens to invade.

Are you certain about that being "good"?

Are you sure about books being good?

> Users on civilian network can continue downloads through the Advance tab in the error message.

Good stuff.


“Do you want it or not?”

…or were you referring to the piss-poor English used? ^_^


"We have sent you a OTP code of 459-312 please check your device and enter this code below"


I'll take this opportunity and ask a beginners question. Aren't skills just text files describing how to do something?

I am a bit paranoid and don't like the idea of running some software like this to download text files. I have a browser already, so feels like I'm missing something.


The text file part has the instructions for the LLM, but it can also have scripts along with it that the LLM can invoke. At least that's how I understand it.


So it’s like code for execution via a llm or an interpreter? Have we invented source control yet?


The email protocols would like to have a chat with you.


You can bring your own encryption to that, and bring your own client to automate it.


you can encrypt the content but not the metadata, not even the subject unless you use a customized client that encodes it (like deltachat which doesn't use a subject at all), but then you still have your email address exposed.

for all intents and purposes email is not e2ee.


Email encryption for most people is sufficient even if the metadata is exposed. One can simply state in their email encryption "Bing Bing Bong" or "Why did you not put the trash out?" which might mean to the recipient :: "check the second SFTP server" or "let the cat outside" or "Jump on my private Mumble chat server" or "Get on my private self hosted IRC server". The email message need not be encrypted for that matter.

The intended payload can be in an header-less encrypted file on a throw-away SFTP server in the tmpfs ram disk.


So it's end to end encrypted except that third parties can see who you communicated with and when? Sure.


I have never considered metadata a part of the term E2EE. It has always been about the message contents.

I understand that metadata is valuable information for spies/governments and that encrypting or hiding it is valuable for privacy. But if you use that definition, there are almost no E2EE protocols on the planet in use.

First and foremost, any protocol that uses Apple or Google push notifications is giving metadata to those organizations. Even Whatsapp, iMessage, Signal, Telegram private messages, all of that leaks metadata but the contents of messages are hidden from the provider.


Exactly.


yeah bro genius, that sounds like a totally actionable thing people will do all the time with email. Be sure to drink your ovaltine


yeah bro genius

I know, right? I admit that is mostly for people on Linux desktops. People on smart phones are 100% monitored regardless of encryption or fake E2EE that platforms pinky promise is really E2EE like Signal. Shame on Moxie, he knows better.

Ovaltine has a crapload of sugar. Don't drink that horse piss.


I can bring my own encryption to tiktok as well. Has roughly the same usability and usage.


you can bring your own encryption to ANY messaging platform, doesn't mean it will be easy to use. e2ee just really makes it handy so that users don't need to preshare any keys.


Couldn't that be solved by whitelisting specific commands?


Give it a try, and challenge yourself (or ChatGPT) to break it.

You'll quickly realize that this is not feasible.


Such a mechanism would need to be implemented at `execve`, because it would be too easy for the model to stuff the command inside a script or other executable.


Your email account would hopefully have 2FA enabled, so if you lose your belongings, then how would you log on in your scenario?

Assuming your 2FA tokens are generated by phone, of course. But I think that's by far the most common way.


I was planning to make use of passkeys when logging on to various services, so I ordered three physical devices, supporting passkeys (yubikey). I ordered USB C and USB A variants, with NFC support.

Is this a mistake? I am already using password manager and totp for my accounts, but I am tired of dealing with passwords.

Even when using a password manager (bitwarden in my case), it just get tedious bringing out my phone, starting auth app, locating the correct account, reading 6 digit token and logging on.


No it's not a mistake. But say you lose the Yubikey, or you're away from home. How do you deal with that? You still need a password somehow.


Sure. But I think that is same scenario as me loosing my phone today, since I use that for two factor auth.

My plan was to continue using bitwarden for passwords as well, but more as a break-glass mechanism that I really use. I want to use passkeys mostly for convinience.


You're good. The relevant advice in article is to not reuse keys for encryption and auth.

Encrypting password manager database with a passkey or other authentication key on one of those yubikeys would be the mistake. Encrypting it with a separate dedicated key (or passphrase) on the same yubikey in parallel to its passkeys is fine.


Maybe not. I checked OPs blog and he seem to be putting up 2-3 longer posts per day. Since it is LLM content, I have no idea whether it's mainly hallucinations or based on facts. So what did I learn from reading the article? Maybe nothing, maybe it's just made up.


If you have a Mac you can follow the steps at the end of the post and reproduce the results https://paultendo.github.io/posts/confusable-vision-visual-s...

I don't have a Mac.


Many of us are waiting for the people in the US to start taking their responsibility seriously.


By buying US products, using US-based media, and adopting US narratives? That's a part of the problem. This world is lacking multilateralism.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: