I really hope the best for it though but probably won’t put much trust in it until it’s withstood the test of time. So many people are just trying to market crypto for the quick buck. Hopefully not in this case.
The coin is important as it is what incentivizes people to run nodes. The question is who will be left when the speculators move on.
In regard to 1k nodes, how many people are behind them? It looks like I’m rewarded per node and I could put dozens on the same box / VM. How hard would it be for a government to set up a couple hundred thousand and see the whole network?
@maniacbolts I’m somewhat familiar with it. The other day I did some reading on Loki. It seems like they’re trying to incentivize people to run nodes by making a new crypto currency that shares mined coins with nodes.
It also looks like the mobile clients aren’t running on Loki yet and groups of more than ten people aren’t encrypted.
It seems like something I’d want to check back on in a couple years to see if they’re still around and how decentralized their network is.
@maniacbolts That’s true but if security is important you need to remain in control of as much of the pipeline as possible.
That said, at the end of the day it’s about making a judgement on whom you will trust. If someone is paying to host you for free then incentives should be carefully scrutinized.
@maniacbolts I use a self-hosted Matrix server with end-to-end encryption. I then use bridges for other networks like Telegram when I need to.
Q: How many bits of entropy is acceptable?
Linux: > 2000, historically encouraged applications to gather as much entropy as possible, even if it was unneeded and degrades performance.
*BSD: >= 256, Just enough to initialize the kernel CSPRNG.
Tor: was 128, onion v3 moved to 256.
Wi-Fi: 128-bit. WPA3 would support GCM mode with 256-bit.
Bluetooth: 8 bits.
There is a vulnerability in the Plasma desktop that KDE developers are currently working to patch. The details are here.
For the moment avoid downloading .desktop or .directory files and extracting archives from untrusted sources.
Also, if you discover a similar vulnerability, it is best to send an email firstname.lastname@example.org before making it public. This will give us time to patch it and keep users safe before the bad guys try to exploit it.
@hax Step 2: Don't visit anyone that has an Alexa device.
Step 3: Don't invite people over with Alexa enabled devices.
@alexbuzzbee Implement B and then A. Run them both in parallel and log anytime A gives a different result than B. Once differences stop being detected turn B off.
@cosullivan I've been using it for the past few months. Overall I'm happy with it. I'm curious to see how their ad model works out.
@waltercool The text says “used” but it wants your handle. I’m not sure what that means if you delete that account and the handle isn’t yours anymore...
@bb010g @email@example.com @firstname.lastname@example.org Tree Style Tab is the biggest thing I miss after switching to Brave.
Both projects have a lot of dirty laundry. Firefox is the last remaining browser engine not controlled by Google and Brave is focused on protecting user privacy.
I was on Firefox for a long time until I got fed up with them not agressively protecting privacy and decided to switch. But that was hard because that put me on Google's engine.
Socia is the Esperanto word for “social”. All domains that end with “.dev” can only be served over HTTPS. This guarantees that all interactions on Socia DEV will always be secure.