• 0 Posts
  • 38 Comments
Joined 4 months ago
cake
Cake day: January 2nd, 2026

help-circle

  • See https://coveryourtracks.eff.org/ with Tor set to the Safest setting. The user share for Tor might be very small. However, because all Tor users have the same configuration, it doesn’t matter whether a fingerprint differs from Chrome. Among the x% of Tor traffic, x% traffic shares the same fingerprint. Chrome might account for y% of the traffic where each user has a unique fingerprint. But as long as x is not negligible, the fact that you’re using Tor provides very few bits of information (as an example, about 8 bits of identifying information) compared to a unique fingerprint (which provides much more information). I agree that Tor is not without its flaws, but saying that Tor deanonymizes you because of its user share is wrong. Also, please note that the EFF link I shared may be biased in the data it collects.



  • A Layer-3 (network-layer) blacklist risks cutting off innocent CGNAT and cloud users. What you’re proposing is similar to mechanisms that already exist (e.g., access control lists at the ISP level work by asking computer B which requests it wants to reject and rejecting those that originate from computer A). However, implementing any large-scale blocking effort beyond the endpoint (i.e. telling an unrelated computer C to blackhole all requests from computer A to computer B) would be too computationally expensive for a use case as wide and as precise as “every computer on the Internet”.

    Also, in your post you mentioned, “A host would need to have a way to identify itself as authoritative, responsible for the IP address in question.” This already happens in the form of BGP though it doesn’t provide cryptographic proof of ownership unless additional mechanisms are in use (RPKI/ROA).




  • This can be verified by asking people who have had near-death experiences whether or not they experienced something correct in their near-death experiences. Obviously, such experiences are traumatic, and multiple studies show that people can hallucinate due to the release of various neurotransmitters associated with the same.

    We want to calculate the probability that someone manifested as a ghost given that they had an interesting near-death experience. We assume that anyone having a true supernatural experience experiences visions that are absolutely true. For each person, there are two possibilities (we’ll calculate the probability of each later).

    The first possibility is that a person, in fact, experienced hallucinations. The second possibility is that a person experienced a ghostly manifestation.

    Now, we further give people an objective multiple-choice quiz about the positions of various objects in an environment. To generate this quiz, we ask each person to choose the environment they believe themselves to have manifested in. We verify that they have never been to this environment before and did not have any method of knowing about this environment (e.g., if a subject saw a person going into a room and later gave an exact description of the person in the given room, it will be disregarded). We only test people who believe that they experienced a supernatural event. All options are framed in an equivalent manner and are presented in a randomized order to remove cognitive biases and implement double-blind protocols. We further use questions with non-obvious answers such that they differ from previous implementations (e.g., a vision of a surgery table with an overhead light is obvious, and by itself, not indicative of supernatural phenomena).

    If the subject hallucinated, we assume that they have a random chance of predicting the positions of various objects. We now repeat this quiz a large number of times in accordance with the law of large numbers. If, after many repetitions, we find a sufficient deviation from the expected result (e.g., if each question had one correct answer and three incorrect answers, with the observed rate of correct answers being 50% instead of 25%), then we would have evidence supporting the existence of ghosts.

    If, however, the results show no sufficient deviation from the expected results, then we would find that the probability of a perceived encounter being supernatural is approximately zero.

    In this way, we can use scientific methods to test claims of ghost-like phenomena.

    NOTE: If we only focus on the 25% of the cases as mentioned in the above example, we find that we are not focusing on the remaining 75% of the cases. Presenting only 25% of the cases, without giving any thought to the remaining 75% of the cases is an incorrect method of analysis as explained above.



  • Saying “give up all technology now that it has been introduced” and “it is impossible to enhance the good aspects of technology while eliminating the bad” are both misguided ideas and amount to offering no ideas for improving the world. (quotes paraphrased)

    Edit: I forgot to add that, in his manifesto, he literally wrote that killing people who have certain diseases is more efficient than curing those diseases because “People with a genetic tendency to [diseases] will then be able to survive and reproduce as well as anyone else. Natural selection against genes for [diseases] will cease and such genes will spread throughout the population.”







  • Assuming a mechanism exists that changes the universe from being singly connected to multiply connected (i.e., wormholes exist), it is possible to have wormholes permitting faster-than-light travel without time paradoxes, though some additional restrictions may apply.

    We have already shown that wormholes connect across both space and time, so that a trip between star systems could take you hundreds of years into the future, and the return trip takes you hundreds of years back in time. And this is even before we throw in how time slips between planets when considering relativistic time dilation due to different speeds and gravitational potentials.

    Fortunately, all the weirdness of different time rates and going backward and forward in time can be ignored by the average person. This is because you never need to go from one world to another, or back, across the vast gulfs of interstellar space. You just take the wormhole between them. All you ever need to worry about is the coordinate frame that goes across the wormhole. When considering this reference frame, you’re not hopping all over the place in time. If it takes ten minutes to cross the wormhole between the two planets, when you get to your destination world the clocks will read ten minutes later than they did when you left your departure world. By coordinating their time-keeping across the wormhole network, all of the worlds of the network can agree on a common time to coordinate their activities. This is all travelers ever need to worry about, and they can then ignore all the relativistic weirdness. Your network engineers will still need to keep track of relative time drift and how close a given configuration is getting to a time loop. But unless your protagonist is a network engineer, they can just ignore all that stuff. And, as an author, so can you! Assume your engineers are competent, you have good regulatory bodies and standards institutions, and don’t worry about any of this “time travel” that doesn’t actually let you cause paradoxes.

    source: Galactic Library


  • Yes, it is visible when a new trusted device is added. The QR code you scan to link a device contains a one-time public key for that device (ECC is used partly to fit the public key more easily into a QR code). Signal on the phone then sends a lot of information, including the identity keys, to the new device. The new device uses these identity keys to communicate. Note that the transfer of identity keys is fully encrypted, with encryption and decryption taking place on the clients. This can, of course, be bypassed if someone you’re talking to has their security key compromised, but the same risk exists if the recipient takes a screenshot or photographs their device’s screen.

    Edit: The security key refers to the one-time key pair generated to initiate the transfer of identity keys and chat history. It can be compromised if someone accidentally scans a QR code and transfers their identity keys to an untrusted device.



  • Even in an “insecure” app without air-gapped systems or manual encryption, creating a backdoor to access plaintext messages is still very difficult if the app is well audited, open source, and encrypts messages with the recipient’s public key or a symmetric key before sending ciphertext to a third-party server.

    If you trust the client-side implementation and the mathematics behind the symmetric and asymmetric algorithms, messages remains secure even if the centralized server is compromised. The client-side implementation can be verified by inspecting the source code if the app is open source and the device is trusted (for example, there is no ring-zero vulnerability).

    The key exchange itself remains somewhat vulnerable if there is no other secure channel to verify that the correct public keys were exchanged. However, once the public keys have been correctly exchanged, the communication is secure.