cypherpunks

joined 3 years ago
MODERATOR OF
[–] cypherpunks@lemmy.ml 2 points 5 months ago

Yeah, I also used to run qmail and first knew of djb as the apparently only person capable of implementing network protocols in C without any exploitable bugs :)

But, he was actually doing historically important cryptography work even back then: https://en.wikipedia.org/wiki/Bernstein_v._United_States (and since has gone on to co-invent several cryptographic primitives which are now ubiquitous internet standards).

[–] cypherpunks@lemmy.ml 12 points 5 months ago* (last edited 5 months ago)

If copyright holders want to take action, their complaints will go to the ISP subscriber.

So, that would either be the entity operating the public wifi, or yourself (if your mobile data plan is associated with your name).

If you're in a country where downloading copyrighted material can have legal consequences (eg, the USA and many EU countries), in my opinion doing it on public wifi can be rather anti-social: if it's a small business offering you free wifi, you risk causing them actual harm, and if it is a big business with open wifi you could be contributing to them deciding to stop having open wifi in the future.

So, use a VPN, or use wifi provided by a large entity you don't mind causing potential legal hassles for.

Note that if your name is somehow associated with your use of a wifi network, that can come back to haunt you: for example, at big hotels it is common that each customer gets a unique password; in cases like that your copyright-infringing network activity could potentially be linked to you even months or years later.

Note also that for more serious privacy threat models than copyright enforcement, your other network activities on even a completely open network can also be linked to identify you, but for the copyright case you probably don't need to worry about that (currently).

[–] cypherpunks@lemmy.ml 1 points 5 months ago* (last edited 5 months ago)

as the mod of this community i feel inclined to mention here that I posted a comment about this last month in another community, in reply to a previous post OP made about it: https://lemmy.ml/comment/12562836

[–] cypherpunks@lemmy.ml 7 points 5 months ago (1 children)

it's been nearly four years since he stopped being involved with it, fyi.

[–] cypherpunks@lemmy.ml 64 points 5 months ago (1 children)

he wouldn’t be able to inject backdoors even if he wanted to, since the source code is open

Jia Tan has entered the chat

[–] cypherpunks@lemmy.ml 1 points 5 months ago

See also Section 7.3 and Appendix C (and the BADA55 Crypto paper that the email in Appendix C refers to).

[–] cypherpunks@lemmy.ml -2 points 5 months ago* (last edited 5 months ago) (3 children)

you're right, that is the not quite the right word; i edited my comment to say propagating instead.

[–] cypherpunks@lemmy.ml -3 points 5 months ago* (last edited 5 months ago) (5 children)

lol, i'm surprised to see you propagating "turn $1.5k into $100k in just three weeks" bitcoin fanfic/advocacy like this 😂

[–] cypherpunks@lemmy.ml 2 points 6 months ago

users of the Giant Chess Without Turns mod beg to differ

 
365
Philosophy Cop (static.existentialcomics.com)
submitted 1 year ago* (last edited 1 year ago) by cypherpunks@lemmy.ml to c/comics@lemmy.ml
 

(for context, see the original thread on lemmygrad)

 
view more: ‹ prev next ›