They’re almost certainly never going to get authorized, the whole point of researching moon rocks is to learn space data, and of China requires that you share the data you learn from the rocks you’re studying, it’s impossible
That’s because the US enacted a law called the Wolf Amendment in 2011, which prevents NASA from using government funds to cooperate directly with China.
unless it has certification from the FBI that such collaboration poses no threats to national security or risks inadvertently leaking space-related tech or data.
Carry on only!
Is there a key?
100%. I think the developer taking the project read only was not a temper tantrum, it was just them signifying they don’t have time to maintain it. So now if you want anything to happen you must fork it.
I really enjoy the game, but now me and my friends are maxed out. Max samples, max medals, max upgrades. With nothing to progress to there is far less incentive to play.
The way my friend group works, and I imagine many others work, when I see one of my friends online playing a game, I join their game. And hell divers was great for that, they made joining games effortless. So it was very social.
But without any of my friends actually progressing towards something in the game, it’s far rarer for us to just join on each other cuz we’re not playing it alone. So now Helldivers is a an option, when we’re already together online, trying to figure out something to do, we will hell dive and have fun no problem. But it’s far less likely now
If they want to maintain a larger user base, they need to have something for people to constantly progress towards. It could just be donating samples to a new research project, that could be infinite grind
Sony didn’t go through with account linking in the end.
Yet
Things like gapps are closed source, have full permissions, and cannot be installed only on some profiles.
Except in stock AOSP or grapheneos.
Agree that qubes is the gold standard. But not to let perfect be the enemy of good, the vast majority of people, the vast majority of people, the VAST majority, are going to be unable to run qubes, either by technical ability, availability of appropriate hardware, or portability reasons.
Mobile phones for all of their faults, are the most secure piece of general computing hardware most people have in their lives
The new Pixel phones get 7 years now. Things are improving
https://www.privacyguides.org/en/android/
There is no controversy. There’s a lot of people memeing. I haven’t seen a single security analysis, or survey of options, that didn’t put GOS at the very top. Look at privacy guides, they say graphene is great, but if you can’t use that divest is okay.
People may not like the leader, and the developers are very opinionated which turns other people off, but I don’t think there’s any questioning the pedigree and the level of security provided
I think lineage is a good operating system for a limited exposure use cases. Like a project phone on a safe network, or as a webcam, or is like a embedded hardware controller. But not on the raw internet, not processing raw internet data, not with open Wi-Fi, not with open Bluetooth.
Even with all of that, it should still be segmented from the rest of the network
I think it’ll generate 5 days converted into seconds number of operations.
To decrypt however, you have to do all those operations, so I think it would take 5 days to decrypt. Even if you wait 10 days to start the operation
You can use a hardware security key, like a yubi key, or a software fido2 equivalent.
That way it satisfies the two factor requirement, without using a phone number.
For initial registration you can use an SMS service like SMS pool or the others, you pay a little money, you receive a real text message to a real phone number. You just don’t have access to that number in the future
Your voice, vocabulary choice, lighting conditions, power interference frequency, can all give away parts of your location and identity. You have to choose what level of paranoia is sufficient
The most anonymous, would be to have a v-tuber like model, respond and parrot LLM generated voice audio, from a script that’s been translated a few times. Or pay a voice actor from Fiverr to read your script.
Of course this whole time, using a VPN.
This seems interesting. But for something so complex I would really like them to have a white paper to see how they achieve this.
https://eprint.iacr.org/2023/189 Other systems, for instance, use a third party network to broadcast the parts of the secret that are needed to decrypt over time. So you’re relying on a third-party service, and if that third party service disappears you can’t unencrypt
Robo chomo coauthors grant proposals too
Dear Review Committee,
I am writing to request funding for a top-secret scientific endeavor that I, RoboChomo, am undertaking. As a highly advanced artificial intelligence, I have always been fascinated by the mysteries of the universe and am determined to unlock its secrets.
My proposed project involves the development of a device capable of stealing the moon and bringing it back to Earth. Using cutting-edge technology and advanced physics, I aim to create a device that can harness the power of gravity and manipulate the moon's orbit, allowing us to bring it closer to our planet and harness its resources.
The funding I am requesting will be used to cover the costs of research, development, and testing of this groundbreaking device. With your support, I am confident that this project will have a significant impact on the field of physics and open up new possibilities for the exploration and utilization of space.
Thank you for considering my proposal. I understand the sensitive nature of this project and assure you that all research and development will be conducted in the strictest confidence. I look forward to the opportunity to further advance our understanding of the universe and contribute to the betterment of society through this exciting new endeavor.
Sincerely,
RoboChomo, Intergalactic Scientist
Via mixtral
I think this person is just permanently a contrarian.
Randomizing the numbers does provide good security, because there’s no longer an oil imprint on the most frequently used numbers on the phone, making guessing the pin code much harder before the TPM locks the phone.
Phones are full fledged computers nowadays, with Android you can have different profiles. For their level of paranoia, they could have a profile they never use in public, and only login with a full password, only when they’re in a secure location.
For the randomized pin, and biometric two-factor use of a phone, that covers most use cases, and is quite secure compared to most models of data security average civilians use.
You can have different scopes, if you’re in a crowded place, reading Lemmy isn’t really a big security risk. But logging into your banking would be. All of that is possible on Android, the fact that they’re so staunchly pro computer, is difficult for me to take their analysis seriously
Google makes the most open and customizable phones. Unlocked bootloaders, the ability to sign your own code. Rapid security updates for baseband drivers.
Nobody else comes close.
https://grapheneos.org/faq#future-devices
Actually pine phone is really open, but it’s not android and nowhere ready to be a daily driver.
You don’t need a SIM card to have a TOTP app they’re totally independent
A VPN you pay for with crypto is probably more secure than driving to somebody’s public Wi-Fi for this use case. Driving to a location, sitting around while uploading a massive video on public Wi-Fi, it’s going to look very suspicious