I like the principal behind this and I’ve got a lot more confidence in Apple to do it in a privacy-centric fashion than others: arstechnica.com/tech-policy/20…
But some of the comments in there seem to really miss the mark, for example “Client-side scanning on one ‘end’ of the communication breaks the security of the transmission”. Huh? It’s being done outside the context of any transmission, how does it “break the security”?!
Or this one: “informing a third party (the parent) about the content of the communication undermines its privacy”. This a cornerstone of parental controls, seeing what your kids are doing! The whole point is to limit their ability to sneak comms past parents.
And if you want to play the “slippery slope” card, Apple is already scanning photos in order to recognise people and group them together. It’s all done locally in a privacy-centric fashion and it’s been there for years.
What doesn’t fly in some responses is “how can you trust Apple not to abuse their power”. If you have an iPhone you already trust them with your pics, video, voice, location, movements, contacts, etc. if you don’t trust Apple with this, don’t use an iPhone. Instead, use a… what?
• • •
Missing some Tweet in this thread? You can try to
force a refresh
“When users use a private window in Firefox, the connection to the requested domain will now default to HTTPS even if a user manually enters the HTTP protocol” zdnet.com/article/firefo…
Firefox 91 in private mode after attempting to load a site over the insecure scheme that refuses to do HTTPS. Welcome to the future, I like this 😊
Note that you can still access the site - nobody has killed HTTP here - you're just warned about there not being a secure connection. You can still decide to load it and take the chance.
For folks asking about 8.4B record “RockYou2021” password list that’s in the news today, this is an aggregation of multiple other lists. For example, this password cracking list: crackstation.net/crackstation-w…
Among other things, it contains “every word in the Wikipedia databases” and words from the Project Gutenberg free ebook collection: gutenberg.org
Unlike the original 2009 RockYou data breach and consequent word list, these are not “pwned passwords”; it’s not a list of real world passwords compromised in data breaches, it’s just a list of words and the vast majority have *never* been passwords
For my next IoT mission: I want to use Local Tuya to control lights without cloud. I don't want to solder stuff or pull lights out of the ceiling, you can no longer pull keys from the Tuya IoT portal (see descripting of vid) and I don't have a rooted Android. What's left?
All of this is just different levels of pain. BlueStacks and the Smart Life APK? My Tuya creds don't work. So screw it, just setup a dedicate Pi and use Tuya Convert to flash firmware. Nope, that won't work either:
I'm trying to find a "happy path" here, one that's not only happy for me, but one I can encourage others to follow. So far, that path remains having a cloud dependency and using the Tuya integration in @home_assistant. That's the least terrible of all the terrible options.
I’m very happy to announce that @haveibeenpwned’s Pwned Passwords is now open source under the @dotnetfdn. Now we’ve got some work to do: building an ingestion pipeline for new passwords provided by the @FBI on an ongoing basis. This is super cool 😎 troyhunt.com/pwned-password…
There’s so much I love about this, starting with the fact that it removes a huge barrier for many orgs considering using Pwned Passwords: if I have an unfortunate jet ski related accident and can no longer run the service, you can pick it up and run it yourself.
And because all the passwords are already freely downloadable from @haveibeenpwned, all the data is already in the public domain. Open sourcing the code compliments the already open sourced data.
It’s finally here - the @haveibeenpwned 3D logo 😎 The reason I bought the @Prusa3D in the first place was to make a bunch of these and hand them out in my travels. A little tweaking to do then I’ll pump out a bunch and give ‘em away.
Pretty happy with this now, might need to start some mass production:
Is there a device to keep multi-monitor setups aligned? Other than duct tape, of course.
Alrighty, fixing this problem: first up, a bunch of 25mm Velcro measured and cut to size for a nice vertical fit along the edge of each screen (the 50mm one comes later)
Next, some spirit level perfection to keep the centre screen straight and the same distance on each end off the wall, plus the Ergotron arm well and truly tightened up