This looks neat but the biggest question I have and care about... UBO? Not the limited manifest v3 version or whatever it's referred to as, but the full bore block lists like in FF.
This seems reasonable. The content includes themes (death, rape, violence, etc) that are generally considered NSFW by most modern day rating agencies. Just because cultures have historically seeded the texts for a long period of time doesn't make them SFW. If ESRB/MPAA had to rate a modern reboot, I don't think it would get a T/PG-13.
Personally, I wouldn't want my kids exposed to this kind of material without at least having a chance to talk to them about it first. Would you want your child getting sucked into something like Scientology without your knowledge?
It's only reasonable if reason is applied, rather than one particular set of contributors' political sensibilities. Unfortunately, there is zero logical consistency in what is marked NSFW and what isn't. That's the entire problem. F-Droid's authoritarian moral-policing crew are coming up with any flimsy justification for censorship applied inconsistently rather than taking an objective look at the issue. Read the comments and you'll see their tone is clearly dismissive and condescending, not collaborative and "Hmm, I can see how maybe this line of policing is inconsistent." This is how this kind of political-bias-pretending-to-be-objectivity tends to unfold with religious adherents, which these F-Droid contributors seem to be.
"one particular set of contributors' political sensibilities." - the entire western world is now particular sets of political and ideological sensibilities. Why puritan christians always assume that theirs is somehow different of others and won't be subject to new puritanism?
"Read the comments and you'll see their tone is clearly dismissive and condescending" - you think that way because you are biased to classify your religious text as not nsfw - but there is no such reason really - christianity is no longer main ideology of everyone.
Essential Mix opened my early 2000s teenage world to so much more electronic music. Good memories of downloading sets via Napster and manually recording on to cassettes to listen to in my '95 Saturn. What a weird statement.
Silly observation but the avatar 'Jack Frost', the snowman looking character on the attract screen was also used as a character in the early 'Persona' video game series also produced by Atlus.
So what was the actual point of compromise? Was it a CALEA supporting software vendor? My guess is a common MD (Mediator device) vendor was targeted that was used by many carriers but that's speculation on my part.
Context for others, there's a small number of software vendors that make these MD devices that handle initiating a capture of a flow (a wiretapping request) and managing the chain of custody for a pcap. MDs usually sends an SNMP poll to a router/switch to start a (r)span port and the MD device slurps up all data and saves it.
Anyway, what I'm curious about is if it's the MDs that were taken over and if it was one manufacturer but I'm not seeing much technical info on all these reports.
The simple answer is that CALEA requires all traffic to be effectively in plain text. Once you impose that constraint, any decent router exploit gives you everything.
Most protocols that I use day-to-day are secure against simple passive interception. Either SSH or TLS encrypts just about every packet that leaves my network. This got much better with DNS over HTTPS (or TLS before that). Of course these protocols are sometimes susceptible to downgrade attacks, man in the middle compromises, etc, but none of that would be available to someone who was running a pcap without modifying the traffic streams.
So how would a simple MD attack affect me? Any sort of CALEA attack on a higher protocol layer (e.g. compromising Gmail at Google instead of capturing their traffic) would make sense, but not a pcap.
That’s what makes CALEA so toxic. Any covered comms must be effectively-plain-text, or it doesn’t work. Once you impose a plain-text architecture, a mass-breach is inevitable.
Definitely, I would hope these kinds of systems become less useful with more encryption. I imagine, these kinds of collections I mentioned above are just one of many angles used in an investigation with this particular angle being for correlation and supporting evidence against a request to bookface, cloudflare, etc.
edit these network devices probably also carry voip/voice trunks from enterprise and possibly carriers such as VZW. No telling if those are encrypted or not. If China is able to tap that using these CALEA systems, I could see how that would be a big deal for stealing IP/secrets.
No. That’s what makes CALEA so damaging. It is ILLEGAL to encrypt covered traffic in a way that isn’t intercept-able by any random sheriff’s office in any county of the USA.
As far as I know, all telecommunications companies in the USA do not encrypt phone calls in the core of their networks; they may have TLS to/from the customers to the SBC (session border controller, a firewall/terminating point for customers), but once it’s past that point, it’s all sent in the clear.
Heh glad someone mentioned 1.5, that was my golden version. Pack friends into my parents garage with a hub and play local. No famas/shield and no STEAMing pile of shit (as we called it then). WOL server days iirc too. Scouts and Knives was my level of choice in those days. "Wanna knife this round?" <3
Similar request as the parent, my use case is I setup a long prompt/task and like to go for a walk around the block to get my legs moving. Being able to "move the llm along" and make small modifications from my phone would be nice. Personally, I'd never do a long session that way but the chance to move my legs while it does a long task but not get stuck on a simple question in the claude tool would be lovely.
Since this relies on simulating safari as the broswer, I wonder if a conditional access policy enforcing browser selection would help mitigate this.
While only realistic for a small number of users, I've started enforcing users of privileged tools to go through a wireguard instance before being allowed to access Azure hosted tools that rely on Entra auth. Services I publish then have a ingress whitelist of said wireguard VM.
This was always a victory to teenage me after fighting with SDL and Nvidia drivers on Gentoo. Getting this to work with good framerate was always so exciting. Nostalgia hit for sure.
reply