Here's a new series of Vaibhav Saini's blog posts on #IPFS that promises to go into depth about #IPLD, #multiformats, etc. The first article in the series had clear explanations of using #IPFS and #IPNS.

You're not a true CSS Guru until you can create a Still Life painting with pure CSS.

#webdev #css

So I wrote a Forth explainer if any of y'all were interested in that blog.information-superhighway.

I also, uh, started a blog I guess?
You can follow it at @jeremy if you want.

The really seems set to prove the Brexiteers right by taking every unpopular position it could possibly find and then talking condescendingly down to us when we disagree.

Worse yet, when called out, it can't even own it.

Someone at the should get a real grip, because the way things are going they're really not making a good case for themselves here and it seems no one in the appropriate positions is realizing this.

So the Commission decided it was a good idea to brand people opposed to copyright filters as "misinformed" and that “paid-for campaigns” were to blame. So not the people paid by the copyright industry to pass this despite how unpopular it is, but we, the citizens. were somehow manipulated by “paid-for campaigns” to oppose , because, you know, apparently there's been a lot of money historically put into campaigns that benefit individuals instead of corps, yeah, that's been a thing.

Great. Google have added a level of bureaucracy to their OAuth, requiring apps be verified before people can grant access to their accounts.

Since I missed the initial notice this was happening, and the verification process can take *weeks*, the #mailpile credentials may be disabled. Nobody will be able to download their mail for who knows how long.

Nothing anti-competitive to see here, this is fine. Just use the official Google apps, you'll have fewer problems.

In the name of security... 😞

Support for “content extensions” (a.k.a. native content filtering/blocking) has just landed in the GTK and WPE #WebKit ports. It has been a long ride, but all the iterative improvements and code reviews was worth it, and the new public API looks much nicer than my initial proposals. Thanks to everybody who helped out! →

The new feature will be available in version 2.24.x, to be released soon 🙌

Don’t know where I first saw this:

The only difference between noise and ciphertext is your faith that there can be a key for the ciphertext.

This paper on a malloc() replacement that DOES COMPACTION even on C/C++ is making the rounds:

Scarily beautiful.

~=8 Character Passwords Are Dead=~

New benchmark from the Hashcat Team shows a 2080Ti GPU passing 100 Billion password guesses per second (NTLM hash).

This means that the entire keyspace, or every possible combination of:
- Upper
- Lower
- Number
- Symbol

...of an 8 character password can be guessed in:

~2.5 hours

(8x 2080Ti GPUs against NTLM Windows hash)

#Hacking #Infosec

britpol Show more

Are you interested in how to bring secure, private, peer-to-peer distributable content to the fediverse that can survive nodes going down? I've finished writing the documentation for the #Spritely Golem demo which explains how to do just that:

It also includes a running, workable demo which you can try yourself. Please do and let me know your thoughts!

Opinion: Streaming services are a mistake from an environmental perspective.

Movies should be distributed over the Internet more like broadcast TV and/or video stores + sneakernet. That'd make more efficient use of bandwidth where it most counts.

With the latter traversing fewer hops, and implemented in tech like BitTorrent.

(And yes, I have no doubt Netflix et al does minimize the bandwidth they use. I just doubt they can go far enough)

I don't know why, but it kind of bothers me when videogames refer to nameless enemies as 'bandit', 'thug', 'scavenger scum' when the things they do in the world are essentially exactly the same as the player, but because you control them, they somehow do not fall into the thug/bandit/scum category.

Why Does Maintain Our Own Root Certificate Store?

"OS vendors often serve customers in government and industry in addition to their end users, putting them in a position to sometimes make root store decisions that Mozilla would not consider to be in the best interest of individuals.

The same is true for products that intercept traffic on a computer. For example, many antivirus programs include a web filtering feature that intercepts HTTPS requests by adding to the OS root store".

Show more
Matej Lach's mastodon

Hi there! I am a free software developer. I enjoy working on useful software, as well as advocating for software freedom and the use of open standards, promoting data ownership, decentralization and privacy. If this is important to you, I may be worth following. If you like Go, Rust, or Swift, it may be worth following me as well. Besides computing, I enjoy metal, a good read and occasionally some gaming, (not much time for that these days).