smiletolerantly

joined 2 years ago
[–] smiletolerantly@awful.systems 48 points 1 week ago (4 children)

IMHO, this time round, only without special treatment and only if adopting the Euro.

[–] smiletolerantly@awful.systems 44 points 1 week ago (4 children)

Oh please. Be real. Are you sure there's nothing in your flake to refactor or modularize? :)

[–] smiletolerantly@awful.systems 10 points 2 weeks ago

Sat idly one day, it popped in my head, I went "huh, neat" and started the paperwork.

[–] smiletolerantly@awful.systems 3 points 2 weeks ago* (last edited 2 weeks ago)
  • German (native)
  • English (pretty well I hope; half my working life and almost all my free time spent on the internet, shows, books,... has been happening in English since, like, 8th grade)
  • Japanese (learning; enough for talking about food, the weather, hobbies,... in somewhat acceptable grammar 😄)
[–] smiletolerantly@awful.systems 5 points 2 weeks ago (1 children)

Sorry to bother you, hope it's alright if I ask for some clarification. English isn't my first language, so I'm a bit uncertain here: is "cad" a euphemism for "racist", "pedophile", "shitbrain", "misogynist", "felon", or some equally true and fitting term I'm not aware of?

[–] smiletolerantly@awful.systems 4 points 2 weeks ago (1 children)

Oh, whew! Just grooming then, that's A-OK!

[–] smiletolerantly@awful.systems 1 points 2 weeks ago (1 children)

Isn't that exactly what the commit message is for?

Chat is this real?

Huh - you're right. I went back to Signal's X3DH spec because I was sure I was right, but it seems I misremembered how the "prekey bundles" work: Users publish these to the server, allowing (in my original assumption) for the server to just swap them out for a server/attacker-controlled key bundle for each Alice and Bob.

However, when Alice wants to send Bob an initial message and she gets a forged prekey bundle, Bob will simply not be able to derive the same key and communication will fail, because Bob knows what his SPK private key is, while the server only knows the public key.

[–] smiletolerantly@awful.systems 2 points 2 weeks ago* (last edited 2 weeks ago) (2 children)

A compromised server would allow the server to man-in-the-middle all new connections (as in, if Alice and Bob have never talked to each other before, the Server/Eva can MITM the x3dh key exchange and all subsequent communication). That's why verifying your contact's signatures out-of-band is so important.

(And if you did verify signatures in this case, then the issue would immediately be apparent, yes.)

Edit: I was wrong. See below.

That's why safewords should be passphrases! /s

Hold on, actually no, not /s

view more: ‹ prev next ›