• 5 Posts
  • 16 Comments
Joined 1 year ago
cake
Cake day: April 3rd, 2024

help-circle
rss


  • That was the Framers’ intention. It was not for a hunting permit. Do you have a better idea about how to enforce the self-preservation of liberty and freedom from tyranny when the tyrannical government is armed and disposed to use force against a subjugated population? How would you prevent another King George? Say you don’t like Trump and he has all the top guns as the next POTUS and decided to declare a military dictatorship? Sure, they have the most powerful weapons but lawyers aren’t going to help. Wouldn’t you rather fight for freedom than lay down and die in the camps?



  • Yep. They all pretty much just jack with the flag.

    Especially if it is at someone else’s expense so they can get a rush off of subjugating defenseless civilians and leading off sadistically with the enslaved, risking nothing in their hidden-bunker cowardice.

    “guard against the impostures of pretended patriotism”





  • Ah, that must be it. 2FA is still a very good security feature to have.

    But there is nothing only you know that is still useful because a secret must be shared in order to be useful (unless you just have full disk encryption and then when it is unlocked and network connected, it is still vulnerable). In short, admins could change your password since you are not the sole admin of your own server but then you would have to have mass appeal to be “useful”, i.e. popular.

    In theory, Tim Cook might have a keybearer who could usurp the throne with all the proprietary OEM crypto keys that only the Company knows, but everyone knows who the CEO is and the keybearer could get in big trouble unless he had an army…

    Things can be changed on the server side and the network is not the same as the device: these are technology truths some people refuse to ever understand.







  • Do you want to show us what that looks like in assembly, ASCII from machine code? …ha, ha, ha, no!

    Depends on the device, I know. Such a pain without the higher level languages.

    What would it look like for ARM android touch screens? Just for one character…

    But if some characters go missing or are exchanged for others for no discernable reason, then might that be an exploit on a EC or assembly level?



  • If you like anonymity, then the Retro thinkpads should still be the best as they are numerous and hardware profiling is useless (if you are a TAILS or tor user – “Windows” everywhere!).

    Also, check out the “hardware compatibility list” from Qubes OS (they’ve got an endorsement from Snowden right on their homepage). The i5 and i7 Intel CPUs virtualize and are very well understood by people that work with Xen. Notice how Intel just crashed with the latest generation CPU lines. Just because it is brand new, doesn’t mean it is highest security and reliability. (For example, nuclear silos sometimes still use floppies and are air gap compartmentalized with people in the loop. Might not be best for all the nukes to be on skynet and latest videogame capable. Depends on what you are doing for what is “best.”)

    Modularity on Framework is pretty cool though.