zmej420blazeit

joined 1 year ago
[–] zmej420blazeit@lemmy.world 1 points 1 year ago

he has said a lot of things to get his point across. when you are dealing with people that speak multiple languages via mailing list, sometimes it takes a little hyperbole.

my complaint about him is how little he cares about security. great lead dev in so many ways except that aspect

[–] zmej420blazeit@lemmy.world 2 points 1 year ago

haha yeah, for 26 years now. year of the OpenPGP any day now.

I agree with you, but the vast majority of people will always sell themselves out for convenience. If PGP caught on, you'd have iPhones with a built-in PGP messaging feature that sends everything unencrypted straight to apple before it sends the encrypted version.

[–] zmej420blazeit@lemmy.world 4 points 1 year ago

nearly all your data is public, so there's no need for anyone to pay for it. this is a public platform where everything is relayed unencrypted to other activitypub nodes. If I click your name here and try to DM you I even see this warning: "Warning: Private messages in Lemmy are not secure. Please create an account on Element.io for secure messaging."

[–] zmej420blazeit@lemmy.world 2 points 1 year ago (1 children)

Why do you think all these dipshit red states are trying to make porn sites go ham on the identification and gathering data just to watch porn? Could it be because they have ulterior motives and wanna target gay and other “sinful” people?

this is pretty tangential, but I live in one of those states, I don't agree with the law, but I'm pretty sure their ulterior motives are securing votes. The reason people like those laws is that they think the laws protect children (they don't, they make the internet more dangerous.) But those people pushing the laws really don't give a fuck about gay people watching porn

[–] zmej420blazeit@lemmy.world 10 points 1 year ago (1 children)

Encrypting user data is pretty standard in the industry, and even required by law in the instance of servers hosting medical information in the US. Consumer software for disk encryption like you mentioned is substantially different from usual encryption solutions employed by data centers. Whole disk encryption is commonly done at a firmware or hardware level. For an example, iPhone embedded storage is fully encrypted and tied to the rest of the phone's hardware. No user input required.

It wouldn't have mattered if the guy had encryption any way because, as the article mentioned:

To make matters worse, it appears that the admin targeted in the raid was in the middle of maintenance work which left would-be-encrypted material on the server available in unencrypted form at the time of seizure.