max

joined 1 year ago
MODERATOR OF
 

The man in this video is a rather controversial political figure, and this video received quite a mixed response.

But, putting that aside, I thought this would be a good video to open the community with because it showcases the transition to a cashless society and the urge of some of us to fight against it.

[–] [email protected] 2 points 1 year ago (1 children)

This week I've been paying by cash, and I noticed a few things.

One thing is that there is a lot of people paying with cash that are doing so because they do not have another option. Some of them are simply tourists without a working card, but I suspect some of them might really have no card at all.

The other is that the people at the shop do notice when a long line of buyers stand to pay with cash. I have seen cashiers struggling to get someone to stand on the second cash register to offload some customers.

As for the ethical vendors... I struggle with this. It is just so much more convenient to go buy from the Albert Heijn that's right under my apartment. I tried the shops around, but they rarely have what I want, products are often more expensive, and lower quality. I also don't know how to tell whether specific small vendors are ethical vendors or not. So, for now I just go to AH for most of my purchases.

 

Ouch.

The swindler “airdropped” the fake address into the DEA’s account by dropping a token into the DEA account so it looked like the test payment made to the Marshals. The idea here was to basically trick the DEA into thinking the scammer’s address was actually the Marshal’s service’s address. Crypto addresses are so long that people usually just copy and paste instead of typing them fresh each time. Airdropping is a legitimate feature in cryptocurrency and sees an individual or entity drop tokens representing a certain value of a currency into someone’s account. It’s normally done as part of a launch of a new kind of token, but it’s also been abused by those seeking to dupe crypto owners into scams like this.

[–] [email protected] 2 points 1 year ago
[–] [email protected] 2 points 1 year ago (3 children)

Thanks! Not only is this a great list of actions, but it also has helped me see this whole issue from a new perspective. More specifically, I multiple times I have tried to switch to cash-only because of privacy reasons, and I eventually become discouraged. For example, I recently gave up again. I have a shared card with my girlfriend, and she doesn't really care much about privacy, so I felt like I was punishing myself for not good reason by paying with cash if my girlfriend next was going to pay with our card anyway.

But now that you have framed it from the point of view of those accepting cash, it does give me an additional source of motivation. It's not only about my personal privacy, but also about pressuring vendors to accept it. This makes it worth it even in cases where there might not be a privacy benefit. Starting now, attempt #I-lost-count begins.

[–] [email protected] 2 points 1 year ago (5 children)

You are right... Cash is king, and letting it be phased out is not a good idea.

You have me on board - how do we stop this?

[–] [email protected] 2 points 1 year ago (3 children)

Interesting. I haven't followed development in the space of "official" crypto currencies, but my impression is that these will probably be centralized, have little to no privacy features, and that the governments will be able to control access to the funds.

But I may be wrong - maybe they are actually building decentralized crypto networks? I just find it hard to believe that a government would do this.

[–] [email protected] 2 points 1 year ago (12 children)

Yes, it is increasingly difficult to pay with cash in the Netherlands. Even at the Albert Heijn they have set it up such that it is a lot more convenient NOT to pay with cash. They have a large amount of self-service pin-only checkouts, and one or maybe two workers accepting cash at the manual checkout lane.

One path is to make an effort to resist this digital move and pressure politicians so that they enforce these type of rules and that cash is accepted. But I think this can at best slow this process down.

The other path is to embrace the digital move and start integrating crypto currencies into our societies in a more substantial manner. I know that many people have given up in crypto, but, putting speculation and hype aside, crypto is the best way we know of to integrate cash-like payments into the digital world. Right? Or is this something others disagree with?

[–] [email protected] 3 points 1 year ago (1 children)

No, I'm not concerned about a lawsuit. It's something that I want to do because I think that it is important. If I want to share tools with non-tech savvy people who are unable to build them from source, I want to be able to share these without anyone needing to "trust" me. The reproducible builds standards are a very nice idea, and I will learn how to implement them.

But I still wonder whether my approach is valid or not - is printing the hash of the output executable during Github's build process, such that it is visible in the workflow logs, very strong evidence that the executable in the release with the same hash was built by github through the transparent build process? Or is there a way a regular user would be able to fake these logs?

[–] [email protected] 2 points 1 year ago

Ooh, I did not know this one was of the properties of Rust.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (2 children)

Thanks! I am convinced now, I will learn how to create reproducible builds.

My worry is that the build is run through npm, and I think that the dependencies rely on additional dependencies such as openssl libraries. I worry that it will be a lot of work to figure out what every npm dependency is, what libraries they depend on, and how to make sure that the correct versions can be installed and linked by someone trying to reproduce the build 10 years from now. So it looks like a difficult project, but I will read more about it and hopefully it is not as complicated as it looks!

11
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

The linked paper was pointed out to me during a discussion about trusting executables built from source. Perhaps this paper is a well-known document in the hacking community, but I thought it was quite interesting and thought I'd share it.

The document describes how the author created a bugged C compiler that would compile UNIX code in which the "login" command would insert a backdoor.

The actual bug I planted in the compiler would match code in the UNIX "login" command. The re- placement code would miscompile the login command so that it would accept either the intended encrypted password or a particular known password. Thus if this code were installed in binary and the binary were used to compile the login command, I could log into that system as any user.

The author also describes strategies to build such bugged compiler in a way that would be very difficult to detect.

The document ends with a moral statement about hacking with a perspective from 1984 which is also an interesting read.

[–] [email protected] 2 points 1 year ago (1 children)

Ah. Cool. I was under the impression that docker images suffered from a similar issue - that one can't verify that the image is built from the source. I'm happy to be mistaken about that.

[–] [email protected] 2 points 1 year ago (3 children)

How does a docker distribution solve this problem? Is it because the build instructions are automated by the Dockerfile?

[–] [email protected] 8 points 1 year ago

My new phone runs GrapheneOS and I love it.

One recommendation that I would give people is that it does not need to be an all-or-nothing jump into the abyss. It can be a bit disheartening when you try to get rid of all the privacy-invasive things in your life and you get cut off from your family and friends.

After some failed attempts, the strategy that I have found more successful is that I have new phone that I installed GrapheneOS into, and I keep the older phone with whatsapp. The older phone is in Airplane mode connected to WiFi at my home. It is effectively a landline. I can still use it once or twice a day to check on my family through WhatsApp without having to broadcast my location all day to Meta. This way I don't need to install any sandboxed Google Play services into my new phone. The old phone is the sandboxed Google Play. I also use the old phone for verifications, 2FA, and any other things that I don't want to contaminate my new phone with.

Over time I am finding that my GrapheneOS is perfectly functional. The main difficulty is the chats services that are used by my family, friends, and work-related "group chats". I have convinced some people to join my XMPP server, including my mom (wuhuu), but it is an uphill battle. That's why the other phone is still essential for me.

 

I have forked a project's source code on GitHub. The program takes a private key as an input and that key must never leave the client. If I want to share a pre-built executable as a release it is essential that I can prove beyond reasonable doubt that it is built from the published source.

I have learned about how to publish the releases by using a Workflow in the GitHub actions such that GitHub itself will build the project and then repare a release draft with the built files as well as the file hashes..

However, I noticed that the release is first drafted, and at that point I have the option to manually swap the executable and the hashes. As far as I can tell, a user will not be able to tell if I swapped a file and its corresponding hashes. Or, is there a way to tell?

One potential solution that I have found is that I can pipe the output of the hashing both to a file that is stored and also to the publicly visible logs by using "tee". This will make it such that someone can look through the logs of the build process and confirm that the hashes match the hashes published in the release.

Like this:

I would like to know whether:

  • There is already some built-in method to confirm that a file is the product of a GitHub workflow

  • The Github Action logs can easily be tampered by the repo owner, and the hashes in the logs can be swapped, such that my approach is still not good enough evidence

  • If there is another, perhaps more standard method, to prove that the executable is built from a specific source code.

 

cross-posted from: https://feddit.de/post/2396303

Bad actors are actively exploiting this flaw to steal funds from affected wallets on multiple blockchains, they say.

 

Background

I would like to have a unique CSS stylesheet for nano.garden for users that prefer light themes. I started working on one but I did not like where it was heading (https://nano.garden/css/themes/nano-light.css), so I figured it would be better to out-source this task to more experienced members of the community. New themes in Lemmy are added by using a .css file that contains the variable definitions. A list of themes included in the official Lemmy can be found here: https://github.com/LemmyNet/lemmy-ui/tree/main/src/assets/css/themes

You can look through the different themes by going to your profile page and selecting the theme, and then you can pull the CSS file using the browser inspector to use a reference.

Deliverable

A .css file that contains the variable definitions for the stylesheet for the nano-light theme. The theme should feature a light color (white, cream, ivory, or similar) and one or a few of these blues [#209ce9, #3c4e7a, #5368a0]. The theme should work with the pages visible to regular users (main screen, profile, settings page, communities page, log-in screen). Other than this, you can get creative.

Conditions for payment

Payment will be delivered once the theme (or a derivative of it) is added as a theme to nano.garden.

Payment options

  • Ӿ50 (XNO) delivered to a nano address.

If you start working on this, please make a comment to indicate that you are working on it. This is to avoid having multiple people working on the same task without being aware of the level of competition.

 

Canvas is available for Lemmy!

This is similar to reddit's /r/place. Each user gets to place a pixel on a canvas. The pixels are refreshed every 30 seconds.

The website with the canvas is: https://canvas.toast.ooo/

To log-in, you simply provide your instance's name and your username, and you get a code to log-in.

I have made a template for making an XNO flag. You can reach it by clicking here.

In the settings there is a button that allows you to toggle the tample on/off. You can use that button to make sure that you are placing the pixel in an unoccupied spot.

2
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

These past few days I've been working on integrating nano into a lemmy instance, which you can check out here: https://nano.garden/

As of now, I have done the following:

  • I have added a "nano_address" column to the "person" table to store a user's public address. A user can add their address through the user settings.

  • If a user has a nano address, a "nano" badge will appear next to their name on their profile, posts, and comments. Clicking on a user's badge will bring you to nano.to/user_address , from where there are many methods to submit a tip to the user (open wallet in pone, copy address, or scan QR code).

  • I have also implemented a new type of faucet. A bot is checking for new comments, and if someone with a nano address creates a comment, the faucet will send them 0.01 XNO.

Because of the way that these changes are implemented, if another instance were to run the same backend and UI, the badge would be federated across instances. This implementation can also be modified to create other type of user badges with a customizable URL, such as to add other crypto assets or to link to other sites.

The back-end and UI modifications can be found here:

https://github.com/nanogarden/nanogarden-lemmy/tree/ng-lemmy-0.18.3

https://github.com/nanogarden/nanogarden-lemmy-ui/tree/ng-0.18.3

The python faucet bot code is a bit of a mess, but I will clean it up and put it up on github if anyone is interested.


Note: I'm not associated with the Nano Foundation, nor do I hold a lot of nano. I am interested in the direct and anonymous transfer of digital cash without the need of an intermediary. I chose Nano for this because the implementation of this system is simple in comparison to other cryptocurrencies that I've looked at. This is just a small fun project, nothing serious.

1
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

I'm running a little experiment... The nano.garden faucet!

To participate:

  • Be registered in the nano.garden instance

  • Associate a public nano address with your account in your profile settings

  • Make comments

For every comment the faucet should deliver 0.01 XNO to your account!

There is a cooldown period of 2 minutes between comments and a maximum amount of nano per account set to 0.5 XNO every 24 hours.

This is a very alpha version... Let's see how it goes!

The faucet address is: nano_1ex1zqsdyqc3heiifc9sqc8pd8zmamkp3awgd5gwfejx9teqownw5fxrhgg5

 

Background

I would like to have a unique CSS stylesheet for nano.garden for users that prefer light themes. I started working on one but I did not like where it was heading (https://nano.garden/css/themes/nano-light.css), so I figured it would be better to out-source this task to more experienced members of the community. New themes in Lemmy are added by using a .css file that contains the variable definitions. A list of themes included in the official Lemmy can be found here: https://github.com/LemmyNet/lemmy-ui/tree/main/src/assets/css/themes

You can look through the different themes by going to your profile page and selecting the theme, and then you can pull the CSS file using the browser inspector to use a reference.

Deliverable

A .css file that contains the variable definitions for the stylesheet for the nano-light theme. The theme should feature a light color (white, cream, ivory, or similar) and one or a few of these blues [#209ce9, #3c4e7a, #5368a0]. The theme should work with the pages visible to regular users (main screen, profile, settings page, communities page, log-in screen). Other than this, you can get creative.

Conditions for payment

Payment will be delivered once the theme (or a derivative of it) is added as a theme to nano.garden.

Payment options

  • Ӿ50 (XNO) delivered to a nano address.

If you start working on this, please make a comment to indicate that you are working on it. This is to avoid having multiple people working on the same task without being aware of the level of competition.

view more: next ›