• Zerush@lemmy.ml
              link
              fedilink
              arrow-up
              1
              arrow-down
              1
              ·
              4 days ago

              Don’t confuse TOR with security, you can get exposed to use the Onion without an additional encrytion layer or VPN. TOR cannot encrypt the traffic between an exit relay and the destination server.

              • Sizing2673@lemmy.world
                link
                fedilink
                arrow-up
                6
                ·
                4 days ago

                Sure, like any security it operates in layers

                Totally disagree that Tor does not address security. The loophole you mention is indeed well known, but again it’s an exploit like anything

                And like any security thing, you stack a few layers to get the real world security

                • Zerush@lemmy.ml
                  link
                  fedilink
                  arrow-up
                  5
                  arrow-down
                  1
                  ·
                  4 days ago

                  The TOR network is certainly pretty secure, but it’s always advisible to use it in the Onion not without an additional layer, at least with a good VPN. Anyway I think that the future is in a descentralized web (I2P, Hyphanet, Snowflake, Shadowsocks and similar), the normal Internet is to heavy controlled by big companies and govs.

      • Kazumara@discuss.tchncs.de
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        4 days ago

        One theory is that Tor was opened to the public by the United States Naval Research Laboratory only to create a crowd of users for their agents to hide in. You need a large enough anonymity set for these sorts of technologies to work.

    • gomp@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      5 days ago

      Well, at least the one he used for thruth is safe (mastodon IIRC?)

  • Lør@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    59
    arrow-down
    3
    ·
    5 days ago

    Elections have consequences. I am no longer on speaking terms w/ trump voters.

      • green@feddit.nl
        link
        fedilink
        English
        arrow-up
        7
        ·
        4 days ago

        The appropriate sequence of events would be:

        Trump starts tariffs > People switch to FOSS > Trump cuts funding to FOSS

        This really isn’t double-speak and, if anything, clearly shows the hostility of the admin. They are just incompetent, short-sighted, and overall an enemy of the people.

  • vfreire85@lemmy.ml
    link
    fedilink
    arrow-up
    23
    arrow-down
    1
    ·
    4 days ago

    the guy is literally a political front for techbros, it’s not like he would do something else.

    • Phoenixz@lemmy.ca
      link
      fedilink
      arrow-up
      10
      ·
      4 days ago

      Tech bros are only interested in getting the results from open source. They want the free software from their slaves, they aren’t interested in paying anything.

      Tech companies, for a while, added a bit to open source as it was in their own self interest, but they still shut out everything that wasn’t them, they still make the internet in the horrible stonewalled garden that it is today. No account? Half the internet isn’t accessible to you anymore

      Fuck all the big tech and social media companies

  • sunglocto@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    4
    ·
    3 days ago

    This is it… This is the last straw!!! I was ok with the destruction of free trade, I was ok with the genocide funding, I was ok with the bastardisation of the administrative branch, and I was absolutely okay with the racism!!! But this, THIS??? ABSOLUTELY UNACCEPTABLE!!! As a MAGA supporter, I cannot stand for this any longer! You should be dismantling the minorities, not my website!!!

    /s

        • buddascrayon@lemmy.world
          link
          fedilink
          arrow-up
          12
          arrow-down
          2
          ·
          5 days ago

          Let me spell it out for you. Trump has removed our cyber defenses and now he’s defunding FOSS projects like Tor and Let’s Encrypt!…

          Now Trump wouldn’t know a FOSS project from a hole in the ground but do you know who does? What world leader who has an entire cyber attack force on his payroll and wants to remove any barriers in finding dissidents who are probably using Tor to coordinate and hide from them?

          Do the math. If the government funding of these projects is allowed to be removed it’s gonna be a whole new ballgame on the internet and the only ones to reap the benefits are the dictators.

  • shortwavesurfer@lemmy.zip
    link
    fedilink
    arrow-up
    16
    arrow-down
    2
    ·
    edit-2
    4 days ago

    As far as Let’s Encrypt goes, the easy way to solve that is self-signed SSL certificates and Tofu. Just make it stupid obvious if an SSL certificate changes on a site that you go to. Like, turn your browser into a giant red screen that says that the security of the website has changed and may be broken obvious. Maybe you could have search engines also index SSL certificates so you could see if Google and Bing and DuckDuckGo and whoever else all say that this website has the same SSL certificate that it has had for X amount of time and if the search engines start showing different results you get suspicious.

    Edit: Using self-signed certificates and tofu fits better with the decentralized ethos of the original web anyway since you’re not relying on some third-party authority to tell you what’s safe and what’s not.

    • WhyJiffie@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 days ago

      i don’t think this is a good idea. govs could just set up a big reverse proxy for lots of sites to serve them with their own certs, and you wouldn’t know

      • shortwavesurfer@lemmy.zip
        link
        fedilink
        arrow-up
        2
        ·
        3 days ago

        Seems like no change from right now, because currently the certificate authorities are centralized entities, which could be pressured by governments to add their own certificates.

    • Petter1@lemm.ee
      link
      fedilink
      arrow-up
      2
      ·
      3 days ago

      How about a Blockchain or Directed Acyclic Graph (DAG) out of SSL certs 🤔

      I think that would finally be a use case for that tech, lol

        • Petter1@lemm.ee
          link
          fedilink
          arrow-up
          1
          ·
          3 days ago

          If you issue a certificate, you proof ownership via * challenge–response test that is validated by each node. If x% (like eg. 70%) of nodes agree that the test is passed, the block counts as validated and can be placed onto the chain. (Each node places the block on their chain and the hash must be same as hash of chain of majority of nodes)

    • marauding_gibberish142@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 days ago

      Never heard of tofu before (the software). What is it?

      I had heard about DANE and how that would help in scaling back the need for big CAs but I could never grasp how one would do that. Do you know about it? I’m looking for someone to explain it to me.

      • shortwavesurfer@lemmy.zip
        link
        fedilink
        arrow-up
        6
        ·
        4 days ago

        Tofu stands for Trust on First Use. So basically, you would get an SSL certificate from the website the very first time you connected to it, instead of trusting a certificate authority. Then, if the SSL certificate changed, you would then be warned that the certificate had changed and would have to decide whether to trust the new certificate or not trust the new certificate. That’s why I said perhaps search engines could index certificates and tell you how long the certificate has been active and you could check several engines quickly to determine whether each engine has the same certificate indexed for the same website and if they did not then you would know something might be up.

        • Thorned_Rose@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 days ago

          I don’t feel like this adequately accounts for stupid people though. The number of times I’ve seen people freak out over a perfectly legit website because a cert warning popped up or others who have ignored the warning and clicked through to a scam or malware… 🤦‍♀️

          • shortwavesurfer@lemmy.zip
            link
            fedilink
            arrow-up
            2
            ·
            4 days ago

            Well, it really depends on if you want somebody to trust or not. If you don’t want to trust anybody except yourself, then you can just use Tofu and be good with it. The only reason I brought up using search engines as an index is just to give people a place to look.

            If I want to visit CNBC and I’ve never visited them before, I could just go straight to CNBC and trust their certificate right away. Or, if I wanted to confirm that the CNBC certificate was likely valid, I could ask DuckDuckGo, Google, and Quant. And if they all agreed that they had the same certificate that I was getting, I’d be more likely to think that it’s valid.

              • shortwavesurfer@lemmy.zip
                link
                fedilink
                arrow-up
                2
                ·
                4 days ago

                Well, you can just generate your own SSL certificate on your machine, locally. I believe you can probably do it with OpenSSL. I’ve only done it with my Monero node, and they offer a binary, which will generate a certificate for you. I would just look up how to create a self-signed SSL certificate. My guess is it’s just a few commands in the terminal.

                • marauding_gibberish142@lemmy.dbzer0.com
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  4 days ago

                  No, I meant the logic where the browser would prompt the user to review and verify the cert for a particular website without consulting a CA. I run some self-signed certs already but I’d love to implement this in my homelab.

  • PunkiBas@lemm.ee
    link
    fedilink
    arrow-up
    11
    arrow-down
    1
    ·
    5 days ago

    This is terrible news, anyone know of alternatives to let’s encrypt?

  • ReakDuck@lemmy.ml
    link
    fedilink
    arrow-up
    2
    arrow-down
    14
    ·
    4 days ago

    Well, tbh. If its my last time being president, I would also burn everything to show how the country sucks an is irrepairable.

  • AwkwardBroccolli@lemmy.ml
    link
    fedilink
    arrow-up
    7
    arrow-down
    16
    ·
    5 days ago

    The solution to this is simple. A change to the MIT license to bar .gov projects to use the open source projects.

    • JTskulk@lemmy.world
      link
      fedilink
      English
      arrow-up
      19
      arrow-down
      1
      ·
      5 days ago

      These are FOSS projects, not open source. They’d no longer be FOSS and that would be bad. Freedom 0 is important.

      • AwkwardBroccolli@lemmy.ml
        link
        fedilink
        arrow-up
        7
        arrow-down
        8
        ·
        5 days ago

        Its possible to add free for all except US govt and that does not stop it from being free for the rest of the world.

        • JTskulk@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          4 days ago

          That stops it from being Free, which is freedom 0. From GNU.org:

          A program is free software if the program’s users have the four essential freedoms:

          1. The freedom to run the program as you wish, for any purpose (freedom 0).
          2. The freedom to study how the program works, and change it so it does your computing as you wish (freedom 1). Access to the source code is a precondition for this.
          3. The freedom to redistribute copies so you can help others (freedom 2).
          4. The freedom to distribute copies of your modified versions to others (freedom 3). By doing this you can give the whole community a chance to benefit from your changes. Access to the source code is a precondition for this.

          A program is free software if it gives users adequately all of these freedoms. Otherwise, it is nonfree. While we can distinguish various nonfree distribution schemes in terms of how far they fall short of being free, we consider them all equally unethical.

          What you’re talking about is changing Free software to be non-Free. No thanks.