just remembered this thing I made a few years ago in which I wrote a program that, for each letter of the alphabet, draws every word containing that letter on top of each other, centering the letter in question http://static.decontextualize.com/averagewords/
The fact that Signal requires a phone number is annoying, but I understand the decision. It remove many barriers to use.
Unlike other messaging apps, users don't have to understand they they have an account, don't need a password, etc. Contact discovery is also much simpler, no need to maintain a separate contact list for Signal. So install Signal and can immediately send encrypted texts to any other Signal user. This simplicity is why it's so popular
Unfortunately almost all the journalists I know use iPhones, so they can't use it. Do you know if there's any plans for desktop versions, and multi-device support for the same user?
''Briar is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate''
It can operate over wifi and bluetooth, even during an internet blackout, encypts, @torproject integreated, has private chats, forums, blogs and more to come like crisis mapping and collaborative document editing
''Briar 1.0 release candidate'' is out get it on @fdroidorg
@devnull@Ocean do you have a Linux computer where your TPM will refuse to release a secret needed to unlock the luks partition unless secure boot verifies your bootloader hasn't been tampered with?
Probably not. This isn't supported in any distro yet-- there are no installer options, or packages you can install to make it happen. But it is supported in Windows and ChromeOS.
And as of a few days ago it should be packaged in fedora, too! So `dnf install porcupine`
You set porcupine as your default browser and when you click a link, it copies the URL to your clipboard, and you get to choose which AppVM to paste it into. Or, you can configure it to run a command, like `qvm-open-in-dvm %U`
@bugshiv@Wolf480pl nope I haven't, but it would be a worthwhile research project. I'd have to learn a lot more about smartphone hardware and forensics. The only phone I've left behind in untrusted places like hotel rooms has been one running Haven
@devnull@Ocean Ubuntu works with "secure boot", in that the BIOS verifies grub hasn't been tampered with before booting. But once grub has booted, it can chainload other bootloaders that have been tampered with, so it's not all that useful without TPM/luks integration
@devnull@Ocean I did not actually mean to claim that Windows is more secure. Just that Windows/Bitlocker and Chromebooks are the only desktop OSes that, out-of-the-box, use secure boot/the TPM to verify that bootloader code was not tampered with.
Except for the newest Mac Pros, Mac hardware doesn't have TPMs or other HSMs.
And there is no Linux distro where you get real secure boot benefits built-in. I have seen projects on GitHub that look promising, but that's it
@bugshiv@Wolf480pl my question was more, can I detect/catch evil maids attacks?
There's a big difference between being targeted for remote attacks (over the internet, like phishing, hacking my accounts, etc.) vs physical attacks, and this research basically completely ignores remote attacks, which are probably way more common.
@paulfree14 thank you! I'm often not please with my interaction with WL people no matter what platform I'm on, and unfortunately they sort of follow me around these days so I'm not surprised. But I don't hold it against the fediverse of course! :blobnom: