med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

416
active users

#protocols

0 posts0 participants0 posts today

Did you know that #GNU/ #FSF has its own #darknet application and protocol stack?

What is #GNUnet?

GNUnet is an
#alternative #network stack for building #secure, #decentralized and #privacy-preserving #distributed applications. Our goal is to replace the old insecure Internet protocol stack. Starting from an application for secure #publication of #files, it has grown to include all kinds of basic protocol components and applications towards the creation of a GNU internet.

Today, the actual use and thus the social requirements for a global network differs widely from those goals of 1970. While the Internet remains suitable for military use, where the network equipment is operated by a command hierarchy and when necessary isolated from the rest of the world, the situation is less tenable for civil society.

Due to fundamental Internet design choices, Internet traffic can be misdirected, intercepted, censored and manipulated by hostile routers on the network. And indeed, the modern Internet has evolved exactly to the point where, as Matthew Green put it, "the network is hostile".

We believe liberal societies need a
#network #architecture that uses the #anti-authoritarian #decentralized #peer-to-peer paradigm and #privacy-preserving #cryptographic #protocols. The goal of the GNUnet project is to provide a Free Software realization of this ideal.
https://www.gnunet.org/en/index.html

“The #Signal #leak was never about an #app. It was a diagnostic stain, exposing the rot festering beneath the Mythic US’s #veneer of #democracy and #law. The fleeting obsession with #encryption #protocols and personnel errors encapsulated the farce: a society expertly trained by its #distraction #machine to fixate on trivialities while the Operational US – the militarist-oligarchic core – wages #illegal #wars with #psychopathic #impunity

open.substack.com/pub/hailyb/p

The Geopolitical Compass · Beyond the App: America's Willing Acceptance of Imperial CrimeBy Raja Sohail Bashir
#US#Empire#Trump
Replied in thread

@thevril @pluralistic @kino

#SurveillanceState

👉Which #Messenger To Replace the #DataKraken #WhatsApp with? 👈

#FightTechnofeudalism

(5/n)

... I still have one, but 👉federated #XMPP just somehow can't seem to take hold outside of its own niche" 👈.

If you wanted to dig down even further, you'd get to the point where you'd have to deal with #Protocols:

eattherich.club/@jmhorner/1109

A French 🇫🇷 librarian association made an...

ETRJM Horner ™️ (@jmhorner@eattherich.club)@HistoPol@mastodon.social @smallcircles@social.coop Sweet! :-) For those who do not know, XMPP is a protocol (similar to the ActivityPub protocol being used by various fediverse services) that has many client applications. I can't think of any proprietary clients, though one or more may exist somewhere. XMPP actually spawned from Jabber (the protocol Google Talk originally used), and it is generally used for instant messaging style communications. It has the ability to include media, and can be end-to-end encrypted with [most commonly] OTR, OMEMO, or PGP. Jitsy on the other hand is a little more complicated, and in fact includes some XMPP interoperability. It has video conferencing services similar to what you might find in Teams or Zoom. It is open source, and can support end-to-end encryption when using a Chromium based browser. Both XMPP and Jitsy servers may or may not log IP addresses in the same way a web server like Apache or NGINX does. Though I imagine if that were added to the list for them, it would need to be added to the list for all of the others as well. Unique identifiers such as email address and phone number are simply not required for using either, and I am not aware of any XMPP or Jitsy services that have any advertising. Thanks for making the chart and if you have any other questions, do please let me know. :-)
The fact DoS-ing a server is even effective as a method of silencing anyone/anything is an indicator of the wrong design being used.

Server-centric design is almost always the wrong architecture to use for anything that is not strictly and invariably hierarchical (and even then, a *lot* of cases can do with message-centric and/or content-addressed distributed protocols).

#SoftwareDesign #Software #Servers #Protocols #Architecture #DoingItWrong

Giving this whole (maybe weekly) #LinkDump thing a go (in lieu of [and so far successfully escaping] writing newsletters)

#Networks #Protocols #Privacy

Guide to securing your digital life and protecting your privacy
digital-defense.io

Computer Networks From Scratch
networksfromscratch.com

Obsidian notes about 100s of network concepts/topics
notes.networklessons.com/

Protocols for synchronisable data stores
willowprotocol.org/
earthstar-project.org/
try.st.imu.li/projects/vernode (via @tryst)

Social web translator (HTML, JSON, ActivityStreams, Atom, RSS etc.)
granary.io/

#CollapseComputing #FrugalComputing #VM #ConcatenativeProgramming

The Collapsible Project
wiki.collapsible.systems

CollapseOS & DuskOS
collapseos.org/
duskos.org

tiny-ps — Web component to display PostScript inside HTML
github.com/bellenuit/tiny-ps
belle-nuit.com/my-journey-to-p

#ESP32 #EPaper #Meshtastic

ESP32-S3 w/ 4.7" touchscreen E-paper display
docs.m5stack.com/en/core/paper

Lilygo T5 E-Paper S3 Pro
lilygo.cc/products/t5-e-paper-

Lilygo T-Deck Plus (Meshtastic, GPS, 2000mah battery)
lilygo.cc/products/t-deck-plus

#Art

Community (and partially solar) powered online E-ink art frame
omniframe.art/

Upcoming exhibition @ ZKM Karlsruhe which will also include a custom version of my own DeFrag piece
zkm.de/en/2025/04/the-story-th

Zimoun's sound architectures, installations & sculptures — always an inspiration on many levels...
youtube.com/watch?v=xx4Kx6R7nv

#TechCommentary

Kill the “User”: Musings of a disillusioned technologist
pastagang.cc/blog/kill-the-use

digital-defense.ioDigital Defense - The ultimate personal security checklist to secure your digital lifeThe ultimate personal security checklist to secure your digital life
NEWSCARD: Decentralized, Encrypted Paste Bin via Usenet Newsgroups

NEWSCARD Publish and fetch permanent named records via Network News

Newscard creates a decentralized, encrypted, named record paste bin.

[git repo] https://codeberg.org/OCTADE/newscard (use most recent version only)

With a single command, name the card, snarf the file and encrypt it.

With another command, push the encrypted file to the public network.

With another short command, snarf a file from the network.

Only users knowing the name [key] of the record will be able to decrypt it.

If a strong passphrase is used to name the file, it will be very secure.

This is useful for quickly snarfing, encrypting, and publishing a text file:

$~: card enc [passphrase] [file]
$~: card put [passphrase]

It is useful for retrieving a text file with just a key:

$~: card get [passphrase]
$~: card show [passphrase]

If and when you want the general public to access the record just share the keyword.

Newscard uses nine (9) (NINE) layers of encryption with OpenSSL chacha20 cipher.

Newscard generates 9 each of: cipher keys, salts, key iteration parameters.

It would be nice if something like this were added to the ActivityPub protocol, such that keyword[@]host.url would do the same thing. Then secret text records could be stored securely for later retrieval or revelation.

#NewsCard #Pastebin #Usenet #NNTP #NetworkNews #Encryption #Cryptography #Messaging #Anonymity #Protocols #OpenSource #FreeSoftware #BlackHackJack #Censorship #Retro #InfoSec #Ciphers #Codes #FOSS

@infostorm@a.gup.pe @crypto@a.gup.pe @infosec@a.gup.pe
NEWSCARD: Decentralized, Encrypted Paste Bin via Usenet Newsgroups

NEWSCARD Publish and fetch permanent named records via Network News

Newscard creates a decentralized, encrypted, named record paste bin.

[git repo] https://codeberg.org/OCTADE/newscard (use most recent version only)

With a single command, name the card, snarf the file and encrypt it.

With another command, push the encrypted file to the public network.

With another short command, snarf a file from the network.

Only users knowing the name [key] of the record will be able to decrypt it.

If a strong passphrase is used to name the file, it will be very secure.

This is useful for quickly snarfing, encrypting, and publishing a text file:

$~: card enc [passphrase] [file]
$~: card put [passphrase]

It is useful for retrieving a text file with just a key:

$~: card get [passphrase]
$~: card show [passphrase]

If and when you want the general public to access the record just share the keyword.

Newscard uses nine (9) (NINE) layers of encryption with OpenSSL chacha20 cipher.

Newscard generates 9 each of: cipher keys, salts, key iteration parameters.

It would be nice if something like this were added to the ActivityPub protocol, such that keyword[@]host.url would do the same thing. Then secret text records could be stored securely for later retrieval or revelation.

#NewsCard #Pastebin #Usenet #NNTP #NetworkNews #Encryption #Cryptography #Messaging #Anonymity #Protocols #OpenSource #FreeSoftware #BlackHackJack #Censorship #Retro #InfoSec #Ciphers #Codes #FOSS

@infostorm@a.gup.pe @usenet@lemmy.world @crypto@a.gup.pe @infosec@a.gup.pe

My wife and I have two cards for an account with a major credit card. Traveling recently, she'd made a purchase on that card that triggered texts and emails to me worrying about fraud. This really bugs me.

Don't ask me why they're asking ME, not her. They CAN tell the cards apart. They should have asked her directly. It'd have been even faster. Delay was due to asking the wrong person.

"Charge OK? Yep. OK, done." That's all it should have been.

I verified things with my wife and texted back to the card's SMS query that it was OK.

But even after I inefficiently confirmed all was well, upon going to the web site, I was again confronted with the Fraud Department wanting to confirm purchases that I had already, through their clumsy interface, dismissed as non-issues.

Also at the site, I saw that they were playing a back-and-forth thing where the vendor was repeatedly retrying apparent new transactions to get an affirmative response. Every vendor in the universe likely knows there's no other way to get past this than to keep trying.

Given how bad their internal bookkeeping is, that they don't know I've dismissed this alert, I kept wondering what the chances are that sometimes people just get double-billed. You'd like to think there was a consistent state, a database, a single source of authority with data integrity and a unique view, but then again, they're not showing evidence they're good at that.

And now today I got mail from their fraud department asking me about my experience and whether, based on that, I'd recommend the card to a friend.

It WASN'T an incident of fraud. It was confirmed normalcy. It should have been finished now. Having already wasted my time once, they want to waste it more?

And let's leave aside my annoyance at the fact that every business in the universe has converged on this practice which (a) assumes I make recommendations based on a single experience, and/or (b) seems to be trying to single out an agent for blame, rather than considering process.

I seriously doubt that feedback from these surveys ever reaches the people designing the offending processes because modern customer service seems to have as its bedrock principle that no one inside the company should ever learn what the customer experience is. It feels like the purpose of customer service is as armor to make sure that the business can really see, much less absorb, the vast amount of useful information that customers would willingly provide about just how bad their product is. I think this because the worst parts never change, no matter how many of these surveys I fill out.

Here's what I wrote today:

«Declining a valid charge is not the answer to fraud. You may feel hampered by existing protocols, but the credit card companies all have this problem and all profess helplessness. They/you own this problem.

The problem is that every time you decline a purchase, the person we're buying from can't tell the difference between a stolen card, someone who doesn't manage money right, and you just being nervous. Create a way to send an error code that distinguishes these. A temporary error that says "I'm querying the customer, please retry this transaction." or even a way to just ask a question before responding. It's completely preposterous that the correct solution to this problem is to leave egg on my face because you can't have rational network protocols that fairly represent the actual information that needs to be represented.

You're using outdated ways of doing things because you're too lazy to make a new standard, and you figure it's just fine if you sully the reputation of every customer every time they make a nervous-making transaction, that they'll be fine about it, that they won't mind the uncomfortable conversations, that they love to have email, text, etc. in a zillion different places for a single transaction, information that confusingly lingers after-the-fact an that is just clutter.

So you're asking me now whether I think that was a kind of fun experience that would make me recommend your card to someone else? Do you hear yourself? Did this question really need to be asked?

What you did does not instill confidence. It just makes a mess of a routine situation that should have a routine interaction, and there is nothing about this interaction that has the look of routine, other than that customers are used to getting dumped on big Big Credit and having to take whatever you dish out.»

After more multiple choice questions, they asked if I had any other comments to add. I did add some reminders about alert fatigue and how real problems are likely to slip through the cracks when they're doing these other things.

Is it any wonder that not all of us are reassured by billionaires taking over the US and saying "don't worry, we're good at this", "deregulate us", "run the US like a business"?

"…there will always have to be a large corporation at the heart of #Bluesky or the #ATprotocol, and the network will have to rely on that corporation to control things like identity, illegal content and spam. This may be a good enough for most users (many of whom likely don't know or care about #decentralization or #protocols, etc) but it's likely to be a centralized system that relies on trusting a central authority.
Decentralized in theory, but centralized in practice."
torment-nexus.mathewingram.com

The Torment Nexus · Is Bluesky decentralized? It's complicatedA couple of weeks ago, I wrote at The Torment Nexus about whether Bluesky could become the new Twitter, and whether that would be a good thing or not. Since then, the network has just continued to ramp up its growth — it now has more than 23 million members, up

I don't think ActivityPub needs to be reinvented, although it could certainly be better maintained. Maintaining the spec might be an unenviable job given the multitude of competing interests, so it should be rotated or voted on.

Something like Gemini but with an equivalent to webforms would be good, and enable more of an alt-web to become established against the corporate browsers.

#Protocols #Internet