Indie iOS app developer with a passion for SwiftUI

  • 1 Post
  • 25 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle


  • There are a couple of concerns with biometrics.

    The big one is, as you already mentioned, spoofing biometrics.

    The FaceID or TouchID sensor essentially saying “I got that face/fingerprint that you have in your Secure Enclave”. Granted it is a sophisticated attack, but nevertheless one you’d want to prevent if only because it’s good practice to maintain a secure chain in which the individual links can trust each other.

    For similar reasons the lockdown mode exists, which is mainly useful in limited scenarios (e.g. journalists, dissidents, etc).

    On the other hand, if ever there was a potential attacker, it would be a government because they unlimited funds in theory and it isn’t hard to imagine the FBI trying to utilize this in the San Bernardino case if it was available.

    A different risk, which would make the above quite a bit easier to accomplish, would be an altered biometrics scanner that, in addition to working the way it’s supposed to work, stores and sends off your biometrics or simply facilitates a replay attack.


  • Lossless is understood to have a bitrate of at least 1411kbps, or about 1.4Mbps.

    Theoretical sustained bandwidth capability of Bluetooth on the 2.4Ghz spectrum is 1Mbps, but in practice it’s a chunk lower in part due to overhead.

    Even if we assume if you could just cram a higher bitrate through a smaller bandwidth (spoiler, you can’t), everyone would be up in arms about Apple lying about lossless and class action suits would ensue.

    That said, you can’t. This is not like your internet connection where you’ll just be buffering for a minute.

    As for what is and isn’t perceptible, I think you’re mixing up your tonal frequencies with your bitrates here.


  • Honestly the most frustrating part is that there is plenty to criticize Apple on, so there’s no reason to get caught up in fabricated clickbaity nonsense.

    But instead of focusing on genuine concerns, people would rather hop on some misinformation train.

    All the while, if you espouse opinions that are bit more nuanced than “Apple bad”, then you must be a bootlicker like you said.

    It’s as if people are more concerned about missing out on joining the hype and showing off their armchair skills, rather than exercising a modicum of critical thinking.


  • Obfuscating what you have to do ≠ not providing you with a roadmap on what you have to do.

    If they didn’t obfuscate it there would be many tools out there already to let it be done.

    This is a non sequitur.

    It doesn’t automatically follow that a lack of tools means there is obfuscation. The simple fact that there can be many reasons why tools aren’t widely available alone breaks that logic.

    But I’d say the fact that we already know exactly why difficulties arise when replacing parts, definitely proves that there’s no obfuscation.

    Which again circles back to the difference between anti-repair and not pro-repair.

    Just because Apple doesn’t go out of their way to provide a roadmap and hold your hand and as a result you are having difficulties when you’re trying to do it yourself, doesn’t mean they are actively thwarting you.

    Apple doesn’t even think about you and me, their concern is to facilitate their own repair processes.

    They literally serial lock almost half of their parts.

    They don’t.

    Aside from biometrics none of the parts are serial locked.

    What you’re thinking about is parts based factory calibrated data loaded into the parts from a central database.

    Just because the system ignores the calibration data once the part doesn’t match the one the calibration was intended for, doesn’t mean it’s “locked”, it just means that you’re trying to use calibration data for the wrong part.



  • I’m not sure if you’re serious or trying to be sarcastic.

    Bluetooth and WiFi are two different things.

    For starters standard Bluetooth operates on 1MHz wide channels, BLE on 2MHz wide channels, whereas WiFi (nowadays) operates on 20 or 40 MHz wide channels.

    Modern Bluetooth (on 2.4Ghz) can theoretically do bursts of 2Mbps, but in practice even 1Mbps is hard to hit in a sustained fashion.

    2.4Ghz is just a frequency band and is not the same as bandwidth.

    You might as well argue that a pickup truck and a formula 1 race car should be able to reach the same top speed in the same time because their wheel distance is the same.

    I think […]

    Think again



  • lazyvar@programming.devtoMemes@lemmy.mlGoogle DRM when?
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    Oh wow, they really closed it down huh?

    Not too long ago you were able to change it.

    This dumbing things down to prevent customers from fucking themselves over and using up CS resources is getting ridiculous.

    Say you need to change some settings but your modem/router isn’t online then you’re SOOL.

    Cox, who uses the same gateway, is even worse. They won’t even allow you to enable legacy mode (802.11b) for IoT devices that cheaped out on WiFi cards, not even on a separate network and their customer service can’t enable it either.

    I dread moving into a Cox region where there’s no fiber competitor available.



  • There are plenty of instances that are open, but it depends on your definition of “censored” if they are what you seek.

    Completely “uncensored” instances are rare if not non-existent because most instances will at least try to adhere to the laws of their jurisdiction and in addition will have some rules in place to keep things running smoothly and pleasant for everyone.

    Most big instances are run from the EU so they’ll often have rules regarding hate speech.

    Depending on your definition your only options might either be Japanese instances due to less strict laws around certain content or right wing instances, but both will be almost uniformly blocked on other instances.




  • Most of these services are US-centric because a lot of the necessary records to provide the information isn’t public in many countries outside of the US.

    Birth records, death records, marriage records, divorce records, voting records, criminal records, etc. is considered public information in much of the US. Even address information can be found publicly and immigration records become available to the public after a certain time.

    In a lot of countries, especially in many European countries, these are hard to access for people that aren’t the subject of these records, if accessible at all.

    For example while court records are public in much of Europe, often times the names of private persons are censored because it’s not deemed necessary to know who the parties are to be able to check if the courts make fair decisions.
    This automatically excludes criminal and divorce information from disseminating into the public.

    Some countries will make some records public once the subject of those records have passed for X amount of years, but that’s still pretty rare.

    As such services like these have limited use outside the United States.


  • It’s hard to explain without a similar sound existing in English.

    The “eu” part in “neuken” and “keuken” is pronounced like the French word for 2: deux.

    The ”-ken” end of both words is almost exactly pronounced as the word “cunt” without the t.

    “de” is pronounced like “the” but with a “d” sound, like “duh” but not in the exaggerated way you’d do it when you’re mocking someone. And “in” is the same pronunciation as the English one.

    So putting that all together, I’d write it out as follows if I’d like to make it pronounceable for an English speaker: “neuxcun in duh keuxcun”


  • lazyvar@programming.devtoPrivacy@lemmy.mlProtonMail Rewrites Your Emails
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    10
    ·
    1 year ago

    The scandal didn’t lie in following court orders, it lied in the marketing and the fact that the French ToS lacked any nuance to indicate that it would even be a possibility that ip would be logged.

    Furthermore, even when dealt with court orders, other companies that don’t tout privacy to be one of their core values, have chosen to fight such orders in court.
    Proton could’ve at least tried to show that they were putting their money where their mouth is, by challenging the order.