BitSound

@BitSound@lemmy.world

This profile is from a federated server and may be incomplete. Browse more on the original instance.

BitSound,

You don’t need a level 2 charger at home. You don’t need gas stations equivalents. EV companies won’t make infrastructure, because we’ve already built tons of infrastructure for EVs and it’s called the electric grid. Everywhere has electricity. I was recently in a very remote area for vacation in my EV, and just plugged my car into a regular outlet to charge it up. To get there, I stopped for lunch and plugged my car in at a supercharger while I ate.

Target is putting in superchargers at lots of their locations around me. Other places are or will follow suit. If you can’t charge at home, you’ll simply stop by the store/mall/whatever, do your normal shopping, and have your car charge in the meantime. Or you’ll charge at work, or any number of other places.

EVs aren’t hard, they just require a mindset shift. People worry about this and that, but it’s because they haven’t actually tried it and have given too much weight to FUD spread about EVs.

BitSound,

Do you have more info or a link? I don’t use hearing aids. Is this using hearing aids with your computer via Bluetooth?

BitSound,

There’s various well-known tracking parameters that can be stripped, like UTM parameters. Stripping all query parameters would break a lot of sites, like anything in the vein of example.com/site.php?id=123

BitSound,

I guess it isn’t bad to let people know about this that don’t already know, but this isn’t really news. ChatGPT and other sites also already warn that inaccurate things might be generated.

BitSound,

After you hit a billion dollars, you should get a party and a nice trophy that says “You Won Capitalism!”, and then you should start from scratch again.

BitSound,

Man what a clusterfuck. Things still don’t really add up based on public info. I’m sure this will be the end of any real attempts at safeguards, but with the board acting the way it did, I don’t know that there would’ve been even without him returning. You know the board fucked up hard when some SV tech bro looks like the good guy.

BitSound,

Just saw this community on the lemmy.world community list and it’s now a new favorite: !iso

BitSound,

It is decentralized. None of the issues you bring up are proof of centralization. If you get banned from one instance or don’t like email verification or whatever your beef is, find an instance with whatever policies you like. If you can’t find such an instance, start your own.

If nobody federates with you because your instance is full of people that got banned from everywhere else, that’s decentralization in action and maybe you should stop to consider if there’s a reason nobody wants to interact with you?

BitSound,

This is tilting at windmills. If someone has physical possession of a piece of hardware, you should assume that it’s been compromised down to the silicon, no matter what clever tricks they’ve tried to stymie hackers with. Also, the analog hole will always exist. Just generate a deepfake and then take a picture of it.

BitSound,

And Tom’s camera gets hacked by an evil maid and then where are you? Exactly. This is snake oil.

BitSound,

That doesn’t really work. If the private key is leaked, you’re left in a quandary of “Well who knew the private key at this timestamp?” and it becomes a guessing game.

Especially in the scenario you posit. Nation-state actors with deep pockets in the middle of a war will find ways to bend hardware to their will. Blindly trusting a record just because it’s timestamped is foolish.

BitSound,

In this case yes, because if it’s not perfect, then it’s perfectly useless

BitSound,

They would, but each camera’s private key can be extracted from the hardware if you’re motivated enough.

If Alice’s fancy new camera has the private key extracted by Eve without Alice’s knowledge, Eve can send Bob pictures that Bob would then believe are from Alice. If Bob finds out that Alice’s key was compromised, then he has to guess as to whether any photo he got from Alice was actually from Eve. Having a public timestamp for the picture doesn’t help Bob know anything, since Eve might’ve gone and created the timestamp herself without Alice’s knowledge.

BitSound,

The evil maid could take a copy of a legitimate image, modify it, publish it, and say that the original image was faked. If there’s a public timestamp of the original image, just say “Oh, hackers published it before I could, but this one is definitely the original”. The map is not the territory, and the blockchain is not what actually happened.

Digital signatures and public signatures via blockchain solve nothing here.

BitSound, (edited )

original image’s timestamp has already been published

“Oh the incorrect information was published, here’s the correct info”. Again, the map is not the territory.

the whole point of this technology is to remove the need for that trust.

And it utterly fails to achieve that here. I’ll put it another way: You have this fancy camera. You get detained by the feds for some reason. While you’re detained, they extract your private keys and publish a doctored image, purportedly from your camera. The image is used as evidence to jail you. The digital signature is valid and the public timestamp is verifiable. You later leave jail and sue to get your camera back. You then publish the original image from your camera that proves you shouldn’t have been jailed. The digital signature is valid and the public timestamp is verifiable. None of that matters, because you’re going to say “trust me, bro”. Introducing public signatures via the blockchain has accomplished absolutely nothing.

You’re trying to apply blockchain inappropriately. The one thing that publishing like this does is prove that someone knew something at that time. You can’t prove that only that person knew something. You can prove that someone had a private key at time X, but you cannot prove that nobody else had it. You can prove that someone had an image with a valid digital signature at time X, but you cannot prove that it is the unaltered original.

BitSound,

Physical access means all bets are off, but it’s not required for these attacks. If it’s got a way to communicate with the outside world, it can get hacked remotely. For example here’s an attack that silently took over iphones without the user doing anything. That was used for real to spy on many people, and Apple is pretty good at security. Most devices you own such as cameras with wifi will likely be far worse security-wise.

BitSound,

The “incorrect information” is provably published before the supposed “correct information” was.

Rephrased, some information was published before some other information. Sure, that’s provable, but what of it? How do you know which is correct and which isn’t? You’re back to trust.

BitSound,

It doesn’t have to be a random person claiming that the first image is fake. You could get your private keys leaked, and then the attacker waits until you’re on vacation in a remote area without wifi/cell, and then they publish an image and say “oh, i got wifi for a bit and published this”. You then get back from vacation, see the fake image and claim that you didn’t have any wifi/cell service the whole time and couldn’t have published an image. Why should people trust you? Switch out vacation for “war zone” if you’d like for a relevant example. Right now many people in Gaza or Ukraine don’t exactly have reliable ways to use the internet, and that’s exactly the sort of situation where you’d want to be able to verify images.

Alternatively as I put in another comment, if it’s got the ability to publish stuff straight from the camera, it’s got the ability to be hacked and publish a fake image, straight from the camera.

Publishing things on the blockchain adds nothing here. The tech isn’t telling anyone anything useful, because the map is not the territory.

These are not implausible scenarios. They wouldn’t happen every day because they’re valuable attack vectors, but they’re 100% possible and would be saved to be used at the right time, like when it really matters, which is the worst possible time to incorrectly trust something.

BitSound,

There’s no goalpost-shifting, the evil maid is still getting your keys. I’m not sure what you’re not getting here.

The point is that the system is useful for exactly nobody, because you still have to trust that someone hasn’t had their private keys compromised via an evil maid attack, and publishing timestamps on a blockchain is irrelevant to the problem.

BitSound,

Neat, I hadn’t heard of this! Looks fun.

BTW, the link to trollbridge.film doesn’t seem to be working

BitSound,

Wheel of Time on Amazon should’ve been animated. It might not have sold as well or whatever the execs wanted but it would’ve been way cheaper to produce something so much better.

BitSound,

Walk to the end and the amulet is gone. Rat King is the true final boss and you have to get it back from him. Defeating him unlocks new playable Rat class

BitSound,

I’m sure Google has their own shitty reasons, but also get bent, shitheads 🖕

BitSound,

I think you’re misunderstanding what role skepticism plays here, but I’m curious. What’s one thing/event/whatever that you think could prove to anyone that the supernatural or however you want to call it exists?

BitSound,

Do some zippers look like they’re bare metal but actually have metallic paint on them? That’s my best guess for the picture they chose

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • tacticalgear
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • Durango
  • cubers
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • ngwrru68w68
  • kavyap
  • GTA5RPClips
  • provamag3
  • ethstaker
  • InstantRegret
  • Leos
  • normalnudes
  • everett
  • khanakhh
  • osvaldo12
  • cisconetworking
  • modclub
  • anitta
  • tester
  • megavids
  • lostlight
  • All magazines