![](https://lemmy.dbzer0.com/pictrs/image/cf061b83-a216-4b7c-8434-8924a3a71f14.png)
![](https://lemmy.ml/pictrs/image/a64z2tlDDD.png)
What is the threat szenario?
If you are smart about parallelization and have access to custom hardware, couldn’t you turn 5 days into 1 hour or less?
Keyoxide: aspe:keyoxide.org:KI5WYVI3WGWSIGMOKOOOGF4JAE (think PGP key but modern and easier to use)
What is the threat szenario?
If you are smart about parallelization and have access to custom hardware, couldn’t you turn 5 days into 1 hour or less?
Firefox+PlasmaWayland+SystemD+portage+GNU+Linux
Default linux works too ofc, I didn’t know they took that route.
Most other browsers have very specific useragents, so the main pool of same useragents will be hardened browsers anyway.
Thank you for checking
edit:
https://github.com/TheTorProject/tor-messenger-build/blob/581ba7d2f5f9c22d9c9182a45c12bcf8c1f57e6e/projects/instantbird/0001-Set-Tor-Messenger-preferences.patch#L354 would indicate it should be Windows, Ill check later.
Try it with high security settings in tor, it might be something like canvas. Did you enable any permissions for the website?
That would be a fail of the fingerprinting protection. A properly set up TOR browser for example should not allow that detection by any means. If you know how to detect it, please report it as a critical vulnerability.
I could think of maybe some edge case behavior in webrenderer or js cavas etc., which would mainly expose info on the specific browser and underlying hardware, but that is all of course blocked of or fixed in hardened browsers.
Further, if you have a reliable method, you could sell it off to for example Netflix, who are trying to block higher resolutions for Linux browsers but are currently foiled by changing the useragent (if you have widevine set up).
That can’t have been the reason, rather the fact it could tell.
Your browser sends information about its version and the os in the useragent string. It is supposed to lie and say it is a very commonly used useragent, specifically for purposes of fingerprinting. That would be windows, default configuration, firefox version something not you firefox version
you can physically wire A into C, it’s the same protocol. This won’t be broken like other adapters because neither device even knows about it
ssds are a really cheap upgrade, and have been for a while. My systems of similsr age have had ssd upgrades for about 5 years now. It’ll likely be limited to sata speeds though.
I built it 6 months ago on a 3700x, took 3h. Where firefox took 20 minutes
The missing number is drive speed, because 4GB ram are not nearly enough, swapping is necessary. But with fast moder drives (were pcie ssds a thing back then?) expect half a day
For reference my modern system sits well below 20 minutes without pgo, and below 40 with.
I would not say that necessarily.
I asked the Gentoo people and they had similar setups with 12h. At 4GB ram it’ll mainly come down to swapping, so disk speed.
If the 5 days were you experience, was it using a slow hdd?
Edit: remember to disable pgo, wherever you see it. It can double your compile times
It appears they just did, as of a few minutes ago while I was looking into it
Here is the now open private components repo under the CC BY-NC-SA 4.0 license
And I forked it just to be sure
On lineageOS 20 it records the exact android build string as the Software for me, so “Android lineage_pdx215-userdebug 13 TQ3A.230901.001 b30079afa2”. Which is probably enough to uniquely identify me, and you if you have a less common phone or are on an older or uncommon version.
Needless to say I am pissed.
Even with OCR, couldn’t your copy at least in theory be laced with strategically placed minor word changes? Say throughout the book you pick 30 spots to change a word without changing the meaning of the text, or you introduce a typo. If every copy gets a different set of those that would be a unique identifier.
I think I have heard that being done with imperceptable changes in films sent for showings in theaters.
It’s a user input device, that in an electric circuit can allow power to either pass through it or not.
Yeah. It uses google ad-mob, or if you purchase it needs the google play store app to verify that and deactivate ad-mob.
A way to purchase it without going through gplay would fix this, and probably means it could be published on fdroid in a premium-only version at least. I’ve been meaning to ask @rmayayo@lemmy.world about the feasibility of that for a while now. It’s bothered me for years now, but I simply couldn’t find an alternative so far (neither back on reddit in the days).
With federation it’s kinda like complaining archive.org doesn’t have a good way to purge page snapshots in case you post something on your website you regret later. Or search engine caches. Or the local scammers replicating your page with curl for a phishing scam.
The default on android is to give every wifi network its own random but static mac.