

I don’t really know, sorry :(
If you want to migrate, is going conduit - conduwuit - continuwuity (first version) - continuwuity (current version) maybe an option?


I don’t really know, sorry :(
If you want to migrate, is going conduit - conduwuit - continuwuity (first version) - continuwuity (current version) maybe an option?


I went with continuwuity and am happy with it. Development happens at a steady pace, with sane priorities. The server is stable and I haven’t had any issues to speak of, despite one minor bug that got resolved very quickly after creating an issue.
If you use nixos, you basically have to know/learn/use day-to-day the nix language.
nixpkgs are written using nix the language, using concepts mostly familiar from just using nixos.
Basically everyone using nixos is capable of contributing packages.
Just gonna leave this here


Did they still not release the actual torrents though?


And why would they implement it in a somewhat private manner if it could be implemented in a privacy-infringing manner?
I honestly don’t think most democratic governments have an interest in making this privacy-infringing. Lobbyists/companies on the other hand… But all the more reason to write legislation that ensures age verification must be handled like this.
That already tells the government that I’m accessing porn because why else would I need to confirm I’m an adult online?
Cinema rickets for FSK18 movie? Ordering alcohol? Gambling? Renting a car?
Basically anything you’re only allowed to do as an adult.
But that’s kind of why I mentioned, it’s just one rough draft for such a protocol.


It should be Dot Dot! But it’s Dot Dot Dot! - sanest Bitchard moment


It’s mostly just that I don’t want the government to know precisely which websites I visit. Nor do I want the the porn sites to know exactly who I am.
I understand, I want that too. It’s easily possible though (just one example for a scheme):
Alternatively, if we go the “device has an age bracket field browsers access” route, it’s even simpler, and just as if not more privacy preserving.


In that case: sorry to blow up on you. I have seen to many comments on here claiming these things while being 100% serious. I just saw your comment and incidentally had time to write the above for once, so, here we are.
I agree that there’s no way to completely cut teens off from porn. Your torrent example is perfectly demonstrating this.
But I also do not understand the current outrage at anything trying to improve the situation, even when it’s not some stupid “scan your face” scheme.


I’d also like to think so. In this case though, this was clearly not what was intended, and also involved a lot of porn.


So let me get this straight:
When I was 13, I managed to figure out the router password, disabled child protection for myself, then watched porn on my Android 2.3 phone that I had managed to put a custom ROM on because I liked the way it looked and had no idea what a “launcher” was yet.
This is not a hypothetical btw.
My parents were smart enough to enable appropriate blocking and secured access to those settings. I’m not sure something on-device was available at the time, but I included the bit about the custom rom to demonstrate that, even though I didn’t know WTF I was doing, I was more than capable of fucking around with the tech to get it to do what I wanted.
So were my parents in breach of their duties on child protection?
I don’t think they were. They actually did educate themselves (visiting a course / parent meetup to discuss and learn how to protect me from the Internet), and implemented everything they learned.
I was just a little shit and found a way around this.
And this is NOT an edgecase. Because guess what. It takes one kid in the friend group to figure out a way to circumvent parental controls, and then EVERYONE knows how to do it.
It simply does not fucking matter how well intentioned, knowledgeable, and present the parents are (mine were all of that).
Going “this would not be a problem if parents parented” is the LAZIEST fucking excuse, and I’m sick and tired of reading about it on here.
(Because I probably have to make it clear: I’m not advocating for photo/passport scanning, third party age verification,… and all that bullshit. What I think would be a FANTASTIC idea would be privacy-preserving age verification. There are two good ways to do this: 1) on a login attempt, prove that you are of age by presenting a fresh, signed token from a government service proving that you are over 18, and nothing else; site does not get any info, government does not know what you were trying to access; 2) a device-level age field. Proof here comes from the device itself, and can be 100% privacy preserving; just a “yep, is of age”. In this scenario… GUESS WHAT, PARENTS GET ENABLED TO PARENT “PROPERLY” BY PROVIDING THEM WITH A GOOD, SIMPLE, PRIVACY-PRESERVING TECHNICAL SOLUTION.)


Federated ForgeJo can’t come soon enough.


Manche Lehrer binden die Handys im Unterricht ein. zB für Fotografie oder um Filme zu machen.
Naja gut ist ne Kamera. Das kann ich verstehen.
Klar, jede Schule hat jetzt ein App für den Stundenplan, Vertretungen / Ausfall, Krankmeldungen und aktuelle Nachrichten. Hausaufgaben gibts im Cloud.
Das hingegen nicht. Und ich bin noch nicht soooo lang ais der Schule raus. Geht es denn zumindest noch analog, oder ist das effektiv ein Android/iOS Zwang?


Doof nur, dass ein Mobilgerät für allerlei in der Schule verausgesetzt wird.
Was? 😭


Huh - you’re right. I went back to Signal’s X3DH spec because I was sure I was right, but it seems I misremembered how the “prekey bundles” work: Users publish these to the server, allowing (in my original assumption) for the server to just swap them out for a server/attacker-controlled key bundle for each Alice and Bob.
However, when Alice wants to send Bob an initial message and she gets a forged prekey bundle, Bob will simply not be able to derive the same key and communication will fail, because Bob knows what his SPK private key is, while the server only knows the public key.


A compromised server would allow the server to man-in-the-middle all new connections (as in, if Alice and Bob have never talked to each other before, the Server/Eva can MITM the x3dh key exchange and all subsequent communication). That’s why verifying your contact’s signatures out-of-band is so important.
(And if you did verify signatures in this case, then the issue would immediately be apparent, yes.)
Edit: I was wrong. See below.


Ich glaube ich hatte einfach Glück: bin vor ca. 8 Monaten als Software Engineer gestartet, kurz nach Abschluss vom MA Informatik. 100% remote und ziemlich zufrieden mit der Vergütung.
Glück sage ich aber vor allem deshalb, weil mein jetziger Arbeitgeber das einzige Vorstellungsgespräch war, was ich hatte. Ansonsten nur eine negative Rückmeldung zur Bewerbung, eine Einladung zum Bewerbungsgespräch 4 Monate später (lol) und sonst gar nix.
Das wirkt wie ein Du-Problem, wenn du nur sowas schaust.