

FWIW changing ROT is https://en.wikipedia.org/wiki/Vigenère_cipher as @drspod@lemmy.ml pointed out, I already learned something!
FWIW changing ROT is https://en.wikipedia.org/wiki/Vigenère_cipher as @drspod@lemmy.ml pointed out, I already learned something!
… and you’re blocked, no need for this kind of toxicity here.
Actually no I use it for CRYSTALS-Kyber /s
Yes, just joking it’s not even meant for a “replacement” but rather how to give a pragmatic affordable (the 1st one I made was literally just 2 paper strips and scotch tape) fun way to explore ROT… but IMHO it can be just a starting point. You can do that and sequence them, e.g. ROT-X where X is the date so e.g. today is 06 12 2025 so you would ROT0 the first letter, ROT6 the second, etc.
It is only meant to be fun, please don’t use this in actual serious situations.
like this
as long as there is mapping then it’s OK, it can be added as yet another filter
I use ffmpeg to record only the top left corner of my screen but I don’t have any visual for it.
I used https://github.com/ftorkler/x11-overlay/ in the past for another tool, maybe this could help you.
Could also be a short URL instead, e.g. https://lemmy.ml/post/31547467 or ideally something with keywords rather than UUID, even though here 8 digits isn’t too bad.
That’s the kind of things I expect somebody to be into deciphering to have already a ~/Prototypes/deciphers/ directory with a bunch of scripts with the basics and maybe a testing script that iterates through them sorted by probability (maybe based on popularity) and checks output against keywords, e.g. stop words of increasing length then dictionaries.
TL;DR: I bet that person had automated that process.
Neat, you inspired me to post my cryptography bracelets https://lemmy.ml/post/31555517
FWIW and even though that’s not what you implied Android is far from perfect either, just reading https://www.zeropartydata.es/p/localhost-tracking-explained-it-could right now and… even though Google does try, other, arguably not malware (very arguable!) do manage to go through anyway.
My hope is actually that standard compliant (that’s the important bit) hardware keys and passkey, e.g. WebAuthn, get more broadly accepted. This way open source and hope hardware solutions, e.g NitroKey, would allow anybody on any OS supporting those standards (which does include Linux without proprietary blobs AFAICT) to work.
I would consider that VERY sophisticated. One needs to basically conduct identity fraud, so have enough information to port your SIM via your phone company. I imagine that if you do not call your phone company with your existing number they have a few extra steps to allow anything to happen.
Anyway, beyond that, which as you shared (thanks for taking the time to put those links) is indeed not infeasible (but still requires targeted work and skills) this is only 1 step out of 2 for authentication against a bank. One still needs to know the bank and the login/password pair the Website requires.
Even once that’s done, I believe most banks do not allow large transfers, e.g. above 10K EUR, without another verification. Typically transfers have a daily and weekly limit that can be modified temporarily.
So… IMHO it’s sophisticated (in the sense that a “script kiddie” or scammer without technical skills can’t do it) and has limited economical value.
I will remember it (again, thanks for pointing it out) but I won’t lose sleep over it.
PS: I’m wondering what’s the consumer law on this actually because arguably some steps, e.g. no limit transfer or SIM porting would be on failure on the side of companies, not consumer. I wouldn’t be shocked if companies had insurance for that and might have to pay back whatever amount would be stolen. Obviously this would be regulation dependent.
solar helps that number even more
Wouldn’t that assume you are not using all the electricity coming from your panels?
Private? I’m pretty sure any of the existing means are private in the sense that I, a random stranger, will not know about that transaction.
Do you mean anonymous? Pseudonymous? Hidden from your government or the government where MullVad is established?
I’m not trying to be pedantic here but rather to genuinely understand so that I can try to answer.
Edit for TL;DR as this became lengthy : agreed, do NOT buy “an expensive Facebook paperweight” but also, open source VR exists today! Depending on your definition and needs, there is a lot that can be done and you can help.
Rooting isn’t open source…
Anyway Valve Index runs perfectly on Linux, that’s how I finished Half-life: Alyx. I also do already have a rooted Lynx XR1 and a Project NorthStar which is open hardware (even though not OSHW iirc).
There are also :
IMHO one of the best resource covering that and more is https://lvra.gitlab.io/
So… I’m a bit confused, maybe I misunderstood, what did you mean by being “a decade too early”? Which functionality specifically is missing today?
A device in my hands is my device.
Could you then please help root the Meta Quest 3? So far I believe nobody managed.
Linux applications can access your entire home folder
That’s the default because that’s what most people want, or at least expect.
You can perfectly start an application within a container or even a dedicated user.
Nearly nobody does this not because Linux does not permit that, it does, but rather because most people believe (rightfully or not) they do not need this level of separation.
use SMS but that can be hijacked by social engineering attacks
Can you please share an example? I’d be curious how that would work, especially if it works while understanding how it works.
Doubt I can do a PR to https://github.com/open-quantum-safe/ with that yet… but that does beg the question, what other schemes could be represented tangibly without complex mechanisms?