senooken JP Social
  • FAQ
  • Login
senooken JP Socialはsenookenの専用分散SNSです。
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Notices by Stanislas :nixos: (angristan@mstdn.io), page 22

  1. Stanislas :nixos: (angristan@mstdn.io)'s status on Tuesday, 25-Sep-2018 02:52:33 JST Stanislas :nixos: Stanislas :nixos:
    • Xerz ?

    @espectalll like what? :thinking_dump:

    In conversation Tuesday, 25-Sep-2018 02:52:33 JST from mstdn.io permalink
  2. Stanislas :nixos: (angristan@mstdn.io)'s status on Tuesday, 25-Sep-2018 02:40:31 JST Stanislas :nixos: Stanislas :nixos:

    oh

    In conversation Tuesday, 25-Sep-2018 02:40:31 JST from mstdn.io permalink

    Attachments


    1. https://media.mstdn.io/mstdn-media/media_attachments/files/003/060/781/original/8514216cd7b5f376.png
  3. Stanislas :nixos: (angristan@mstdn.io)'s status on Tuesday, 25-Sep-2018 02:23:46 JST Stanislas :nixos: Stanislas :nixos:
    • butterflyoffire⋅[·_·]/

    @BoF :blobthumbsup:

    In conversation Tuesday, 25-Sep-2018 02:23:46 JST from mstdn.io permalink
  4. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 23:15:22 JST Stanislas :nixos: Stanislas :nixos:

    The Node.js Ecosystem Is Chaotic and Insecure https://medium.com/commitlog/the-internet-is-at-the-mercy-of-a-handful-of-people-73fac4bc5068

    In conversation Monday, 24-Sep-2018 23:15:22 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn-images-1.medium.com
      The Node.js Ecosystem Is Chaotic and Insecure – Commit Log – Medium
      from Medium
      It seems like only yesterday we had the “left-pad” fiasco where Azer Koçulu ended up pulling his packages after a name dispute.
  5. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 22:35:03 JST Stanislas :nixos: Stanislas :nixos:

    Rejected http://www.eod.com/blog/2018/09/rejected/

    In conversation Monday, 24-Sep-2018 22:35:03 JST from mstdn.io permalink

    Attachments


  6. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 22:20:04 JST Stanislas :nixos: Stanislas :nixos:

    If you don't hire juniors, you don't deserve seniors https://dev.to/isaacandsuch/if-you-dont-hire-juniors-you-dont-deserve-seniors-48kb

    In conversation Monday, 24-Sep-2018 22:20:04 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: res.cloudinary.com
      If you don't hire juniors, you don't deserve seniors
      from The Practical Dev
      On poor hiring strategies in tech
  7. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 22:05:03 JST Stanislas :nixos: Stanislas :nixos:

    A quick look at the git object store https://dev.to/imjacobclark/a-quick-look-at-the-git-object-store-290j

    In conversation Monday, 24-Sep-2018 22:05:03 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: res.cloudinary.com
      A quick look at the git object store
      from The Practical Dev
      Let's talk about some of the internals of git and how it stores and tracks objects within the `.git` directory.
  8. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 20:45:03 JST Stanislas :nixos: Stanislas :nixos:

    Uncovering Foreign Trolls (Trying) To Influence French Elections on Twitter https://blog.0day.rocks/uncovering-foreign-trolls-trying-to-influence-french-elections-on-twitter-a78a8c12953?source=rss----6beb88197afc---4&gi=c3ecf80e6267

    In conversation Monday, 24-Sep-2018 20:45:03 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn-images-1.medium.com
      Uncovering Foreign Trolls (Trying) To Influence French Elections on Twitter
      from Just another infosec blog type of thing
      An inside look at a cyber psychological operation against France
  9. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 20:25:04 JST Stanislas :nixos: Stanislas :nixos:

    Pourquoi OVH devient OVHcloud https://www.ovh.com/fr/blog/pourquoi-ovh-devient-ovhcloud/

    In conversation Monday, 24-Sep-2018 20:25:04 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blog.ovh.com
      Pourquoi OVH devient OVHcloud ? - OVH Blog
      from OVH Blog
      Octave Klaba, fondateur, CEO et Chairman d'OVH annonce la nouvelle marque OVHcloud et explique pourquoi ce changement est nécessaire. Il donne également des explications sur la segmentation en trois sous-marques : OVHmarket, OVHspirit et OVHentreprise.
  10. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 20:02:37 JST Stanislas :nixos: Stanislas :nixos:

    2 heures de transport pour 3 heures de cours ?

    In conversation Monday, 24-Sep-2018 20:02:37 JST from mstdn.io permalink
  11. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 19:55:17 JST Stanislas :nixos: Stanislas :nixos:

    Where are the passwords of the users located in Linux? https://www.cyberciti.biz/faq/where-are-the-passwords-of-the-users-located-in-linux/

    In conversation Monday, 24-Sep-2018 19:55:17 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.cyberciti.biz
      Where are the passwords of the users located in Linux? - nixCraft
      from nixCraft
      Where are the passwords of the users located in Linux? Learn how to find and read info from /etc/passwd or /etc/shadow files and use the getent command.
  12. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 18:27:13 JST Stanislas :nixos: Stanislas :nixos:
    • Stéphane Bortzmeyer
    • Feth ⚛????

    @marsxyz @ffeth @bortzmeyer c'est que un fix partiel tu me dira

    In conversation Monday, 24-Sep-2018 18:27:13 JST from mstdn.io permalink
  13. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 18:08:18 JST Stanislas :nixos: Stanislas :nixos:
    • Stéphane Bortzmeyer
    • Feth ⚛????

    @marsxyz @bortzmeyer @ffeth https://github.com/tootsuite/mastodon/pull/8445

    In conversation Monday, 24-Sep-2018 18:08:18 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: avatars1.githubusercontent.com
      Spread out crawling randomly to avoid DDoSing the link by Gargron · Pull Request #8445 · tootsuite/mastodon
      from GitHub
      Fix #4486
  14. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 09:50:58 JST Stanislas :nixos: Stanislas :nixos:

    :night:

    In conversation Monday, 24-Sep-2018 09:50:58 JST from mstdn.io permalink
  15. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 06:35:02 JST Stanislas :nixos: Stanislas :nixos:

    Why I’m done with Chrome https://blog.cryptographyengineering.com/2018/09/23/why-im-leaving-chrome/

    In conversation Monday, 24-Sep-2018 06:35:02 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: matthewdgreen.files.wordpress.com
      Why I’m done with Chrome
      By Matthew Green from A Few Thoughts on Cryptographic Engineering

      This blog is mainly reserved for cryptography, and I try to avoid filling it with random “someone is wrong on the Internet” posts. After all, that’s what Twitter is for! But from time to time something bothers me enough that I have to make an exception. Today I wanted to write specifically about Google Chrome, how much I’ve loved it in the past, and why — due to Chrome’s new user-unfriendly forced login policy — I won’t be using it going forward.

      A brief history of Chrome

      When Google launched Chrome ten years ago, it seemed like one of those rare cases where everyone wins. In 2008, the browser market was dominated by Microsoft, a company with an ugly history of using browser dominance to crush their competitors. Worse, Microsoft was making noises about getting into the search business. This posed an existential threat to Google’s internet properties.

      In this setting, Chrome was a beautiful solution. Even if the browser never produced a scrap of revenue for Google, it served its purpose just by keeping the Internet open to Google’s other products. As a benefit, the Internet community would receive a terrific open source browser with the best development team money could buy. This might be kind of sad for Mozilla (who have paid a high price due to Chrome) but overall it would be a good thing for Internet standards.

      For many years this is exactly how things played out. Sure, Google offered an optional “sign in” feature for Chrome, which presumably vacuumed up your browsing data and shipped it off to Google, but that was an option. An option you could easily ignore. If you didn’t take advantage of this option, Google’s privacy policy was clear: your data would stay on your computer where it belonged.

      What changed?

      A few weeks ago Google shipped an update to Chrome that fundamentally changes the sign-in experience. From now on, every time you log into a Google property (for example, Gmail), Chrome will automatically sign the browser into your Google account for you. It’ll do this without asking, or even explicitly notifying you. (However, and this is important: Google developers claim this will not actually start synchronizing your data to Google — yet. See further below.)

      Your sole warning — in the event that you’re looking for it — is that your Google profile picture will appear in the upper-right hand corner of the browser window. I noticed mine the other day:

      The change hasn’t gone entirely unnoticed: it received some vigorous discussion on sites like Hacker News. But the mainstream tech press seems to have ignored it completely. This is unfortunate — and I hope it changes — because this update has huge implications for Google and the future of Chrome.

      In the rest of this post, I’m going to talk about why this matters. From my perspective, this comes down to basically four points:

      1. Nobody on the Chrome development team can provide a clear rationale for why this change was necessary, and the explanations they’ve given don’t make any sense.
      2. This change has enormous implications for user privacy and trust, and Google seems unable to grapple with this.
      3. The change makes a hash out of Google’s own privacy policies for Chrome.
      4. Google needs to stop treating customer trust like it’s a renewable resource, because they’re screwing up badly.

      I warn you that this will get a bit ranty. Please read on anyway.

      Google’s stated rationale makes no sense

      The new feature that triggers this auto-login behavior is called “Identity consistency between browser and cookie jar” (HN). After conversations with two separate Chrome developers on Twitter (who will remain nameless — mostly because I don’t want them to hate me), I was given the following rationale for the change:

      To paraphrase this explanation: if you’re in a situation where you’ve already signed into Chrome and your friend shares your computer, then you can wind up accidentally having your friend’s Google cookies get uploaded into your account. This seems bad, and sure, we want to avoid that.

      But note something critical about this scenario. In order for this problem to apply to you, you already have to be signed into Chrome. There is absolutely nothing in this problem description that seems to affect users who chose not to sign into the browser in the first place.

      So if signed-in users are your problem, why would you make a change that forces unsigned–in users to become signed-in? I could waste a lot more ink wondering about the mismatch between the stated “problem” and the “fix”, but I won’t bother: because nobody on the public-facing side of the Chrome team has been able to offer an explanation that squares this circle.

      And this matters, because “sync” or not…

      The change has serious implications for privacy and trust

      The Chrome team has offered a single defense of the change. They point out that just because your browser is “signed in” does not mean it’s uploading your data to Google’s servers. Specifically:

      While Chrome will now log into your Google account without your consent (following a Gmail login), Chrome will not activate the “sync” feature that sends your data to Google. That requires an additional consent step. So in theory your data should remain local.

      This is my paraphrase. But I think it’s fair to characterize the general stance of the Chrome developers I spoke with as: without this “sync” feature, there’s nothing wrong with the change they’ve made, and everything is just fine.

      This is nuts, for several reasons.

      User consent matters. For ten years I’ve been asked a single question by the Chrome browser: “Do you want to log in with your Google account?” And for ten years I’ve said no thanks. Chrome still asks me that question — it’s just that now it doesn’t honor my decision.

      The Chrome developers want me to believe that this is fine, since (phew!) I’m still protected by one additional consent guardrail. The problem here is obvious:

      If you didn’t respect my lack of consent on the biggest user-facing privacy option in Chrome (and  didn’t even notify me that you had stopped respecting it!) why should I trust any other consent option you give me? What stops you from changing your mind on that option in a few months, when we’ve all stopped paying attention?

      The fact of the matter is that I’d never even heard of Chrome’s “sync” option — for the simple reason that up until September 2018, I had never logged into Chrome. Now I’m forced to learn these new terms, and hope that the Chrome team keeps promises to keep all of my data local as the barriers between “signed in” and “not signed in” are gradually eroded away.

      The Chrome sync UI is a dark pattern. Now that I’m forced to log into Chrome, I’m faced with a brand new menu I’ve never seen before. It looks like this:

       

      Does that big blue button indicate that I’m already synchronizing my data to Google? That’s scary! Wait, maybe it’s an invitation to synchronize! If so, what happens to my data if I click it by accident? (I won’t give it the answer away, you should go find out. Just make sure you don’t accidentally upload all your data in the process. It can happen quickly.)

      In short, Google has transformed the question of consenting to data upload from something affirmative that I actually had to put effort into — entering my Google credentials and signing into Chrome — into something I can now do with a single accidental click. This is a dark pattern. Whether intentional or not, it has the effect of making it easy for people to activate sync without knowing it, or to think they’re already syncing and thus there’s no additional cost to increasing Google’s access to their data.

      Don’t take my word for it. It even gives (former) Google people the creeps.

      Big brother doesn’t need to actually watch you. We tell things to our web browsers that we wouldn’t tell our best friends. We do this with some vague understanding that yes, the Internet spies on us. But we also believe that this spying is weak and probabilistic. It’s not like someone’s standing over our shoulder checking our driver’s license with each click.

      What happens if you take that belief away? There are numerous studies indicating that even the perception of surveillance can significantly greatly magnify the degree of self-censorship users force on themselves. Will user feel comfortable browsing for information on sensitive mental health conditions — if their real name and picture are always loaded into the corner of their browser? The Chrome development team says “yes”. I think they’re wrong.

      For all we know, the new approach has privacy implications even if sync is off. The Chrome developers claim that with “sync” off, a Chrome has no privacy implications. This might be true. But when pressed on the actual details, nobody seems quite sure.

      For example, if I have my browser logged out, then I log in and turn on “sync”, does all my past (logged-out) data get pushed to Google? What happens if I’m forced to be logged in, and then subsequently turn on “sync”? Nobody can quite tell me if the data uploaded in these conditions is the same. These differences could really matter.

      The changes make hash of the Chrome privacy policy

      The Chrome privacy policy is a remarkably simple document. Unlike most privacy policies, it was clearly written as a promise to Chrome’s users — rather than as the usual lawyer CYA. Functionally, it describes two browsing modes: “Basic browser mode” and “signed-in mode”. These modes have very different properties. Read for yourself:

      In “basic browser mode”, your data is stored locally. In “signed-in” mode, your data gets shipped to Google’s servers. This is easy to understand. If you want privacy, don’t sign in. But what happens if your browser decides to switch you from one mode to the other, all on its own?

      Technically, the privacy policy is still accurate. If you’re in basic browsing mode, your data is still stored locally. The problem is that you no longer get to decide which mode you’re in. This makes a mockery out of whatever intentions the original drafters had. Maybe Google will update the document to reflect the new “sync” distinction that the Chrome developers have shared with me. We’ll see.

      Update: After I tweeted about my concerns, I received a DM on Sunday from two different Chrome developers, each telling me the good news: Google is updating their privacy policy to reflect the new operation of Chrome. I think that’s, um, good news. But I also can’t help but note that updating a privacy policy on a weekend is an awful lot of trouble to go to for a change that… apparently doesn’t even solve a problem for signed-out users.

      Trust is not a renewable resource

      For a company that sustains itself by collecting massive amounts of user data, Google has  managed to avoid the negative privacy connotations we associate with, say, Facebook. This isn’t because Google collects less data, it’s just that Google has consistently been more circumspect and responsible with it.

      Where Facebook will routinely change privacy settings and apologize later, Google has upheld clear privacy policies that it doesn’t routinely change. Sure, when it collects, it collects gobs of data, but in the cases where Google explicitly makes user security and privacy promises — it tends to keep them. This seems to be changing.

      Google’s reputation is hard-earned, and it can be easily lost. Changes like this burn a lot of trust with users. If the change is solving an absolutely critical problem for users , then maybe a loss of trust is worth it. I wish Google could convince me that was the case.

      Conclusion

      This post has gone on more than long enough, but before I finish I want to address two common counterarguments I’ve heard from people I generally respect in this area.

      One argument is that Google already spies on you via cookies and its pervasive advertising network and partnerships, so what’s the big deal if they force your browser into a logged-in state? One individual I respect described the Chrome change as “making you wear two name tags instead of one”. I think this objection is silly both on moral grounds — just because you’re violating my privacy doesn’t make it ok to add a massive new violation — but also because it’s objectively silly. Google has spent millions of dollars adding additional tracking features to both Chrome and Android. They aren’t doing this for fun; they’re doing this because it clearly produces data they want.

      The other counterargument (if you want to call it that) goes like this: I’m a n00b for using Google products at all, and of course they were always going to do this. The extreme version holds that I ought to be using lynx+Tor and DJB’s custom search engine, and if I’m not I pretty much deserve what’s coming to me.

      I reject this argument. I think It’s entirely possible for a company like Google to make good, usable open source software that doesn’t massively violate user privacy. For ten years I believe Google Chrome did just this.

      Why they’ve decided to change, I don’t know. It makes me sad.

       

       

  16. switching.social (switchingsocial@mastodon.at)'s status on Monday, 24-Sep-2018 05:37:41 JST switching.social switching.social
    • Friendica News

    Friendica, the federated open source alternative to Facebook, has just released its 2018.09 update:

    https://friendi.ca/2018/09/23/friendica-2018-09-released/

    The 2018.12 update (due by the end of the year) will apparently include #ActivityPub support :blobcheer: :blobaww: :blobgrin:

    You can try Friendica out right now on instances such as https://squeet.me, https://libranet.de, https://nerdica.net and others:
    https://dir.friendica.social/servers

    You can also follow the Friendica blog at @news

    #DeleteFacebook

    In conversation Monday, 24-Sep-2018 05:37:41 JST from mastodon.at permalink Repeated by angristan

    Attachments





  17. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 06:20:03 JST Stanislas :nixos: Stanislas :nixos:

    En Égypte, les internautes qui ont plus de 5 000 abonnés Twitter ou Facebook seront surveillés https://www.numerama.com/politique/395999-en-egypte-les-internautes-qui-ont-plus-de-5-000-abonnes-twitter-ou-facebook-seront-surveilles.html

    In conversation Monday, 24-Sep-2018 06:20:03 JST from mstdn.io permalink

    Attachments

    1. En Égypte, les internautes qui ont plus de 5 000 abonnés Twitter ou Facebook seront surveillés
      By Marie Turcan from Numerama
      À lire sur Numerama : En Égypte, les internautes qui ont plus de 5 000 abonnés Twitter ou Facebook seront surveillés
  18. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 06:10:03 JST Stanislas :nixos: Stanislas :nixos:

    IPv6 in China https://blog.cloudflare.com/ipv6-in-china/

    In conversation Monday, 24-Sep-2018 06:10:03 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blog.cloudflare.com
      IPv6 in China
      from The Cloudflare Blog
      At the end of 2017, Xinhua reported that there will be 200 Million IPv6 users inside Mainland China by the end of this year.. Halfway into the year, we’re seeing a rapid growth in IPv6 users and traffic originating from Mainland China.
  19. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 06:00:03 JST Stanislas :nixos: Stanislas :nixos:

    La méthode d'OVH pour démanteler les réseaux d'objets connectés zombies https://www.nextinpact.com/news/106860-la-methode-dovh-pour-demanteler-reseaux-dobjets-connectes-zombies.htm

    In conversation Monday, 24-Sep-2018 06:00:03 JST from mstdn.io permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn2.nextinpact.com
      La méthode d'OVH pour démanteler les réseaux d'objets connectés zombies
      Le premier hébergeur européen est une cible de choix pour les attaques par déni de service, de plus en plus menées via des objets connectés. OVH a don...
  20. Stanislas :nixos: (angristan@mstdn.io)'s status on Monday, 24-Sep-2018 05:41:08 JST Stanislas :nixos: Stanislas :nixos:
    in reply to
    • Xerz ?

    @espectalll it's :blongocat: now

    In conversation Monday, 24-Sep-2018 05:41:08 JST from mstdn.io permalink
  • After
  • Before

User actions

    Stanislas :nixos:

    Stanislas :nixos:

    <p>French computer science student in South Korea. Admin of mstdn.io</p>

    Tags
    • (None)
    WebSub

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          574
          Member since
          4 Jun 2018
          Notices
          1765
          Daily average
          1

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          senooken JP Social is a social network, courtesy of senooken. It runs on GNU social, version 2.0.2-beta0, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All senooken JP Social content and data are available under the Creative Commons Attribution 3.0 license.