ajklsdhfniuwehf's comments

ajklsdhfniuwehf | 4 years ago | on: Show HN: NFC Passport/ID for remote user registration

The video call is exactly to prove you are not lying. How having an ID card proves you are that person? if nothing it proves you managed to use it before any report of theft reached the central database

edit: i mean, you claim "Success signal Binary — Yes or No" but there's face verification involved. how is that not a threshold signal in the end where the system can still be fooled/passed the verification decision back to the client? ...seems like a more expensive step before the video call in the end :)

ajklsdhfniuwehf | 4 years ago | on: Affinity 1.10

everyone ditched gnome as soon as their design head started to mandate "copy apple on everything, even the dumb things"

i wasn't even too sad with them shipping features missing 90% of the old functionality while they got the code right, but doing that just to copy apple frivolous design choices was just too much.

ajklsdhfniuwehf | 4 years ago | on: The Real Story of Pixar

Studied 3d graphics with the team at sao paulo.

The film was completed much earlier. But distribution company held it for reasons nobody know. /insert business conspiracy theory.

It was very amateur. 3ds-max-4-like program on dos, called topaz (never saw it after that). and render "farms" were just using the animators (486?) computers at night.

ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft

the gpl install argument is a scary tatic that laywers tell their clients something like "if you use linux on your proprietary CD/CI build system that uses a GPLed zlib, now all your source code will have to be open"

it's utter nonsense and pure FUD.

the article everyone is talking about is about valid cases where the build is used a extra step to try to work around the GPL (akin to saying "the developer used gloves to make the code changes to the GPL'd code so it doesn't count as change", it's stupid). but as the author argee, even pointing that stupidity out is bad because it is used as fuel for the actual FUD where people using GPL correctly are mislead about what they must share

ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft

> What is the evidence that they did anything like that?

LOL. you are joking right? Apple uses the textbook from microsoft the second they can. When they stuck gold on IOS the first thing they did was draw up a monopoly on music and ibooks licensing scheme. And those are just the ones they were found guild on courts with public records. The last one, also on courts public records, is about how they prevent their messaging applications to work on non-apple because it would "allow families to buy android devices to their children"

Oh, you trolls. I keep falling for your low efforts...

ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft

> is to ensure that end users have freedom to use the devices they have purchased as they see fit

not really. Nobody can or wish to dictate how someone sells a product.

GPL is about GPL'ed code. not products.

> Suppose a company has patented some algorithm ... that also uses GPLv3 code

you keep moving the goal post. Remove GPL from your example! If that "some algorithm" was built on top of someone else's proprietary (and patented) work, wouldn't they have to satisfy that entity desires on how it wishes to license their work?

The ONLY difference is that GPL only requires that you make your work available under GPL. Easy. Other entities might ask for money. Others, such as apple, would just tell you to F off and you'd never be able to sell the code or the product. Which one is more restrictive or worse?

compare apples to apples please.

ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft

There is only GPL :)

GPLv3 only goal is exclusively to twart bad actors from using needlessly complex things with the sole goal of avoiding GPLv2 (and 3 since they are practicaly the same) goals, which is to provide source for code that was originally GPL'ed.

In Tivo specific case, that needlesly complex thing was a rubegoldberg build/install process. Also TIVO did not find a loophole. They provided the code as their shenanigans was exposed as such in the end.

Note that you are commenting under an article which main point was exactly to dismiss the misunderstanding in pop culture about the TIVO case! and here you are repeating it. sigh.

ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft

You are missing the point. or the forrest for the trees as some say.

Yeah the installation requirement is silly. But android in general is plagued by GPL violations in that every single piece of it is linux based (or other GPL code based), and yet no user will ever get the source no matter how much they ask.

ajklsdhfniuwehf | 4 years ago | on: Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux [pdf]

for this to be true, the password to key transformation have to be extremely broken for you to be able to infer what is a valid key from what looks like fixed size random noise.

well, this might be true if you use some NIST or RSA certified process :) but who cares about that other than bureaucrats who run entire cities with one set of master keys anyway.

> This is rate-limited by hardware

See this is the kinda of thing those bureaucrats would say. If your hdd is out of your device and i am brute forcing the key, who cares about the password to key transformation? that is already behind me.

ajklsdhfniuwehf | 4 years ago | on: Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux [pdf]

> even though they have been put in PCs for 15 years now.

i have never seen a consumer motherboard with a TPM device in the last 15 years. In fact, the last batch of enthusiast AM4 ones ("pro" model), the TPM doesn't even have the Header populated, only the holes for one that you can solder a header.

And non-workstation office machines from hp and dell ship weird ones that probably won't even pass the win11 test.

ajklsdhfniuwehf | 4 years ago | on: Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux [pdf]

> 2. I can use a simpler/more memorable password because entry attempts have to go through the TPM, rather than being able to be bruteforced with a GPU cluster.

this is already the case with every single open source encryption model out there. You have a simple password which then encodes the true key.

Nothing will save you from GPU cluster brute forcing it, if the adversary have your harddrive.

ajklsdhfniuwehf | 4 years ago | on: Starlink review, four months in

> They had 1000 or so satellites when I first started testing, and there are now something like 1600 or so. Most of the time, I don't even notice when it switches satellites.

Enjoy the early adopter moment. Even if they keep increasing the numbers, they will probably move those new satellites in a much wider net to cover more subscribers the second they must show a profit.

page 1