Hacker Newsnew | past | comments | ask | show | jobs | submit | GoldenGateBRDG's commentslogin


https://metrics.torproject.org/rs.html#search/version:0.3.5%...

~40 Gbit/s of bandwidth for the network might get lost


and the feature is opt-in only: https://support.signal.org/hc/en-us/articles/360057625692-In...

buying MobileCoin on FTX is most convenient right now IMHO: https://ftx.com/profile#a=MobileCoin2022


Yes, just directly buying is easier than their description:

https://mobilecoin.com/news/how-to-buy-mob-in-the-us




They partnered with https://en.wikipedia.org/wiki/Rohde_%26_Schwarz - so basically GnuPG is now funded by military auxiliaries…


Rohde&Schwarz is better known for their test equipment. Think oscilloscopes, spectrum analyzers and signal generators. They also sell massive amounts of production line testers for cellphones.

They are one of the big 3 in this field along with Anritsu and Keysight.


It's not funded by Rohde&Schwarz. Probably they partnered because both products are used by German governmental agencies and have to work together.


I am strongly anti-militaristic, but i'm glad if such horror has to exist some funds end up in FLOSS projects that directly benefit the general public (not some random FLOSS project that only makes sense for the military) instead of always the same proprietary software vendors who are quite comfy with the whole military industrial complex (like Thales).


Uh, they do sell military radios but it's far from their only product range..


Vote with your wallet.


If the military wants something, and you want the same thing, is that a problem?


The concern many have with military involvement in encryption and other security standards is that while they want for themselves exactly what we want for ourselves, they have an internal conflict of interests due to the fact that they want a bit of the exact opposite for other actors¹ which, if those concerns win out and they have the influence to force through or block changes, this could lead security issues² that potentially affect you or I.

[1] They don't want the enemy (whoever that happens to be at the time) to be able to keep secrets as securely as they want to keep their own secrets.

[2] An accidental backdoor or side-channel vulnerability not fixed nor mitigations made known publicly, because it is useful once discovered and they have mitigations to protect their use, for instance.


That's why it's a good thing it's a FLOSS solution. Despite a track record of bad code and security, GPG has always been good-willed, and has progressed over the years. For sure having more eyes/resources on the code can only help. Also the recent Sequoia PGP project can prove to be an inspiration for further improvements.


Agreed, I was mainly responding to what seemed to be a more open “why could it be a problem that a military organisation is involved?” question.

And as other recent issues highlight, open to many eyeballs does not necessarily imply completely robust and secure code.


It is very easy if you have a computer, which is up 24/7 and has a static IPv4 which has reachable ports from the internet:

Instructions are available here: https://community.torproject.org/relay/setup/bridge/

In case of questions there are mailing-lists, IRC or the https://forum.torproject.net/



Is there a name for this in English?


Looks like it's Pearson's Square or the Box Method:

https://chemistry.stackexchange.com/questions/111440/is-ther...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: