Show more

No matter what OS or hardware you use, or how easy it is to use, you are going to need help with it at some point. This support is critical to the success of free software. Here is why it’s so important that we at Purism offer full support for free software on our hardware–it’s critical to free software succeeding and it’s been a critical part of how we approach our mission. Kudos to our support teams🙌 🎉
puri.sm/posts/free-software-su

@Wildbill No particular reason, I was just curious after remembering the story.

Hey @Wildbill I was just telling someone the story of you winning that SUSE-branded Thinkpad X series at Linux World Expo and announcing you were going to install Ubuntu on it. Do you still have that laptop?

@BernieWonIowa@mastodon.social What's interesting is that you start to develop a rhythm during the weaving process and it becomes somewhat automatic. While you do still focus on what you are doing, it's not the same kind of mentally-taxing focus that I need for parts of my day job. I actually listen to podcasts sometimes while I do it.

I don't find myself mentally exhausted after weaving, but actually the contrary, it lets my mind relax and wander, which is one of the reasons I like it.

I have finished the third volume of Durant's Story of Civilization. This volume covers the history of the Roman Empire and Christianity up to the fourth century. Eight more volumes to go, but first a break to read some other books on my list. ⁨⁩ ⁨

I worked on this more over the weekend, but as it's a repeating pattern, it will look basically like the last picture up to the point I take it off the loom.

Show thread

Tune in to our new episode 111! @katherined and @dsearls talk to @kyle and Holmes Wilson about #Quiet, a #Tor-based peer-to-peer #messaging project.
Visit the following link for full episode - reality2cast.com/111

#Security #Privacy #Technology #Podcast #newEpisode

@ajmartinez@fosstodon.org I often get asked "Should I use a VPN?" and my answer is some form of "Do you need to connect two trusted networks over an untrusted network? It's great for that."

When I find out they want privacy instead, the threat modeling discussion that follows tends to lead into re-implementing Tor poorly over three nested VPN services and it becomes clear that what they really want is Tor, not a VPN.

@yaelwrites Thank you for sharing your story and I'm glad to hear that you are starting to feel a bit better (swollen feet would be pretty scary indeed!)

You can get a better sense of the pattern now that it's repeated a few times. This is called "Wandering Vine" (from Davison's famous ⁨⁩ pattern book) but is also known as "Cat Track" or "Snail Trail" which makes more sense once you can see more of the pattern.

Show thread

This is NEXT WEEK! I am giving a data privacy workshop on Friday at 10:30am, and I'd love to see you. Tickets are nearly sold out, but as long as they are available, use WITTSPEAKER15 for a 15% discount to save 15% on passes at checkout. women-in-tech-texas.com/

I finally sat down and started ⁨⁩ the overshot table runner last night. The set up for this took quite a while, but I think the actual weaving will go pretty quickly.

@ullgren It sounds like we agree. I like and appreciate methods like FIDO2 and think there is a place for all three kinds of factors in combinations dependent upon threat. What I am opposed to is completely eliminating one of the factors, especially when it's one that gives more control to the individual.

@katherined @RyuKurisu @reality2cast What's also funny is that I've had two verified links in my own profile (one for Purism and one for my personal site) for ages but totally forgot that I had done it, and about the process, when we were doing the podcast.

@wion@writing.exchange It's from the Long Thread Media podcast, an interview with Heavenly Bresser.

Their general podcast page is at:
longthreadmedia.com/podcast

And the download link to this particular interview is at:

aphid.fireside.fm/d/1437767933

@twrightsman They don't trust the user. They do trust the hardware *now* because they can control it remotely, can prevent unauthorized software from running. Combined with their keys inside the secure element, the user just provides minimal in-person proof it's them (biometrics) while hardware does the heavy lifting for trust.

@dredmorbius As I elaborate on in the article, I think the main reason passwords failed is due to bad password policies (which I blame Microsoft for in large part!) that didn't take the user into account. I'm not convinced that unrevokable biometrics that unlock a "something you have" in your phone are necessarily *better* than a good password. Which factors are appropriate comes down to particular threat models and I don't think doing away with one of the three auth factors entirely is wise.

Show more
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml