Show more

@Hyolobrika
No, it's Mozilla's generic white on (no idea what the name of this colour is) — but you can make it you way with userContent.css — and I never tried making these myself, but I'm pretty sure you can make an extension that does this — or, look it up, maybe someone already made one 🤷

@Hyolobrika
…with self-signed cert your first visit might already be to a forged website, making you trust this "fake" cert, but with LetsEncrypt and the website out of the state's reach (not hosted in Russia) — you're safe.

@Hyolobrika @Hyolobrika
LetsEncrypt at the very least checks that it's indeed you who controls the DNS record — not much and it won't protect you from a malicious hoster (see jabber.ru case), but it might be useful against a malicious ISP and to a degree, a state actor. E.g. in Russia people are encouraged to install a new CA cert, then the state can make ISPs redirect the traffic to a forged website…

@Hyolobrika @Hyolobrika
Self-signed certs do not provide the capability to revoke them. Imagine that a malicious actor isn't just spoofing the site you trust with their own self-signed cert, but that the private key got compromised. With self-signed certs you have no way of telling users that the already trusted certificate is no longer valid, such a capability implies some sort of infrastructure and infrastructure implies hierarchy as someone has to operate it🤷

m0xEE boosted

@romin @prettygood
Damn, you're right! Even concatenating the archive with a JPEG-encoded image probably won't work as it likely re-encodes them 😩

@Hyolobrika
It also keeps the fingerprints so if you get a different cert on a later visit, it will give you a warning again.
To simplify adding an exception on the first visit you might want to consider this: kb.mozillazine.org/Browser.xul

@Hyolobrika
It almost works like that already.
When you open a page on a server with self-signed cert, it gives you a warning, if you accept it, it adds an exception for that cert — you can see the list in preferences under Privacy & Security → Certificates → View certificates → Servers

@romin @prettygood
🤣
Technically I can just attach a 10 Mb zip file with the post, but would anyone bother reading that? (Or all that alt.text)

@romin @newt
I wonder if you could use a public room with encryption disabled as a photo hosting?
And not photo only — by appending 7z-compressed blobs to JPEG-encoded images 🤔

@prettygood @romin
It did fly… sideways — I'm splitting my posts into eight parts 🤪

m0xEE boosted

Glamour shot of my daughter’s younger kitty: Tango. She is still getting along great with the older ginger Pretzel.

Day after #caturday

@kirby
I'd still try to learn why was it suspended. Did they at least grant you a refund? 🤔

@nugger @gospodin @shitpisscum
More like neural parasites in this particular case 😅

@neuro_opennet
Но я не заказывал это! Унесите немедленно! 😤

@romin
Especially the server part of it 😂

@shitpisscum @gospodin
Probably in conjunction with the posting part… Might have unexpected effects 🤣

@shitpisscum @gospodin
WTF is so "dangerous" about shitposting though? 🤔

Show more
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml