Show more
m0xEE boosted

@realman543 @charlie_root
Yeah, someone posted it here on Fedi some time ago — the video might be different, but the message is essentially the same and it had WAY more swearing 🤣

@santiago
Probably the same thing Ableton Live does when it gives you the option to transpose the audio track, but keep it the same length — not that it was invented there, there were earlier pitch shifting techniques, but the fact that it works on a G4 in real time makes it admirable 😁

@realman543 @charlie_root
Do you have the Polish version? That one was simply the best 😂

@charlie_root @dcc @realman543
Yeah, very temporarily, like postpone them till 2035 😏
social.librem.one/@m0xee/11302
Turning off the updates for good isn't such a good idea IMO — as it prevents Defender malware definition database from getting updated.

@santiago
Don't you have to do some sort of time-stretching to accomplish this without speeding the video up? 🤔

@Hyolobrika
No, it's Mozilla's generic white on (no idea what the name of this colour is) — but you can make it you way with userContent.css — and I never tried making these myself, but I'm pretty sure you can make an extension that does this — or, look it up, maybe someone already made one 🤷

@Hyolobrika
…with self-signed cert your first visit might already be to a forged website, making you trust this "fake" cert, but with LetsEncrypt and the website out of the state's reach (not hosted in Russia) — you're safe.

@Hyolobrika @Hyolobrika
LetsEncrypt at the very least checks that it's indeed you who controls the DNS record — not much and it won't protect you from a malicious hoster (see jabber.ru case), but it might be useful against a malicious ISP and to a degree, a state actor. E.g. in Russia people are encouraged to install a new CA cert, then the state can make ISPs redirect the traffic to a forged website…

@Hyolobrika @Hyolobrika
Self-signed certs do not provide the capability to revoke them. Imagine that a malicious actor isn't just spoofing the site you trust with their own self-signed cert, but that the private key got compromised. With self-signed certs you have no way of telling users that the already trusted certificate is no longer valid, such a capability implies some sort of infrastructure and infrastructure implies hierarchy as someone has to operate it🤷

m0xEE boosted

@romin @prettygood
Damn, you're right! Even concatenating the archive with a JPEG-encoded image probably won't work as it likely re-encodes them 😩

@Hyolobrika
It also keeps the fingerprints so if you get a different cert on a later visit, it will give you a warning again.
To simplify adding an exception on the first visit you might want to consider this: kb.mozillazine.org/Browser.xul

@Hyolobrika
It almost works like that already.
When you open a page on a server with self-signed cert, it gives you a warning, if you accept it, it adds an exception for that cert — you can see the list in preferences under Privacy & Security → Certificates → View certificates → Servers

@romin @prettygood
🤣
Technically I can just attach a 10 Mb zip file with the post, but would anyone bother reading that? (Or all that alt.text)

@romin @newt
I wonder if you could use a public room with encryption disabled as a photo hosting?
And not photo only — by appending 7z-compressed blobs to JPEG-encoded images 🤔

@prettygood @romin
It did fly… sideways — I'm splitting my posts into eight parts 🤪

Show more
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml