• 0 Posts
  • 38 Comments
Joined 3 months ago
cake
Cake day: June 6th, 2024

help-circle


  • Almost everything about it needs to be optional because sometimes USB is used to charge some cheap battery powered thing and sometimes it’s used to make a backup of a harddrive and sometimes it’s charging my laptop with enough power for it to be rendering video but still have a net charge increase to the battery while also providing Ethernet, video output, and keyboard/mouse input over the same one port.

    EDIT to make it more clear why the variability of USB standards is what it is, compare a modern laptop to one from 10 years ago.

    The older laptop has:

    • for video, an HDMI port (or the less common mini HDMI port), and perhaps a mini DP port
    • an Ethernet port
    • a charging plug
    • possibly some FireWire ports (may or may not be the same as the mini DP port)
    • USB A ports for keyboard/mouse and other random devices

    The newer laptop has:

    • USBC ports that can do all of the above

    The perhiperals, however, don’t support all of the features. They only support the features they actually use. As long as the laptop supports all of the optional features, you don’t need to worry about it.

    The is especially helpful for less technical users who may not want to know what the difference between HDMI and DisplayPort is. With a fully USBC based laptop and USBC perhipals you can just plug it in and it will work.

    Of course this is all dependent on the laptop implementing all of the extra features, which is still only really true of more expensive laptops.











  • a small hacking group years in advance to plan and execute a voting machine manipulation without anyone noticing

    This is actually incredibly difficult. Finding vulnerabilities isn’t easy, and exploiting them often isn’t easy either. Sometimes a vulnerability requires the user of the device to do something specific, and sometimes it requires direct access to the device. This comes back to social engineering, as a hacker may have to trick a poll worker into triggering the vulnerability. Also some vulnerabilities might be less impactful than others, e.g. leaking some information rather than allowing a hacker to manipulate votes. Finally, vulnerabilities are discovered and patched all the time. The problems discovered at this year’s DefCon, maybe not all of them will be patched before the election. But planning an attack years in advance? That’s not happening.

    What about a 150 million or more country, what would be easier, manipulation of paper votes across the country involving a lot, and I mean a lot, of people using ballot stuffing and count rigging

    So here’s a list of actual vote manipulation techniques that are commonly used in this country:

    • gerrymandering
    • laws that make it harder for certain people to vote (e.g. laws where your huge city is only allowed one polling booth and you have to take a day off work to vote and there’s strict time requirements and you aren’t allowed water while in the long line)
    • people intimidating people they don’t think will “vote correctly” to stay away from polls

    Here’s a list of vote manipulation techniques that were attempted but failed:

    • bringing a fake set of electors to declare votes that didn’t match with what the people voted for
    • interrupting the official counting and certification of the voting process
    • potentially the killing of government officials in charge of the vote certification process (this didn’t happen, but the mob raiding the capital had constructed a gallows…)

    I really, deeply think that some unspecified electronic vulnerabilities are the least of our concerns for this upcoming election.





  • With self hosting you have to trust that you won’t fuck up, that your house or wherever you are hosting won’t lose power when you need it, or burn down or face some other disaster. At the very least you should have an external location, which you also should trust pretty thoroughly.

    Also that’s not to mention that open source projects still have security vulnerabilities sometimes, and also sometimes they get a lot less developer attention than profesional projects.

    I love self hosting stuff and do a lot of my own computer backups etc. but the most important stuff I rely on professional cloud solutions for. I simply don’t have the resources to be able to compete.