RE: https://mastodon.social/@Tutanota/116130138605094270
Today the EU Parliament said NO. ❌
Voluntary scanning by Outlook, Gmail, LinkedIn, etc. might come to an end on April 6 in the EU. Keep pushing everyone! 👏🥳
Geek.
/u/Natanael_L on reddit, moderating /r/crypto (as in cryptography)
https://bsky.app/profile/natanael.bsky.social
| Location | Somewhere in Sweden |
| Interests | Random tech stuff |
| Matrix.org account, for E2EE messages | @Natanael_L:matrix.org |
| Crypto means | Cryptography |
RE: https://mastodon.social/@Tutanota/116130138605094270
Today the EU Parliament said NO. ❌
Voluntary scanning by Outlook, Gmail, LinkedIn, etc. might come to an end on April 6 in the EU. Keep pushing everyone! 👏🥳
"GrapheneOS doesn’t see Unified Attestation as a solution, but just adds another new gatekeeper, replacing Google controls with a vendor-managed list.
The main argument made is that companies that sell phones should not be deciding which operating systems are allowed to run apps."
What's going on here? The matplotlib maintainer this story is about correctly notes that all the quotes from his post in the article are made up.
UPDATE: Link was pulled; see below.
There have so far been at least three different explanations given:
- army told FAA it was testing new anti-drone tech, FAA thought possibly unsafe for civil traffic, issued TFR, army then responded with safety assurance
- actual drone incursions detected, military responded, then gave all clear
- FAA initially misunderstood/was misinformed of location of military antidrone testing, thought it was at Biggs airfield (adjacent to El Paso) when it’s actually at other locations near border.
FAA just announced a 10 day emergency temporary restricted area for a 10 mile radius around El Paso. No flights are permitted from ground level to 18000 feet, grounding all flights to/from the El Paso airport (KELP).
Designed as “national defense airspace”, with “deadly force authorized if aircraft determined to pose a security threat”.
No reason given.
Update: the TFR appears to have been cancelled, effective immediately.
🧵 Short Authentication Strings (SAS) in the Age of Generative AI
When ZRTP was released by Phil Zimmermann and team in the mid-2000s, one of it's main innovations was to use SAS in order to verbally authenticate the other party on the call and rule out person-in-the-middle attacks. This worked by reading aloud a SAS value over the voice connection and ensure that it matched the value on the other side.
When we shipped Signal 1.0 with ZRTP, those were the words on the display during calls.
👇