Daemon Silverstein

Digital hermit. Another cosmic wanderer.

  • 0 Posts
  • 3 Comments
Joined 19 days ago
cake
Cake day: August 2nd, 2025

help-circle
  • @mysticmartz@lemmy.world

    Those LoRa devices like meshtastic look good

    Yeah, tinkering with radio and Open-source hardware in general is funny and awesome. I did some personal projects in this regard, not exactly meshtastic, but experiments using a cheap RTL-SDR and some transmission-capable things such as Baofeng UV-5R and remote controllers from some of my childhood toys. I wish I could afford to experiment more with hardware, electronic and, especially, radio equipment.

    Unfortunately, it’s like @dubyakay@lemmy.ca said, radio equipment can become targets, too.

    In reality, this is already happening in EU: recently, I saw something about EU passing a law requiring all radio-capable devices to be, as far as I can recall, “tampering-proof” or something similar, and this is threatening alternative mobile OSes (such as GrapheneOS) because this law requires bootloaders to be unlockable or something. So, in practice, governments are already targeting radio.

    Not to mention how “easy” is to triangulate a signal and how telecommunication regulators often do “wardrive” scanning in order to seek “irregular transmissions” (not just those disrupting others’ transmissions, but anything they could deem “irregular” because they’re the authorities in charge of allowing or refusing others rights, and this deemed “irregularity” could easily be using Briar through Bluetooth, or meshtastic nodes, during a strike/protest).

    This takes me to another point from your reply:

    I don’t like the idea of TOR and I2C because it’s known to hold disgusting and concerning stuff

    It’s worth mentioning that disgusting and concerning stuff isn’t exclusive to Darknet, Clearnet also has such stuff, especially mainstream social media.

    I mean, you’re not wrong, Darknet is indeed used for that, not because it’s inherent to Darknet, but because people who do concerning stuff also seek anonymity just like legitimate, well-intentioned privacy-concerned people, and Darknet happens to provide such anonymity for both uses in a double-edged sword manner.

    Problem is: there’s no way to differentiate two anonymous actors without breaking the very fundamentum of anonymity.

    And this very argument you used unfortunately can be twisted by authorities to justify breaking anonymity and, by extension, privacy.

    For authorities willing to control everyone’s lives so badly, it just takes a small leap for the phrase to be reshaped and re-adapted as…

    private content/people’s intimacies must be scanned/watched because they’re known to hold disgusting and concerning stuff

    This is almost the argument behind EU’s “Chat Control”. And the majority of people end up joining this bandwagon unaware of where this bandwagon leads to: something that makes 1984 feel like a sugarcoated documentary.

    Unfortunately, there’s no easy solution regarding “disgusting and concerning stuff”, but we should be really careful lest to throw the baby out with the dirty bathwater.


  • @mysticmartz@lemmy.world

    First and foremost, it’s not something limited to UK. Maybe it’s because I’m watching things from “outside” the so-called “first world” (I’m Brazilian), and I can’t help but notice how it’s something that have been spreading throughout the countries: Canadian bill whose number I forgot, EU’s “Chat Control”, some Australian laws, etc… It’s getting everywhere! It didn’t start yesterday, also: I remember SOPA and PIPA back in 2010s (or was it 2000s? I’m getting old).

    It’s worldwide, and it won’t be long before there are no more countries where “nothing to fear, nothing to hide” is the official motto via some kind of global treat/pact. It won’t stop in adult entertainment: eventually, it’ll cover every online activity. In this sense, “children” are just the frogs being morally leveraged by scorpions to cross an Orwellian river.

    That said, VPNs are someone else’s computers sitting between latitudinal and longitudinal coordinates delimiting some geodesic convex hull we know as “country/nation” ruled by an entity who happens to have the monopoly over asymmetrical forces ruling over that very someone. Even nodes from Tor, I2P, Yggdrasil, Hyphanet, GNUNet, Usenet servers or grand-old SOCKS4/SOCKS4a/SOCKS5 proxies are someone else’s computer sitting inside some “country”.

    And if all countries end up agreeing, out of shared dominance interests (even the so-called “inimical” countries, because even those “inimical” countries agree on certain treats such as the Global Treat regarding Antarctica), to some kind of “Online Kid Protection Global Treat” or whatever frog they can take any moral advantage of, there will be no computer proxification left for circumventing the new KYC requirements for accessing the Web, because there’ll be no more alternative countries left… Not even micronations such as Principality of Sealand.

    Yeah, future doesn’t seem good, and the majority of global citizens won’t fight against it (we, privacy-conscious and tech-savvy people, we’re not the majority), so it’s kind of a Cassandra curse going on right now.

    Maybe we must go back to radio communication? Radio mesh networks? Perhaps well-hidden geo-treasure pen-drives for exchanging and archiving files? Creating our own novel ciphering methods, steganography and security through obscurity, becoming able to physically speak through coded language on a daily basis? Even carrier pigeons and smoke signaling (I’m not joking) feels “safe” and out of the Orwellian reaches for now… For now.

    (I guess they could still be spotted by LEO satellite imagery. And god-forbid a smoke pattern is caught modulating and transmitting the original uncropped Lena picture over the atmosphere /s).


  • @Majestic@lemmy.ml @KurtVonnegut@mander.xyz

    There’s no way around this that doesn’t involve painstaking steganography which can possibly be nailed by AI anyways.

    As both a fairly power user of LLMs and someone who tinkers with ciphers a lot (including creating my own techniques), I can guarantee: Markov chains aren’t smart enough to detect well-elaborate ciphers.

    I’ll give an example: Let focus on plain characters.

    The previous phrase contains a hidden message. It’s not simply an acrostic (when a word is formed by every initial letter from a sentence/verses/paragraphs), it’s an acrostic with Caesar cipher. And it’s not simply Caesar cipher, it’s a Caesar cipher with increasing shifting (decreasing when decoding):

    L (-0 -> L), F (-1 -> E), O (-2 -> M), P (-3 -> M), C (-4 -> Y as it wraps around from A back to Z) => LEMMY

    I can guarantee you, as someone who tested every single LLM out there: they’re unable to detect these kinds of ciphers. And it gets worse when we consider the possibility of adding other layers of ciphering: nothing stops me from adding Vigenere on top of Caesar, associating the letter with the corresponding number, then getting the nth prime at that position, and using wrap-add to add letters to produce another letter (okay, this is a very complicated example).

    Also, when I say “creating my own techniques”, I’m not joking. I’ll present you with a cipher I created:

    Maceió, Niterói, Rio Branco, Palmas, São Luís, Varginha.

    Believe it or not, the previous list of Brazilian cities hides the word “BRAZIL”. How? List each Brazilian state alphabetically (excluding Distrito Federal as it’s an administrative state rather than a common state), and you’ll get a list with exactly 26 states. And what else have 26 elements? The English alphabet. Map each alphabetical letter not just to the state (e.g. L, the 12th letter, would be Minas Gerais), but to a city within that state (e.g. Varginha):

    Maceió = Alagoas = 2nd from ordered list of states = B
    Niterói = Rio de Janeiro state = 18th = R
    Rio Branco = Acre = 1st = A
    Palmas = Tocantins = 26th = Z
    São Luís = Maranhão = 9th = I
    Varginha = Minas Gerais = 12th = L

    Again, creativity is the only limit. One can wrap it in steganography, use random coordinates and then map each digit to letters to form a long text… There’s no way to stop end-to-end encryption when two or more people have enough knowledge to convey their own tool chain of ciphering techniques. And LLMs will be clueless. Even human censors would be clueless.