• 1 Post
  • 27 Comments
Joined 2 years ago
cake
Cake day: June 15th, 2023

help-circle
  • I’m not 100% deep on the crypto, but my understanding is they use blind signatures (which have been around for a long time) to do their issuing. If you’re unfamiliar, these are kinda like an envelope with a hole cut in it, so you can put a document in it with a hidden unique key, and they can see some info through the hole, and can stamp their signature through the hole to validate that it’s legit without knowing the hidden info.

    Then the user can remove it from the envelope (unblind) and now have a certified valid coin without the issuer knowing which coin is theirs.

    So in the context of an ATM, the ATM wouldn’t “issue” coins, it would be given a request for coins from your wallet, it would certify the validity of that request, and then give your wallet back that certification in such a way that the wallet could unblind it and have the anonymous secret. So ultimately your wallet is the one that’s in charge of producing the unique parts.

    It seems there’s also a system for making sure you don’t produce bad transactions by asking you to generate N, promping you to unwrap a bunch of them to prove there’s nothing weird about them, and then signing one of the remaining ones under the assumption it’s also legit. At least it sounds like it, but I’m even less familiar with that part. But even if you did spoof someone else’s secrets… it doesn’t allow you to steal their money I don’t think… because in order to have your transaction validated in the first place you had to truly give the ATM your money… so you could I guess pay $10 to screw over your friend for $10 because it’ll look like they spent money they didn’t… but you still spent $10… so it’s less like stealing their money and more like paying to throw their wallet off a bridge? You don’t gain anything, but they lose something? Maybe there’s another exploit I don’t know about in the like “renewal” or “refund” or “transfer” protocols that make that more important.

    Anyway, I’m still not a Taler fan, but in this case I think it’s possible to do what they claim. Now, if the bank or ATM or whatever asks for ID or an account to use their services, they could track that you withdrew money, and how much. That’s data they can collect. The anonymous buyer part just means they can’t tie the coin they issued you to a spent deposit they receive later. So they know you got $10 out, and they can assume you probably spent it, but they can’t know what you spent it on.



  • You might actually like Taler, it’s fundamentally different from blockchain based systems, to the point of being a cryptocurrency only in the technical sense, but not having any of the properties people associate with that word culturally.

    Taler doesn’t use any kind of proof of work, and so doesn’t consume excess power or other resources, at least not more than, like, visiting any normal webpage. It’s also not decentralized, and only partially anonymous, so I can acquire money anonymously and no one can trace the money I got to a particular spend, but the only place I can reasonably spend it has to be registered to the centralized issuer and is firmly not anonymous. And the only things they can do with the tokens they receive is redeem them, which means there’s no place for tax evasion because the issuing authority can track every dollar the registered vendors redeem with them. And you can’t really transfer money from random person to person, so there’s no black market opportunity, etc.

    So basically the only thing Taler “protects” is that the buyer’s identity can be anonymous, but any vendor accepting Taler must not be and are highly trackable.

    These are things I actually don’t like about Taler, but we may be on opposite sides of a few issues, which is fair.



  • psycotica0@lemmy.catoProgressive Politics@lemmy.worldListen
    link
    fedilink
    arrow-up
    34
    arrow-down
    1
    ·
    7 months ago

    I think at least part of the problem is that Democrats believe in The System. So when someone cheats and whines about fake votes and stuff, they can resist that with faith that the system is working, but when the system willingly chooses the other side they have no choice but to concede that this must just be the Will of the People. And who are they to stand against the system they uphold…


  • I’m going to give you the benefit of the doubt and assume what you said was simply confusing, but not wrong.

    So just to be clear if your raid array fails, and you’re using software raid, you can plug all of the disks into a new machine and use it there. But you can’t just take a single disk out of a raid 5 array, for example, and plug it in and use it as a normal USB hard drive that just had some of the files on it, or something. Even if you built the array using soft-raid.


  • I don’t want to sound like I’m just correcting you for the sake of it, but it’s actually important. Mastodon is the most popular right now, but Mastodon actually wasn’t around at the beginning! Before that was StatusNet, and before that was identi.ca and laconi.ca

    So those services already existed, they were the ones built for federation, and so Mastodon was started as another compatible implementation of an existing network protocol. All of that is to say that Mastodon didn’t need to make the right choices at the beginning, and they have already benefitted from this kind of network dynamic! The system has already worked once!




  • I’m not disagreeing with you, but am genuinely curious how “fairness” was counted. I feel we have a thing right now where one side will present a well reasoned, data driven, argument. And the other side will hastily throw together something based on vibes that mostly doesn’t address the issue at all. But out of a sense of fairness our current media feels like it has to present both as though they’re two equally effective tradeoffs when actually one is empty noise.

    So I’d be very curious if this system has a way of preserving true fairness without devolving into false equality in some way. Obviously nothing is perfect, but I’m curious.








  • I’m not the person you’re replying to, and I don’t have any videos, but I do love dumping explanation on people! So here’s some terms:

    File System: This is the way data is laid out in terms of actual bytes on the drive. It’s in charge of things like where to look to find the name of this file, or how to “last modified” date is stored, or how do I find out which files are in this folder. NTFS is a filesystem, whereas ext4 is probably the file system your linux machine is using. FAT is the older Windows one that’s still used on, like, SD Cards and stuff. That having been said File System is sometimes also used to refer to the particular data on a particular partition of a disk, like “the filesystem will allow” which really means the data on your NTFS partition. Filesystem is often abbreviated “fs”, and is in fact the “FS” of “NTFS”

    Mounting: In unix systems, such as Linux, file systems are “mounted” to a place in the folder hierarchy. Everything in unix lives somewhere under the “root” folder /, so mounting is basically saying “Okay, you want to see the files in this filesystem. Where should I put them?”, and if you say /home/user/stuff then the file “one.txt” at the root of your filesystem will now be visible at /home/user/stuff/one.txt", and if you mounted it at /mnt/things it would be /mnt/things/one.txt. The term mount is used like “attach” to mean “where do you want me to hang this new directory hierarchy on your existing one”.

    fstab: There are a few ways to mount things in modern linux. The classic is the mount command which looks something like mount /dev/sda1 /home/user/stuff which would take the device with the name /dev/sda1 and mounts it to the given path. Devices in linux usually live in /dev, and in this case are often given names like sda1 to represent the first hard drive (a), and the first partition of that drive (1). But, there are other ways! You can also click on the partition in your file browser and it will mount the disk for you, often auto-creating a mount path and cleaning it up when you’re done, so you don’t even have to think about it. Another way is fstab, which is a kind of config file that controls mounting devices. In here you can give default options for how you want drives to be mounted, and can even specify that you’d like some devices to be automatically mounted by the system on startup. This is actually an important part of how unix systems start, and how the root filesystem and other important ones get going. If you wanted your NTFS drive to always be available at a permanent location, you would edit this file to set that up. If this is something you wanted only periodically, then just clicking may be fine.

    Permissions: Virtually all unix filesystems store the permissions of files and directories as a “user” and “group” that owns the files, and then a set of whether or not the owner can “read” “write” and “execute” the file, whether other members of the group can, and then whether everyone else can. If two people were on the same computer, these would allow a person to be able to see their own documents, but not see the documents by other users. Or maybe they can see them but can’t make changes. And it also prevents random users of a system from changing important system configuration, when those config files are owned by the administrative user (called root by convention). Some config files will be read-only to normal users, and some contain secrets and so are permissioned so normal users can’t even see them. But! NFTS doesn’t follow these same conventions, so when mounting an NTFS drive on unix the driver has to produce a set of permissions that are unix-compatible, but it doesn’t have anything to work off on the disk. So the person above was saying by default it assumes the safest option is to make all files owned by the user root, and so if the permissions are the only the owner can write the files, and the owner is root, this will mean it’s effectively “read-only” to you. The terms uid and gid stand for “user ID” and “group ID”, which are the numbers that represent a user in the data. User names are basically a convenience that allows us to give a name to a uid, but it’s more efficient to store one number everywhere on disk for owner rather than a name.

    So putting it all together, what they’re suggesting is that you can use the /etc/fstab file, which has a very particular format, to specify default options when mounting your drive. These options include setting the uid option and gid option to your user’s uid and gid, so that when the filesystem is mounted, it will appear that all the files are owned by you, so you’ll have full permissions on them. They’ve assumed your uid and gid will be 1000 because that’s a common convention, but if you’re comfortable you can run the id command on the command line to output your actual uid and gid (you can ignore all the other groups your user is in for now)

    They also mentioned that when mounting you can specify if you want to mount the filesystem as “read-only” or “read-write”, etc. If you mount the whole filesystem read-only, then the write permissions stored on the individual files are ignored, basically. So if you were mounting with a command, or through fstab, you should make sure the rw option is present to clarify that you’re looking for “read write” permissions on your mount.

    That having been said, it’s possible none of that is relevant to you if you’re mounting the fs by just clicking in your file browser. One way to tell is if you right-click on some file you aren’t allowed to edit and look at the properties there should be a Permissions tab thing. And it will list the owner of the file and what access you have. If those permissions are already set to be owned by you, then this uid thing is already taken care of for you by the file browser. In that case it might be something more fundamental to the NTFS filesystem, like the locks other people are talking about.

    So those are some words and their meanings! Probably more than you wanted to know, but that’s okay. I liked typing it


  • I think I may have contracted some kind of brain worm, because the other day I needed to do some photo manipulation and couldn’t get krita to do what I wanted, but I went into gimp and just knocked it out. I’ve hated gimp for years, but I guess I’ve used it enough that I’ve figured out how it works… and now I don’t hate it anymore…

    I think I may need help.

    Oh, but I always use it in single window mode ever since that came out. The multiple windows floating panel thing drove me nuts!