• 0 Posts
  • 5 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle
  • Opinion letter.

    None of the accusations in the title can be substantiated, more than a dozen other apps and technologies are backed by the same organization the article mentions funds part of a signal’s budget.

    Assertions that TOR has a governmental back door, that the CIA wants people to use Signal, are not substantiated, and the article states at the same time that there are fears the anonymity of Signal threatens western governments. Can’t have it both ways.

    The only definitive thing this article can prove or cite is where some OTF funding goes, which was publicly disclosed since it’s inception. It reads like a /r/superstonk GME reeeeeee post equivalent for communication security by a ti foil hat.


  • Yes.

    Just this month I was there and the pizza is a different concept there to be sure.

    Street pizzas of thinly sliced zucchini or potato covering bread rounds with olive oil. That’s pizza in Rome.

    Focaccia bread like crust with some anchovies and potatoe? Pizza.

    Neapolitan style is just a different style again, but the theme is dough is not the delivery agent, it is the primary purpose. The dough is the important bit, with toppings being intended to enhance subtle flavors for it.

    Italian pizza is most similar in American expectations of food typically found there, to flatbread dishes. It’s flatbread with some stuff on top to accent it. There is no cheese on most of the pizza I had in the various parts of Italy I was in. Cheese was not an expected component. Healthy or at least flavorful variations on additions to the dough are the goal.

    Whether you are in Sardinia, Calabria, or Rome; pizza is pizza dough with local additives.

    I have seen French fries on top of pizza in Sardinia, and this was called there “American pizza” :)









  • sudoshakes@reddthat.comtoPrivacy@lemmy.mlThe UK essentially breaks encryption
    link
    fedilink
    arrow-up
    27
    arrow-down
    2
    ·
    edit-2
    10 months ago

    His point, which seems pedantic, but isn’t, is to illustrate the specific attack vector.

    Breaking encryption would mean that the cryptographic process is something that an attacker can directly exploit. This is as close to impossible as it gets in that line of work.

    While you can compromise the effectiveness of encryption by subverting it using other attack vectors like man in the middle or phishing or the good old fashioned physical device access, these don’t break the algorithm used in a way that it makes it vulnerable to decrypting other data.

    None of those mean an algorithm used like say the ole Two fish encryption is “broken”.

    Blowfish Triple DES Twofish RC4 Etc. All are fine and not currently broken. All however cannot protect your data if some other attack vector companies you or your site’s security.