

Completely disregarding this post, we’ve been made aware…


Completely disregarding this post, we’ve been made aware…


Goddammit, they were all correct 😭


Odd title.
Why would there be more child brides if they are suffering more sexual abuse? Seems like a weird causation.


Happy cake day!


It really is greener there. Been there for almost two decades, it’s so nice. Been tweaking my setup ever since and it’s still evolving all the time.
My last venture has been Niri + Noctalia shell. Works so great together.


Alright, thank you! I’ll do some research on TLS to learn a bit better how it works and stuff, I think. 😁


It does, doesn’t it. And helps categorize, as well. 🙂


Agreed, but somehow your use of it here still feels off. Like it isn’t necessary at all right there; at least that’s how I feel. The thing that comes after the semicolon needs to be able to stand on its own. Or use it when counting: Strawberries, blueberries, raspberries; flour, sugar, and cereal; milk, and cream.


Agree to disagree.


I just woke up and I don’t fully comprehend what you wrote, but I thank you for your reassurance. 🙏


I welcome them when they make grammatical sense. 🙂 I’m also partial as I’m a developer by trade.


I don’t like the use of commas to signify pauses. Commas are better for grammatical structure in my opinion. Better to use an ellipsis (…), or an em dash (—). My two cents.


Interesting, okay. Just to be clear, if the middle man, i.e. the VPN, were to listen in on the data exchanged during the TLS handshake, wouldn’t it be able to recreate both parties’ key pairs simply using the same algorithm? If it has all the pieces, so to speak. Or is the tech resistant to that as well?


So a VPN could basically sniff the Diffie-Hellman keys used during the exchange, recreate the key that browser and server use for HTTPS, and then decrypt all traffic sent through the VPN? Is that correct? And basically the same goes for any ISP or whatever else that’s acting as a node?


What I was thinking was that the VPN would be able to sniff the key exchange hand shake thing that HTTPS does in order to setup the connection, and use the data during the handshake to basically recreate the cryptographic key used for the connection later. So then it’d be able to just decrypt all traffic and reencrypt it again after passing through. Seamlessly to both ends.
Is that a thing in theory?


Could you please explain why not renewing their certs is such a serious betrayal? Like, if they fixed it, isn’t that okay? And even if it happened again, and they fixed it again, isn’t it human to err? Or why is it such a harsh offense?
Serious question, I don’t know the consequences of not renewing these certs. 😊


This isn’t using Mullvad.


Can a VPN provider do man in the middle attacks if they wanted to? Like sniff my /api/login calls and get my password? My gut tells me yes but I don’t know enough to be sure, I feel.


It’s what they deserve but let’s not stoop to their level. Stay strong.
Hello Mr. Connery