Our @panoramax -server is back online!

In other word, looking at our images and uploading new images is possible again.

Did you try to upload an image yesterday? Open the MapComplete website or app again, MapComplete will try to upload again without losing your image.

You can also see the 'image upload queue' in the menu; in case you'd want to abort uploading an image.

A big thanks to @thibaultmol for hosting our server and to the @panoramax for the assistance!

RE: mastodon.social/@Kipe/11571778…

Tady pan Kipe hledá práci v Brně a okolí. Tak kdybyste o něčem věděli, tak mu dejte vědět.


@archos Nemám. Hledám. Tak kdybyste o něčem věděli, dejte echo. Dva roky jsem se teď pohyboval v kybernetické bezpečnosti, vím něco o PAMech, sítích, vulnerability managementu, firewallech …

in reply to Václav Pašek

Mně se povedlo dostat skoro celou rodinu na MXChat (Matrix) a WhatsApp mám už jen kvůli práci – máme ho přemostěný do Matrixu, takže mi všechny zprávy chodí tam.

Volání přes most nejde, ale aspoň mi přijde notifikace, že někdo volal → pak buď otevřu WhatsApp a zavolám zpět, nebo zavolám normálně.

Jediná nevýhoda: WhatsApp stejně musí být v telefonu. Most totiž používá webové rozhraní (WhatsApp Web / linked device), takže telefon musí být připojený k internetu, aby to fungovalo. WhatsApp appka nemusí být pořád otevřená – stačí ji jen občas spustit.

Extrem rechte Akteure und Organisationen verdrehen und missbrauchen #christliche #Narrative und versuchen ihren Einfluss auf die konfessionelle #Christenheit auszuweiten.

Eine wichtige #Doku von #Monitor:

wdrvod-rwrtr.akamaized.net/i/,…
#ZurFeierDesSonntags #FediKirche #ChristUndPolitik #Kirche

I can’t even…

#RFKJr Blames Pills — Not #Guns — for #SchoolShootings

There is NO credible evidence that #antidepressants cause violence, but Kennedy now vows a “massive” effort to prove the failed theory.

#policy #law #Trump #ConspiracyTheories #disinformation #ChildEndangerment #PublicHealth #GunControl #GunLaws #Health #MentalHealth #science #medicine #USpol #SchoolShooting #MassShooting #GunViolence #EnoughIsEnough
motherjones.com/politics/2025/…

in reply to miki

With that said, guns are a *necessary first step* that makes mass shootings possible, but there's more to them than just access to guns.

Whatever the trend is, even Europe isn't fully immune from it either, see e.g. the attacks in Berlin a few years ago where a person drove a truck into a large crowd of pedestrians. The tool is different, the effect is similar.

Does anyone have these things that they love and would recommend:

- Bluetooth speaker
Not smart. I don't need to ask it anything. Just something I can connect to that will make good music sounds in my house.

- CD player
Something modern that connects to the computer so again I can throw it out to speakers. Or something that connects direct to speakers?
But being able to rip CDs like the olden days would also be good.

Thaanks
#recommendations #music #cd #speaker #elextronics #gadgets

in reply to daniel:// stenberg://

many servers will reject by default urls above 8k. But there are probably special setups out there.

Other things start to break when urls go beyond 64k. h2 may have a problem with its header handling (although headers are outside the stream's window size).

h3 will have problems with initial congestion windows where headers count for the window.

I think 64k would therefore be a limit that should not by itself pose problems.

Vojtux - Accessible Linux distro which is almost pure Fedora

Vojtěch Polášek has put together a technical preview of a version of Fedora that should work well for blind or visually impaired users. While his goal is explicitly to see these improvements and changes become part of Fedora itself, for now you can use this implementation based on the Fedora MATE spin. :)

➡️ freelists.org/post/orca/Announ…

#Vojtux #Fedora #Accessibility #a11y #Linux #OpenSource

reshared this

C'est dimanche, c'est le #pfffitt !
Édition spéciale "blagues de l'Est communiste" !

"Tu veux vivre en RDA ? Ne pense pas. Si tu ne peux pas t’empêcher de penser, ne parle pas. Si tu ne peux pas t’empêcher de parler, n’écris pas. Si tu ne peux pas t’empêcher d’écrire, ne signe pas. Si tu ne peux pas t’empêcher de signer, ne t’étonne pas."

RE: fosstodon.org/@arcanechat/1157…

There’s a vulnerability in Signal. You are developing an alternative. Do you:

  • A: skim read the report, see it contains the phrase ‘phone number’, and shitpost about Signal, or
  • B: Analyse the attack and see if it could be adapted to your protocol, then post about how you either were already protected or have deployed a mitigation?

If you chose option A, please don’t expect to be able to convince me that you are serious about security.


"Tool allows stealthy tracking of #Signal and #WhatsApp users through delivery receipts"

cyberinsider.com/tool-allows-s…

Another privacy vulnerability caused by the dependency on phone numbers.

In #ArcaneChat (and other #chatmail clients like #DeltaChat) you don't need a phone number (or any private data at all!) to register, so such attacks are simply impossible, keep your family safe, join arcanechat.me


in reply to David Chisnall (*Now with 50% more sarcasm!*)

replied here fosstodon.org/@arcanechat/1157…


@david_chisnall by saying "requires phone numbers" I was implying that you can discover people by phone numbers since that is the case in 99% if not 100% of all apps that offer phone number registration, that you can disable this feature is meaningless if it is opt-out and most people will leave it like that, by saying ArcaneChat is immune to this I meant because you can't discover people like that, people must get in contact directly via QR or invite link

"Tool allows stealthy tracking of #Signal and #WhatsApp users through delivery receipts"

cyberinsider.com/tool-allows-s…

Another privacy vulnerability caused by the dependency on phone numbers.

In #ArcaneChat (and other #chatmail clients like #DeltaChat) you don't need a phone number (or any private data at all!) to register, so such attacks are simply impossible, keep your family safe, join arcanechat.me

in reply to ArcaneChat

When you post something about a vulnerability in another messenger and completely misrepresent it, in a way that implies that you don’t understand the cause of it at all, it gives me no confidence in your system.

The root cause is nothing to do with phone numbers. It depends on two things:

  • Being able to send messages to someone from some public identifier. Any messenger that doesn’t require an interactive flow for pairing devices (as some military systems do) has this feature.
  • Receiving read receipts from messages. Signal allows you to turn off read receipts if you are concerned about information leaks from them.

If you actually wanted to convince people your system was better you would:

  • Show that you don’t issue read receipts (which will put some people off because they are useful).
  • Show how you mitigate this kind of attack, by rate limiting this kind of message, adding jitter to responses, and so on.

Email-based flows tend to not be vulnerable to this kind of attack because they do most of the processing on the server, so you’d only be able to probe the server. But you wouldn’t bother because email has so little metadata protection that you don’t need to bother with an attack like this. From what I know of DeltaChat’s group chat protocol, I suspect there is a way of triggering a similar attack by sending broadcast invalid messages and timing the error response. If you really wanted to convince people that your system is better, you’d show a security analysis that explains why I’m wrong, rather than just say ‘I don’t understand this attacks but the researchers who published it didn’t bother trying to attack the protocol I use and so I’m sure it is secure!’ That is exactly the attitude to security that makes me distrust DeltaChat.

Oh and before anyone jumps in with anything about XMPP: this attack is completely trivial on XMPP. Send an invalid iq stanza to the client’s bare JID and time the response. And this is impossible to fix without redesigning the protocol because unknown iq stanzas must be forwarded to the client to enable future extension and clients must respond with errors.

in reply to David Chisnall (*Now with 50% more sarcasm!*)

@david_chisnall by saying "requires phone numbers" I was implying that you can discover people by phone numbers since that is the case in 99% if not 100% of all apps that offer phone number registration, that you can disable this feature is meaningless if it is opt-out and most people will leave it like that, by saying ArcaneChat is immune to this I meant because you can't discover people like that, people must get in contact directly via QR or invite link
in reply to David Chisnall (*Now with 50% more sarcasm!*)

#DeltaChat is for private chatting, so you normally don't put your link anywhere publicly, you could create a dedicated profile for public interactions tho, which, unlike in signal, it is super easy to do and you can have as many as you want,

and notice the use case I am talking here is family chat, not business and public interactions, that is why I said "keep your family safe" I am talking about family chat solution here

This entry was edited (3 hours ago)
in reply to ArcaneChat

#DeltaChat is for private chatting, so you normally don't put your link anywhere publicly, you could create a dedicated profile for public interactions tho, which, unlike in signal, it is super easy to do and you can have as many as you want,


Okay, so your use case for 'private chatting' excludes journalists publishing contact information for whistleblowers? It excludes union organisation? It excludes protest organisation?

I guess that's fine, but maybe don't claim to be operating in the same space as Signal then.

and notice the use case I am talking here is family chat, not business and public interactions, that is why I said "keep your family safe" I am talking about family chat solution here


Then you need to learn about the concept of an anonymity set. If you have one mechanism for talking to your family and another different one for talking to your union rep, it's really easy for a passive adversary to track when you suddenly start using a different mechanism for high-value conversations.

in reply to David Chisnall (*Now with 50% more sarcasm!*)

@david_chisnall
what kind of passive adversary are you talking about here? server, provider, global?

Identifying whether you are using this or that chat profile is not necessarily trivial, especially since the 2.33 releases which introduced multi-relay profiles. A single chat profile can jump between using different relays/hosts.

FWIW we share the recommendation of @arcanechat to split between a public profile (invite link published etc.) and private ones (no publishing).

in reply to David Chisnall (*Now with 50% more sarcasm!*)

@david_chisnall

> rather than just say ‘I don’t understand this attacks but the researchers who published it didn’t bother trying to attack the protocol I use and so I’m sure it is secure!’ That is exactly the attitude to security that makes me distrust DeltaChat.

I don't understand why do you seem so upset, #DeltaChat has received several REAL PROFESSIONAL INDEPENDENT security audits, all listed here: delta.chat/en/help#security-au…
can you provide a similar list of REAL sec. audits for Signal?

in reply to ArcaneChat

I don't understand why do you seem so upset,


Because you're spreading misinformation to score marketing points and spreading misinformation about secure messengers gets people killed.

I don't understand why do you seem so upset, #DeltaChat has received several REAL PROFESSIONAL INDEPENDENT security audits, all listed here: delta.chat/en/help#security-au


So, none after this particular class of attack was discovered and therefore none that include this in the threat model?