• 0 Posts
  • 24 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle
rss
  • https://contentauthenticity.org/how-it-works

    The page is very light on technical detail, but I think this is a system like trusted platform modules (TPMs), where there is a hardware root of trust in the camera holding the private key of an attestation certificate signed by the manufacturer at the time of manufacture, and it signs the pictures it takes. The consortium is eager for people to take this up (“open-source software!”) and support showing and appending to provenance data in their software. The more people do so, the more valuable the special content-authenticating cameras become.

    But TPMs on PCs have not been without vulnerabilities. I seem to recall that some manufacturers used a default or example private key for their CA certificates, or something. Vulnerabilities in the firmware of a content-authenticating camera could be used to jailbreak it and make it sign arbitrary pictures. And, unless the CAI is so completely successful that every cell phone authenticates its pictures (which means we all pay rent to the C2PA), some of the most important images will always be unauthenticated under this scheme.

    And the entire scheme of trusted computing relies on wresting ultimate control of a computing device from its owner. That’s how other parties can trust the device without trusting the user. It can be guaranteed that there are things the device will not do, even if the user wants it to. This extends the dominance of existing power structures down into the every-day use of the device. What is not permitted, the device will make impossible. And governments may compel the manufacturer to do one thing or another. See “The coming war on general computation,” Cory Doctorow, 28c3.

    What if your camera refused to take any pictures as long as it’s located in Gaza? Or what if spies inserted code into a compulsory firmware update that would cause a camera with a certain serial number to recognize certain faces and edit those people out of pictures that it takes, before it signs them as being super-authentic?



  • My ergo journey started with similar requirements to yours - specifically including the Y and B keys. Along the way, I learned how important layers are for comfort, ditched QWERTY entirely for Colemak DH, bought a 3D printer, and ended up at 40%. Several years ago, there was a term “1KFH” (“one key from home”) people used to describe the amazing amount of comfort they found when they never had to move their fingers more than one key away from home position, nor to move their hands.

    I’m not saying you have to change your requirements, now or ever, but I think people who start to make their own ergo keyboards may be subject to this sort of requirements drift, such that if they ever make it to the product phase, their products aren’t what they initially expected to be building. And maybe this sort of dynamic is what makes it less likely for the product you are looking for to have been built already.


  • It took me a couple months to stop thinking about layers.

    My first move toward ergonomics was a Keebio Fourier 40%. It had been a few months before that when I started using Colemak on my laptop keyboard; I did that using Windows keyboard settings, and I was taking notes in meetings, so whenever I couldn’t keep up, switching back to QWERTY was a hotkey away.

    After switching to the Fourier, and iterating many times on the QMK settings, that was the month or two where I had to think through all the control keys, symbols, and function keys I was typing. I didn’t quit typing on other keyboards, although I typed on my Fourier as much as possible; and I have not ended up forgetting anything I learned before.

    I’m now on the precipice of moving from a 4x6 Dactyl Manuform to a 4x5 Splaytyl (if I can find those dang parts and get the thing built!) and that’s too small to have things like Tab, Enter, or the backslash on the home layer. I’m nervous. I’ve tried making a 4x5 layout for the DM, but haven’t ended up sticking with it. I couldn’t really get used to keys that are physically there, not doing anything.




  • A name I’ve seen in connection with this issue is Obtainium. From a cursory look, it appears this just streamlines checking for and getting apk’s from GitHub release pages and other project-specific sources, rather than adding any trust. So maybe it just greases the slippery slope :)

    Security guidelines for mobile phones, and therefore policies enforced by large organizations (think Bring-Your-Own-Device), are likely to say that one may only install apps from the platform-provided official source, such as the Play Store for Android or the Apple App Store for iOS. You might say it’s an institutionalized form of “put[ting] too much trust in claims of authority.” Or you might say that it’s a formal cession of the job of establishing software trustworthiness to the platform vendors, at the mere expense of agency for users on those platforms.

    People are not taught how to verify the authenticity and legitimacy of software

    Rant: Mobile computing as we know it is founded on the rounding off of the rough corner of user agency, in order to reduce the amount users need to know in order to be successful, and to provide the assurances other players need, such as device vendors, employers, banks, advertisers, governments, and copyright holders. See The Coming War on General Computation, Cory Doctorow, 2011. Within such a framework, the user is not a trustworthy party, so the user’s opinion of authenticity and legitimacy, however well informed, doesn’t matter.






  • Use the Part Design workbench (you probably are already, but no one’s said it yet). Sketch a rectangle for the top of the whole tray, not the surface. Pad it down 40mm. Add a draft to set the angle of the sides. Use the thickness tool to dig out the middle of the top face - to a thickness of your exact choosing, which will be consistent everywhere. Now you have a trapezoidal bin.

    Then how do you make the separators. Um, draw a sketch with the tee on the inside bottom and pad it… and then the separators don’t reach the angled side walls. Oo, how about this: on the inside bottom, draw a sketch of the small square of material at the junction of the tee, and pad this tiny pillar up to the top of the tray. Then start a sketch on a side wall, External Geometry the near sides of the pillar in, and they’ll be projected onto the angled side wall. Then loft the two rectangles together. Yeah? Yeah? No. That didn’t work. The projection was normal to the angled wall, not to the side of the pillar.

    HAHAHA ok. Select a side of the pillar. Pad it, select Up to Face, and pick the angled inside . Presto!

    Then stick the lip on top and the grippy bit and that.

    I hope this was helpful and entertaining.



  • I’ve been using a tshort dactyl manuform 4x6 for 5 years now, having never planned to use it for even 1 year. I only commonly use the two innermost thumb keys; I didn’t think I would like the thumb cluster from watching a video of someone typing on it, and I indeed don’t like the thumb cluster. The switches are Kailh Brown; one of them started to stutter and I replaced it with … a TTC Brown or some such.

    I’ve printed, but not finished, a Splaytyl. I think it’s going to feel nice, but it’s only 4x5, and I’m nervous about not having Tab and Enter on the base layer.



  • Yeah, I did one for my Dactyl Manuform and just oversized it by a couple millimeters and stuck Amazon bubbly envelopes on the inside. The bottom of each half is flat, the same shape, and rubberized, so the covers just go over the top, I clap the bottoms together (tee hee?), and chunk the whole thing in a lunch bag that barely fits. It stays together without slipping and without any attachment between the two cover halves. Janky but it’s worked for years.



  • I 3d-printed a hard box for my Fourier. https://gitlab.com/jaredjennings/fourier-box. (wince, there is no photo nor even an STL in that repository.) I wanted it to fit in my backpack with a laptop and books, so it holds the two halves side by side, not stacked. I had to print it in two pieces and friction-weld them together. That sounds fancy, but it just means you take a piece of filament, put it in a Dremel chuck, and draw on your model. Wherever you push down, the friction makes the end of the filament melt. Then I put on some Sci-Grip 4 (dichloromethane), which further solvent-welded the joint.

    If you wanted to make one like this for your cepstrum, you’d need to do it in more pieces because that’s larger than a Fourier. Your case would end up to be the size of a laptop. You might not want that.


  • They are made (I think) to be implementable - even, to give implementors some flexibility. Then everybody goes and buys a tool to do it, and not that well. I thought 15 years ago that security configuration was a (voluminous) subset of system configuration and system administration, ripe for automation and rigorous documentation - not something to pay a different vendor for. But the market says otherwise. When you can split some work across a whole team, or even into a separate company, instead of glomming it into one job, that’s worth money to businesspeople.


  • There are many ways to be more selective about from whom to accept email. SPF, DKIM, DMARC, and various blacklists are among them. They are supposed to make life harder for spammers. But they have also made running a mail server something that few dare to try anymore. Setup is not easy, but getting blacklisted is, and it causes silent delivery failure, and takes days of work to fix.

    As a result, most of the email is run by Microsoft and Google. But that didn’t stop phishers. They just go after people at smaller companies where security isn’t as tight yet, and then they’ve got valid Microsoft accounts to send from. Liars and Outliers by Schneier is about this sort of dynamic.

    As for PKI: If I may assume you to be, or have been, affiliated with an armed service – Whose property is your CAC? And why did you use a pseudonym to make this post? (I mean to be pithy, not sarcastic.) I think Liars and Outliers by Schneier is all about this sort of thing - but I didn’t get much of it read before it was due back at the library.