• 19 Posts
  • 811 Comments
Joined 2 years ago
cake
Cake day: August 10th, 2023

help-circle

  • could the black box be lifted revealing the contents of what it covered

    If we’re talking raster images, then no, you’re not using some mathematical model to morph an image, you’re just overwriting pixels arbitrarily, so there would be no way to recover what’s “under” the box because there’s no second layer.
    If instead it’s something like a PDF (vector), then placing an object over another without flattening the result would allow you to move it out of the way to reveal what’s under.

    I would add, of course, make sure that the black box covers enough to prevent the possibility of inferring what’s under, so if it’s text or other organic things that can be “statistically” regenerated with some model, don’t leave any borders that can identify the item, reconstructed data may be synthetic, but can provide informed guesses





  • The project looks a bit sketchy being in big part written by some Manus AI agent, I wouldn’t trust probably lightly reviewed code to take on the task of data erasure on my device.
    It’s also unclear from reading the documentation if it treats SSD data erasure correctly as you can’t simply overwrite data a bunch of times anymore on most SSDs.
    Of course, both things can be checked from reading the source code, I’m just giving a heads up.
    Being written in big part by an LLM the question of copyright is also important, can it really be released under any open license as is?

    That aside, you might want to post to !scienza@feddit.it for Italian content.











  • Since when is encryption dependent on the service’s jurisdiction? When Signal has got subpoenaed it has always been incapable of providing data that involves the content of the conversation https://signal.org/bigbrother/

    The app is also open source with reproducible builds (and you can use Molly instead, if you prefer) and when the clients of an end-to-end encrypted system are sound, that is all that matters to secure the content of the communication.
    Audits are also performed as listed here https://community.signalusers.org/t/overview-of-third-party-security-audits/13243

    I don’t understand where this doomerism comes from tbh, (online) privacy will cease to exist when either maths does or it becomes globally illegal to use encryption and the government’s intrusion is really so pervasive that they constantly know what you’re doing. Luckily we don’t yet live in that world, though the pressure is real and we are the first that have to fight for this basic human right