oh my god shart is incredible
they/them
A backend developer mainly using Rust, though I’ve been messing around with JVM languages as of late. I play lots of video games too :)
Mastodon: @azzydev@tech.lgbt Matrix: @azzydev:hackliberty.org
oh my god shart is incredible
Is it possible for devices to ask the pihole without doh, and the pi-hole to forward the request with doh if the domain isn’t in the cache?
I suppose you’re right, but forging that kind of thing would be difficult, also considering the PKI already in place. If someone has their own email server and they sign/encrypt their email, and host their public key on a key server somewhere, it’s highly unlikely that all three would be compromised. and even if that fails, you could just meet up with them and exchange flash drives with keys.
What’s stopping someone from just sending public keys or something through Signal and encrypting their messages that way? There’s no way to enforce this with such simple loopholes present. We shouldn’t be focusing on breaking privacy and instead invest in helping existing victims in ways that actually matter.
What about Argon2id? What are the advantages of bcrypt?
Please ignore everyone else being unkind - I’m somewhat new to build systems in general, what are the advantages/disadvantages of Bazel compared to other build systems?
Beginning work on a full Minecraft server implementation; Other projects seem to be either frameworks (over full implementations) or relatively dead :(