Skip Navigation
In Chinese Megacities, ‘Ultra-Long Commutes’ Are on the Rise
www.sixthtone.com In Chinese Megacities, ‘Ultra-Long Commutes’ Are on the Rise

A growing number of people in China’s largest cities are traveling over 90 minutes each way for work, a new report has found.

In Chinese Megacities, ‘Ultra-Long Commutes’ Are on the Rise
4
CryptoPunks NFT Worth $1.5 Million Just Sold for $23,000—Here's How - Decrypt
decrypt.co CryptoPunks NFT Worth $1.5 Million Just Sold for $23,000—Here's How - Decrypt

"Heist" or just a brilliant play? CryptoPunk #2386 sold for a fraction of its market value thanks to a smart contract and an unexpected move.

CryptoPunks NFT Worth $1.5 Million Just Sold for $23,000—Here's How - Decrypt
5
Bitcoin Layer-2 Network Stacks Begins Nakamoto Upgrade
  • Why makes something l2 in your eyes?

  • NaNoWriMo and AI Clash
    www.404media.co NaNoWriMo and AI Clash

    The organization that runs National Novel Writing Month, a November challenge to write 50,000 words, said "the categorical condemnation of Artificial Intelligence has classist and ableist undertones."

    NaNoWriMo and AI Clash
    3
    Bitcoin Layer-2 Network Stacks Begins Nakamoto Upgrade
    www.coindesk.com Bitcoin Layer-2 Network Stacks Begins Nakamoto Upgrade

    Nakamoto could boost transaction speeds on Stacks and open the door for smart contracts using Bitcoin as a base layer.

    Bitcoin Layer-2 Network Stacks Begins Nakamoto Upgrade
    2
    Dark Pools Dominate Ethereum as Private Transactions Surge – at Least by One Measure
    www.coindesk.com Dark Pools Dominate Ethereum as Private Transactions Surge – at Least by One Measure

    More transactions on the blockchain are getting routed privately as users try to avoid front-running bots that eat into trading margins, but network observers worry about a loss of transparency – and potentially a trend toward centralization.

    Dark Pools Dominate Ethereum as Private Transactions Surge – at Least by One Measure
    2
    Fool’s Gold: Fake Antique Livestreams Prey on China’s Elderly
    www.sixthtone.com Fool’s Gold: Fake Antique Livestreams Prey on China’s Elderly

    In recent months, livestream scams targeting the elderly with counterfeit antiques like coins, pottery, and artwork have surged. Victims’ families have now banded together online to share advice, file complaints, and reclaim lost money.

    Fool’s Gold: Fake Antique Livestreams Prey on China’s Elderly
    0
    Hong Kong Lawmaker Latest to Push for Strategic Bitcoin Reserve - Decrypt
    decrypt.co Hong Kong Lawmaker Latest to Push for Strategic Bitcoin Reserve - Decrypt

    Legislative Council member Johnny Ng called for Hong Kong to “research and consider” including Bitcoin in strategic financial reserves.

    Hong Kong Lawmaker Latest to Push for Strategic Bitcoin Reserve - Decrypt
    0
    Rwanda's Paul Kagame cruises to crushing election victory
  • It's been years since the civil war so of course he's not going to be in military uniform

  • How Cooking Oil Became a Red-Hot Food Safety Issue in China
    www.sixthtone.com How Cooking Oil Became a Red-Hot Food Safety Issue in China

    Chinese authorities start investigating revelations that companies are transporting fuel and cooking oil in the same trucks.

    How Cooking Oil Became a Red-Hot Food Safety Issue in China
    1
    Escape the cycle of Saṃsāra
  • Trump is looking anything but cooked

  • Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Cops
    www.404media.co Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Cops

    A hacker broke into systems used by Tile, the tracking company, then stole a wealth of customer data and had access to internal company tools.

    Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Cops
    56
    Goldfish Memories - China Media Project
    chinamediaproject.org Goldfish Memories - China Media Project

    In a post to China’s popular WeChat platform last week, one writer bemoaned the shocking loss of nearly a full decade of information from the early days of the country’s domestic internet. Within hours the writer's reflections had vanished too.

    Goldfish Memories - China Media Project
    0
    At some point in the future there will be a movement to completely drop all computer technology for privacy reasons
  • That more than likely exists although albeit it's dropped for other things as well

  • What's the best strategy for changing to GrapheneOS?
  • You could buy a pixel 3 or even lower with the lowest storage possible to run lineageos to test if it suits your needs

  • You can FINALLY emulate an iPod Touch on your PC!
    • You want to experience a piece of technology you couldn't afford/were too young for
    • You have backups of delisted apps that you want to use
    • You want to create homebrew
  • After the Liang Hui: Team Xi in Charge
  • Yeah but there would be consequences and a few dissenting votes wouldn't change the predetermined outcome but would probably come at the risk of harm of yourself and your family

  • Do you guys see a lot of users in lemmy 'subs' I don't know if I'm using it right
  • no the site just doesn't have that many users

  • Privacy startup Nym brings in outside backers for $300 million developer fund
  • I get that and I'm saying it's available to use rn for you to dissect and I feel like if you have such strong opinions about it the very least you could do is put your money where you mouth is and test out the network and outline all it's flaws so the community can reason about it instead of going hurr durr it's bad I hate it

  • Privacy startup Nym brings in outside backers for $300 million developer fund
  • They make extremely strong claims, and strong claims require strong proof. I do not see such proof anywhere. What I see is that they play fast and loose with website visitor privacy and seem to focus mainly on token hyping.

    All the claims against tor and i2p are discussed in numerous academic papers and are acknowledged by the developers themselves not sure about the other projects putting that aside the network is in production rn so you could always test it and do a full writeup on all the flaws for everyone to see and discuss.Telling persons why they've decided to use tokens and not rely on pure altruism is not token hyping.

  • Privacy startup Nym brings in outside backers for $300 million developer fund
  • so you gonna comment on their comparison or nah?

  • Privacy startup Nym brings in outside backers for $300 million developer fund
  • This is “privacy for the rich” model. Unsurprisingly: poor people can’t push the token to the moon! And looking at their website it is clear they focus more on hyping the token than on actual privacy.

    "Tokens will be used to reward those who put stake into the Nym ecosystem by providing services, such as operating a mixnode or validators for the Nym blockchain. Users discover service providers and attributes a service provider needs. Users may pay service providers outside of Nym directly. Alternatively, users may pay the mixnet fees directly or services may pay for or stake NYM tokens on behalf of a pool of users in order to provide services without cost to users."

    It’s fascinating how they talk down Tor (“because Tor does not add timing obfuscation or cover traffic to obscure the traffic patterns in circuits”), but fail to mention i2p which solves these issues without the need for bollockschain tokens. Makes sense — Nym seems to basically be i2p with a blockchain token bolted onto it so that it can become an investment vehicle.So either they did not know about i2p, an important and reasonably well known project which has been around for almost 20 years and is very clearly in the same problem space, or they intentionally decided not to mention it because it would make them look bad. Take your pick: are they ignorant, or disingenuous? Either is a great trait for a project that aims at protecting privacy from the NSA, no less.

    " I2P (‘Invisible Internet Project’) replaces Tor’s directory authority with a distributed hash table for routing. How to design a secure and private distributed hash table is still an open research question, and I2P is open to a number of attacks that isolate, misdirect, or deanonymize users. Like Tor, I2P is based on ‘security by obscurity’, where it is assumed that no adversary can watch the entire network. While security by obscurity may have been cutting-edge at the turn of the millennium, such an approach is rapidly showing its age.Nym’s cutting-edge mixnet design guarantees network anonymity and resistance to surveillance even in the face of powerful deanonymizing attacks. Unlike I2P, Nym adds decoy traffic and timing obfuscation. Rather than a centralized directory authority or distributed hash table, Nym uses blockchain technology and economic incentives to decentralize its network.The Nym mixnet can anonymize metadata even against government agencies or private companies who can monitor network links and observe the incoming and outgoing traffic of all clients and servers." Source: https://get3xnymtech.net/docs/stable/overview/index.html. Full in depth blog post comparing it against tor, vpns , i2p and other solutions in the space https://blog.nymtech.net/vpns-tor-i2p-how-does-nym-compare-8576824617b8

  • Privacy startup Nym brings in outside backers for $300 million developer fund
  • Can you at least read their whitepaper and make a fully informed decision instead of hoping for their downfall

  • USA uses Solomon Islands protests against China
  • Why would anyone want any hegemon at all? No to China No to US No to any other world power

  • overflow64 overflow @lemmy.ml
    Posts 308
    Comments 15
    Moderates