Watch this video! :)

Linux and mobile OS like GrapheneOS

2 Likes

Laying the foundations for CBDC and social credit scores. That will be fun /s

1 Like

Yes they are getting ready for it indeed. Getting back on the Linux solutions, the problem is that it will greatly slow the adoption curve of Autonomi, because people will still want to use their Windows or MacOS computer. So we need to find a way around it. It would be great if those NPU screenshots and keyloggers could be fed nonsense information. Not sure how difficult that is, but we have some bright minds within the community. I wouldn’t be surprised if David already has a solution :sweat_smile:

1 Like

Yeah it will be interesting to see the reaction from the privacy tech world.

If they squeeze their grip too tight they may speed up the adoption of Autonomi.

1 Like

I’ve always pointed this out elsewhere… you may have secure end to end transmission but your screen shows decrypted information. This isnt’ a problem of Autonomi only.

2 Likes

I am not a fan of central generation and the control that goes with it. Much better to build community distributed energy resources so called DERs which are under the control and ownership of the communities and then network them together for resiliency as a mesh of microgrids, which is ironically where all the big city grid designs are heading to boost distribution resiliency.

2 Likes

I was part of a team at cloakware(a CDN firm bought by irdeto a Dutch/Chinese hybrid) which protected with software , Apple’s ipod from song theft, ipod was a BSD distro running a lot of gnu . We protected any theft of streamed copyright materail(songs) with some sophisticated filters integrated into gstreamer. Cloakware is still out there. Have a look, it was US $ 50K a developer seat and you took a bunch of training.

The NPU argument of security hole punching into Telegram , Signal(which is three letter agency shite anyway)has merit, however its fairly easy to defeat that argument and attack with the correct tools, which we had at cloakware,

The security integration method was simple at Cloakware, which was integrate the types of tools you want to deploy as comment lines into your C code then a pre-compiler was run to produce ANSI C with the IP, audio and video screen protection built in, where ok, if you had 64 supercomputers running non stop for 4 weeks at tremendous cost you might be able to break just one key and get access to the content of just one protected device.

The vendor or software app trick to foil the would be intruders is random different distribution of varied security protection models using the tools in different ways, where the image is auto created at build and deploy to target time, then have the intrusion detect part of the depolyed tool set (sensing the intrusion reroute the attack action to honeypot in the code to keep them active a short while (playing with a copy of what they just attempted to hack) while the main code loop now notified of the hack (by the intrusion tool) fetches an update and then reboots…

We did it all the time for several manufacturers of electronic apparatus running Linux, BSD, RTOS, windows, MACOS , never once in Apple’s case specifically (we did the same or similar for Phillips, Siemens, Nokia et al), did Apple get hacked on the ipod, and every quarter, as a result cloakware collected a whopping hack free bonus from Apple… just saying. The tools are out there…

3 Likes

Here is a 3rd party link with some overview info of this cyber security player cloakware, they are not the only one, if you are really serious about security, this is how it really works…in the commercial space.

3 Likes

If you want Autonomi to take a lot longer and have to hire more people then they could go outside the design scope that Autonomi is and build something. Maybe grow to write a new OS to do it.

Until then Autonomi will remain true to its design and will not be creating a new OS or adapting an OS to do things it wasn’t trying to do in the first place. Device security is a huge field, lots of money going into developments on both sides to destroy the security and to increase security.

If Autonomi takes off and gets wider adoption then the security people writing code to keep your device secure will also be doing that side of things for Autonomi since it provides things they would like to see.

The solution is to get the people already working towards securing devices against the snooping by OS companies to get involved, that is where that expertise is.

2 Likes

Thank you for your explanation about Cloakware, very interesting

I understand that while Cloakware’s techniques can help create some protective measures, fully defending against the threat of AI chips (like those in the latest Macbooks) taking screenshots for spying purposes seems very complex, because it requires deep integration into the computer’s operating system and hardware.

It’s outrageous that such intrusive practices are being implemented by major companies. We can only hope that someone or some company will develop effective ways to protect users’ privacy against these threats.

1 Like

Not to sound too cynical but in my 45 years in tech I can tell you Its a war out there, largely driven by status quo crony capitalists maneuvering the levers of govt intrusion into competitors or would be competitors realms threatening their status quo, to use what ever they find in that realm against the owner of that realm to maintain and grow their power, control, bank account, etc , doing so from behind their deep state curtain,

That said, the right tools in the right hands of the many can easily defeat anything some three letter abomination comes up with to try and hack you…, its all about creativity, keeping your head on swivel and subscribing to CYAAT …, especially when on line,

A simple rule I follow, they will see anything you do on line if they want to, but cant see much if they cannot id you.

So working on any system that can turnover auditable information to these turds is a no go for me, as really anything I do with in my private realm is none of their bees wax.

Ok when I step outside that private realm into the public space, I am fair game like any one else.

2 Likes

Perhaps a linux distro with windows built in --into a VM, where it’s fully locked down.

2 Likes

Given this, is there a point for us to build support for non-FOSS systems? I suppose what I should have asked is, should the proprietary, surveillance, OSs be excluded? It may be that instead of a client app, that Autonomi should become an OS.

We do have hardware that isn’t as compromised… right?

2 Likes

Its far n few between. I have Power9 which is open architecture. RISC-V is open but depending on manufacturers don’t limit the design to that specification so… Its open + more.

1 Like

Natural gas is for corrupt morons and its going they are paying at least 20x more than they should.

2 Likes

Final episode of “What Bitcoin Did” with Guest Lynn Alden.

Lyn Alden is a macroeconomist, investment strategist and General Partner at Ego Death Capital.

In this interview, we discuss the unwinding of the Japan carry trade, the Fed cutting interest rates, how broken money leads to social unrest and what all of this means for Bitcoin.

“It’s much harder to have debates over fiscal policy than it is to have over social war stuff. So, when the fiscal policy or just the overall economic situation gets messier, fewer people are able to articulate it. So, they’re articulated in more visible ways, more social ways. That’s where a lot of that anger gets expressed.”
— Lyn Alden

4 Likes

True and even with secure hardware anyone can still take a picture with another phone or camera. So it’s a difficult one and until we have devices that target lasers only into the users eyes or even have eye implants to decode then this issue is not currently solvable.

2 Likes

Well they already have contact “lenses” that display for your eyes only. Once the resolution can be made high enough and have the processor on board it maybe possible that way

2 Likes

Easier just to avoid Windows :rofl:

PS @dirvine, we miss you around here.

10 Likes