• 0 Posts
  • 82 Comments
Joined 6 months ago
cake
Cake day: January 5th, 2024

help-circle













  • Depends on what country you live in. Just because they call is that doesn’t mean the law and courts will see it their way.

    Relatedly, check out www.StopKillingGames.com. When you buy a game without an expiration date on the box it either is illegal or should be explicitly made illegal to destroy your copy of the game when the company shuts down their servers. Stop Killing Games is a campaign to stop this from happening, and it’s actually getting some progress like being noticed and picked up by politicians. If you know Freeman’s Mind, Civil Protection, or Ross’s Game Dungeon, this campaign was started by Ross Scott (Accursed Farms) who made all of those.

    Edit: quote from the FAQ in the website:

    Q: Aren’t games licensed, not sold to customers?

    A: The short answer is this is a large legal grey area, depending on the country. In the United States, this is generally the case. In other countries, the law is not clear at all, since license agreements cannot override national laws. Those laws often consider videogames as goods, which have many consumer protections that apply to them. So despite what the license agreement may say, in some countries you are indeed sold your copy of the game license. Some terms still apply, however. For example, you are typically only sold your individual copy of the game license for personal use, not the intellectual property rights to the videogame itself.



  • That’s significantly worse privacy-wise, since Google gets a copy of everything.

    Obviously, but I still haven’t gone through all the things I’ve ever signed up to and changed my email to the proton one. When I sign up to new stuff I use Proton, this is a necessary step for transition… And one that is likely to stay in place for a very long time since I’m going to keep procrastinating it.

    Unless you’re using proton mail anonymously then you don’t need to consider the recover email as a weakness.

    Excellent point.


  • FYI email contents were not decrypted or turned over to police, as far as I know Proton’s E2EE is still as good as whatever system you’re using. Proton doesn’t have the keys to decrypt your emails, it never did. What they have access to is metadata that is necessary to function when your private key is unavailable - e.g. your public encryption key used to encrypt incoming emails from non-Proton sources, or in this case, a recovery email address (I don’t know what the recovery process entails and whether it can restore encrypted emails).




  • This technique can also be used against an already established VPN connection once the VPN user’s host needs to renew a lease from our DHCP server. We can artificially create that scenario by setting a short lease time in the DHCP lease, so the user updates their routing table more frequently. In addition, the VPN control channel is still intact because it already uses the physical interface for its communication. In our testing, the VPN always continued to report as connected, and the kill switch was never engaged to drop our VPN connection.

    Sounds to me like it totally works even after the tunnel has started.