GreyBeard

  • 2 Posts
  • 498 Comments
Joined 2 years ago
cake
Cake day: June 7th, 2023

help-circle


  • For most people, the thought of replacing an outlet or switch is daunting to say the least. My IKEA smart bulbs are going on 7 years old and still working great.

    I did replace every single outlet and switch in my house when I moved in, but that was before I knew about ZigBee or Zwave, and well before matter existed.

    I don’t feel the need to replace most of my switches and half of my outlets again.


  • I had a few Google Home devices, they had a switch to turn off the mic. I assume it was legit switch, because the thing literally yelled at you and had bright red lights any time you muted it. It literally said “The mic is turned off” every time it booted up in a voice that reminds me of a child tattling on their sibling.




  • I agree. I really struggled finding good light once the acrylic was on. It was just too shiny. Maybe I’ll try a daylight photo outside or something. In the article there are better pictures of the individual components though. It’s also hard to get the 3D effect in a photo. I thought about trying to embed a short video/gif of it, but didn’t have any handy.






  • So I and some others here have probably sounded a bit antagonistic to you, but good on you for asking and trying to understand. Public Key Cryptography feels like magic to me too, it’s just magic that I’ve accepted exists without understanding the base math of it all. Without it, however, most of the security of the Internet doesn’t work.

    Even most symmetrical encryption (Like AES, which is how you are picturing encryption working) layers on asymmetrical encryption as a negotiation layer to share a key that both parties have but that nobody eves dropping can read. Then once the key is exchanged, they use that because symmetrical encryption is way easier for computers. But for short messages like Signal sends, it wouldn’t surprise me if they stay asymmetrical for the entire communication.


  • Signal does hold the public keys for every user. But having the public key doesn’t let you decrypt anything. You need the private key to decrypt data encrypted with the public key. So in a chat example, if you and I exchange public keys, I can encrypt the message using your public key, but only you can decrypt it, using your private key.

    Signal does run the key exchange, which means they could hand a user the wrong public key, a public key which they have the private key for, instead of the other person’s. That is a threat model for this type of communications, however, signal users can see the key thumbprints of their fellow chat participants and verify them manually. And once a chat has begun, any changes to that key alerts all parties in the chat so they know a change has happened. The new key wont have access to any previous or pending messages, only new ones after the change took place.