Skip Navigation
Posts
111
Comments
809
Joined
2 yr. ago
  • I looked at Wikipedia; Taler then Blind signature, then looked for docs on GNU Taler where I didn't immediately find any technical overview of how that works. Phind gave me a seemingly reasonable and understandable answer. (Surely sourced from somewhere.)

    When we multiply the original message by rere, sign it, and then multiply by r−1r−1, the blinding factors cancel out while preserving the signature.

    The success of this process relies on two critical properties:

    • The blinding factor must be relatively prime to N
    • The RSA keypair must satisfy the congruence relation red≡r(modN)red≡r(modN)

    The magic is that you can

    1. Apply a mathematical operation on your data
    2. Sign that data
    3. Revert/Invert the mathematical operation

    and the signature remains valid.

    It does sound like magic. But isn't most of cryptography like that?

    There's a python example in there as well, with such a calculation. I didn't go through it though.

  • I just wanted to add an additional resource related to the topic.

  • There's a lot more variance in the specifics, but I think for an overview like this it's certainly missing dual-licensing and "business-open" licenses like "readable but limited now, but free software two years from now".

    But I guess with the specific target audience of this post the reduction for simplicity is a good thing.

  • It's in a process of development and testing in Europe as an official currency/payment technology.

    taler.net has a post about that - NGI Taler - too.

    We may be seeing much more concrete news and use in and from two years from now.

  • Performance optimization is hard because it’s fundamentally a brute-force task, and there’s nothing you can do about it.

    I think that only takes effect after a certain degree of best practices, knowable practices and effects, and after educated guesses and theories with testing. That's a lot before you reach brute force territory. At least in typical and higher-level programming language development.

  • Redis stands for redistribute

    right?

  • If it can’t reach the IDP

    But also when being able to reach the IDP, no?

    I don't see how being able to use passwords previous to the previous makes any sense even with that in mind.

    When the PC can connect to the IDP, I would expect it to validate against that one and only that one.

  • Do you want feedback on your website too? I have a big monitor. It's too big, making use of the entire screen width and height, and seemingly scaling to fill proportionally instead of reasonably. I would like to be able to grasp the menu in one glance, not read word for word. I assume the content is a generated presentation. For me, that's unfit for a landing webpage too. Too big.

    Seems interesting. But I don't have a use case, no need to make presentations regularly (and without existing templates). The signup is a hindrance, and having to learn a new syntax is too.

    No docs regarding syntax or syntax overview/intro either, making it hard to assess. Link to "based on Tufle CSS" is broken. As well as hidden far down but not at the end.

  • Test date 2019, and it only lands now. No wonder it's being labeled a catastrophic failure. /s

  • This tool collects profiles of Intel GPU performance based on hardware sampling

    Sounds like it's Intel only.

  • demicrosoft @programming.dev
    Kissaki @programming.dev

    Windows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technica

    Even after users change their account password, however, it remains valid for RDP logins indefinitely. In some cases, Wade reported, multiple older passwords will work while newer ones won’t. The result: persistent RDP access that bypasses cloud verification, multifactor authentication, and Conditional Access policies.

    Security @programming.dev
    Kissaki @programming.dev

    Windows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technica

    Even after users change their account password, however, it remains valid for RDP logins indefinitely. In some cases, Wade reported, multiple older passwords will work while newer ones won’t. The result: persistent RDP access that bypasses cloud verification, multifactor authentication, and Conditional Access policies.

    Security @programming.dev
    Kissaki @programming.dev

    Millions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technica

    Programming @programming.dev
    Kissaki @programming.dev
    Web Development @programming.dev
    Kissaki @programming.dev

    That last part - optimistic move application with what games people sometimes call “rollback” - is about 1,600 lines of code that took me a ~7 days of fulltime work to write. I don’t remember the last time I wrestled with a problem that hard!

    Game Development @programming.dev
    Kissaki @programming.dev
    Nushell @programming.dev
    Kissaki @programming.dev

    This Week in Nushell #296

    .NET @programming.dev
    Kissaki @programming.dev
  • The ToS drama was overblown anyway. Not much has changed. They already had that stuff, like the deactivatable sponsored links.

  • Jobs are currently in-process background threads, so will exit when exiting the current Nushell process. There's plans for job dispatching though. In the meantime, the nu_scripts repo has a task module that uses pueue to handle such cases.

  • I've been using Nushell for quite a while now, and haven't had many issues or breakage upgrading across versions.

    The most cumbersome was maybe mid of last year twice. Other than that, at least seemingly for the stuff I use, it hasn't been an issue.

  • Software Gore @programming.dev
    Kissaki @programming.dev

    See also ⚠️ Error, retry later.

  • oops, I meant to reply to the parent comment

  • You can't control the weather! /s

  • Web Development @programming.dev
    Kissaki @programming.dev

    Firefox 138.0 Release

    Opensource @programming.dev
    Kissaki @programming.dev

    Firefox 138.0 Release

    Nushell @programming.dev
    Kissaki @programming.dev

    Nushell 0.104.0 Release

    Today, we're releasing version 0.104.0 of Nu. This release adds additional job control capabilities, many datetime improvements, and a number of new Polars commands.

  • More than anything, this makes me think the CEO has no idea what their company is doing.

    Not that I can know better, but it would shock me, or more specifically, that statement specifically is unlikely to be right. Maybe supported by, not written by. Or, can you call it written by AI when it was audited and committed by humans? I hope they're still there.

    Or maybe they mean new code? That'd be more realistic.

  • Not yet.

    When will Open Sourcing be Available?

    Our focus will be on a smooth and successful Early Access launch on Steam, which is our highest priority. Only once we are happy with the state of the game will we start the process of open sourcing BitCraft.

  • Nushell @programming.dev
    Kissaki @programming.dev

    Starship v1.23.0 Offers Nushell Completions

    github.com Release v1.23.0 · starship/starship

    1.23.0 (2025-04-27) Features add network namespace module (#6449) (eb42f5a) Add support for pixi (#6335) (7e88ba9) added mise module (#5747) (d24e787) c++: adding c++ module (#6570) (ed07646) comp...

    Release v1.23.0 · starship/starship

    Starship is a customizable prompt with support for multiple shells, including Nushell.

    Starship v1.23.0 includes:

    completions: Offer Nushell completions (#6366) (df454d5)


    The completions can be generated in the env.nu into an autoload dir:

     nu
        
    starship completions nushell | save --force $'($nu.user-autoload-dirs | last)/starship-completions.nu'
    
      

    I have a setup that generates env files only once per day, resulting in faster shell startup otherwise.

     nu
        
    call-if-old $'($nu.user-autoload-dirs | last)/starship-completions.nu' {|filepath| starship completions nushell | save -f $filepath }
    
      

    call-if-old is a command I defined.


    Completions Demonstration:

    ![](https://lazysoci.al/api/v3/image_proxy?url=

    Visual Studio @programming.dev
    Kissaki @programming.dev
    Programming @programming.dev
    Kissaki @programming.dev

    My home PC is still on Windows 10 22H2, while my work machine is on Windows 11 23H2, and, to no surprise, neither machine reproduced the issue – Skimmer spawned on the water just fine, creating one via script and putting CJ in a driver’s seat worked too.

    That said, I also asked a few people who upgraded to 24H2 to test this on their machines and they all hit this bug.

    I have a likely explanation for why Rockstar made this specific mistake in the data to begin with – in Vice City, Skimmer was defined as a boat, and therefore did not have those values defined by design! When in San Andreas they changed Skimmer’s vehicle type to a plane, someone forgot to add those now-required extra parameters. Since this game seldom verifies the completeness of its data, this mistake simply slipped under the radar.

    What made the game work fine despite of this issue for over twenty years, before a new update to Windows 11 suddenly challenged this status quo?

    Programming @programming.dev
    Kissaki @programming.dev
    theia-ide.org Theia IDE – Open-Source Cloud and Desktop IDE

    Theia IDE is a modern, open-source development environment that runs on desktop and in the cloud. Not a VS Code fork, Theia supports the Language Server Protocol (LSP), is fully compatible with VS Code extensions, and features advanced AI support — all while keeping full control of your data. Explor...

    GitHub

    Theia IDE is compatible with VS Code APIs and can install and use VS Code extensions. Has additional APIs for customizations not available in VS Code.

    Have you tried Theia IDE? Any assessments or experiences to share?

    Security @programming.dev
    Kissaki @programming.dev

    Site Attestation: Browser-based Remote Attestation

    Abstract:

    When a website is accessed, a connection is made using HTTPS to ensure that it ends with the website owner and that subsequent data traffic is secured. However, no further assurances can be given to a user. It is therefore a matter of trust that the site is secure and treats the information exchanged faithfully. This puts users at risk of interacting with insecure or even fraudulent systems. With the availability of confidential computing, which makes execution contexts secure from external access and remotely attestable, this situation can be fundamentally improved.

    In this paper, we propose browser-based site attestation that allows users to validate advanced security properties when accessing a website secured by confidential computing. This includes data handling policies such as the data provided being processed only during the visit and not stored or forwarded. Or informs the user that the accessed site has been audited by a security company and that the audited

    Git @programming.dev
    Kissaki @programming.dev

    For those familiar with Git terminology:

    The simplest way to assemble a triangular workflow is to set the branch’s merge key to a different branch name, like so:

     undefined
        
    [branch “branch”]
       remote = origin
       merge = refs/heads/default
    
    
      

    This will result in the branch pullRef as origin/default, but pushRef as origin/branch, as shown in Figure 9.

    Working with triangular forks requires a bit more customization than triangular branches because we are dealing with multiple remotes. […]

    .NET @programming.dev
    Kissaki @programming.dev
    .NET @programming.dev
    Kissaki @programming.dev