Notices by Soatok Dreamseeker (soatok@furry.engineer), page 2
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 22:09:32 JST
Soatok Dreamseeker
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 20:07:42 JST
Soatok Dreamseeker
@ariarhythmic I've written about this before lol
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 15:05:40 JST
Soatok Dreamseeker
@sophieschmieg And I insist on them accounting for ML-DSA-87, because CNSA 2.0 :P
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 15:01:53 JST
Soatok Dreamseeker
@stefenauris You gotta warm the audience up for a joke before you serve a sick burn
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 08:33:38 JST
Soatok Dreamseeker
@jalefkowit Let's just call it Mozilla Smokelung
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 07:50:31 JST
Soatok Dreamseeker
@stefenauris Sometimes the content warnings are actually content warmings
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 07:20:14 JST
Soatok Dreamseeker
@o76923 Interesting perspective. So would you consider bluesky a sort of containment zone for folks that cannot escape the habits instilled by recommendation systems?
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 05:56:31 JST
Soatok Dreamseeker
Yeah, Fedi has its problems.
But at least most folks are good about using the CW feature most of the time.
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 05:53:32 JST
Soatok Dreamseeker
The cool thing about bsky being down practically all day is I didn't have to accidentally observe completely untagged content for other people's kinks that squick me, which (due to not being tragged) bypasses my muted word list.
So who's to say if it's good or bad?
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 05:39:23 JST
Soatok Dreamseeker
In conversation from furry.engineer permalink -
Embed this notice
Catalin Cimpanu (campuscodi@mastodon.social)'s status on Friday, 17-Apr-2026 04:24:44 JST
Catalin Cimpanu
No cap... this is actually pretty smart and how IPv6 should have been designed in the first place
Perfectly compatible with the old IPv4 space
In conversation from mastodon.social permalink Repeated by soatok Attachments
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Thursday, 16-Apr-2026 23:55:56 JST
Soatok Dreamseeker
@orsinov @theorangetheme No, I don't think they are
In conversation from furry.engineer permalink -
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Thursday, 16-Apr-2026 15:11:51 JST
Soatok Dreamseeker
lol no https://www.ietf.org/archive/id/draft-thain-ipv8-00.html
In conversation from furry.engineer permalink Attachments
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Wednesday, 15-Apr-2026 05:10:48 JST
Soatok Dreamseeker
@benpate @bluewinds @GroupNebula563 Sure! My signal is soatok.45 if you'd like to coordinate
In conversation from furry.engineer permalink -
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Wednesday, 15-Apr-2026 04:31:26 JST
Soatok Dreamseeker
I guess I should get back to work on that damn key management blog post after all.
In conversation from furry.engineer permalink -
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Wednesday, 15-Apr-2026 04:24:15 JST
Soatok Dreamseeker
@benpate @bluewinds @GroupNebula563 I think you're confused.
The public keys that are rotated frequently are encryption public keys.
The thing I've proposed are for identity public keys.
Using your identity secret key to sign each encryption public key, and having your recipient verify them, is basically a one-liner:
https://github.com/swicg/activitypub-e2ee/issues/35#issuecomment-3738855995
In conversation from furry.engineer permalink -
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Tuesday, 14-Apr-2026 07:47:32 JST
Soatok Dreamseeker
@23n27 That's a threat model- and use case-specific corner case, not the general case.
In conversation from furry.engineer permalink -
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Tuesday, 14-Apr-2026 02:41:45 JST
Soatok Dreamseeker
@chrisvest Algorithm agility will be achieved by "versioned protocols".
The protocol versions will allow only one cryptography algorithm per version.
The implementation details here are whether v1 should remain ed25519 (since this isn't deployed anywhere yet) or mldsa44.
I expect v2 (circa 2030?) will use one of these: https://csrc.nist.gov/projects/pqc-dig-sig/round-2-additional-signatures
In conversation from furry.engineer permalink Attachments
-
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Tuesday, 14-Apr-2026 01:15:29 JST
Soatok Dreamseeker
@ex_06 There's a trade-off between bandwidth and security and I think 44 is the right parameter set for my purposes.
87 is for CNSA 2.0, but I don't listen to the NSA.
In conversation from gnusocial.jp permalink -
Embed this notice
Soatok Dreamseeker (soatok@furry.engineer)'s status on Tuesday, 14-Apr-2026 00:51:21 JST
Soatok Dreamseeker
@dequbed I'm excited for SQISign (or whatever future iteration of it survives NIST)
In conversation from gnusocial.jp permalink