GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Soatok Dreamseeker (soatok@furry.engineer), page 2

  1. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 22:09:32 JST Soatok Dreamseeker Soatok Dreamseeker
    • Tony “Abolish ICE” Arcieri🌹🦀

    @tael @bascule I'm confident Tony knows this lol

    In conversation about 6 days ago from furry.engineer permalink
  2. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 20:07:42 JST Soatok Dreamseeker Soatok Dreamseeker

    @ariarhythmic I've written about this before lol

    In conversation about 6 days ago from furry.engineer permalink
  3. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 15:05:40 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • Sophie Schmieg

    @sophieschmieg And I insist on them accounting for ML-DSA-87, because CNSA 2.0 :P

    In conversation about 6 days ago from gnusocial.jp permalink
  4. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 15:01:53 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • Stefen Auris 🖖​

    @stefenauris You gotta warm the audience up for a joke before you serve a sick burn

    In conversation about 6 days ago from furry.engineer permalink
  5. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 08:33:38 JST Soatok Dreamseeker Soatok Dreamseeker

    @jalefkowit Let's just call it Mozilla Smokelung

    In conversation about 6 days ago from furry.engineer permalink
  6. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 07:50:31 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • Stefen Auris 🖖​

    @stefenauris Sometimes the content warnings are actually content warmings

    In conversation about 6 days ago from furry.engineer permalink
  7. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 07:20:14 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • James Endicott

    @o76923 Interesting perspective. So would you consider bluesky a sort of containment zone for folks that cannot escape the habits instilled by recommendation systems?

    In conversation about 6 days ago from furry.engineer permalink
  8. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 05:56:31 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to

    Yeah, Fedi has its problems.

    But at least most folks are good about using the CW feature most of the time.

    In conversation about 7 days ago from furry.engineer permalink
  9. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 05:53:32 JST Soatok Dreamseeker Soatok Dreamseeker

    The cool thing about bsky being down practically all day is I didn't have to accidentally observe completely untagged content for other people's kinks that squick me, which (due to not being tragged) bypasses my muted word list.

    So who's to say if it's good or bad?

    In conversation about 7 days ago from furry.engineer permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: list.So
      http://list.So/
      도메인, 도메인등록, 퀵돔등록, 도메인연장, 도메인이전, 무료 파킹, 무료포워딩 제공, 국내 최저가 도메인 서비스 제공, 웹호스팅, 서버호스팅, 홈페이지제작, 쇼핑몰, 서버, IDC
  10. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Friday, 17-Apr-2026 05:39:23 JST Soatok Dreamseeker Soatok Dreamseeker

    @kirtai @pq1r idk, I like IPv6 shrug

    In conversation about 7 days ago from furry.engineer permalink
  11. Embed this notice
    Catalin Cimpanu (campuscodi@mastodon.social)'s status on Friday, 17-Apr-2026 04:24:44 JST Catalin Cimpanu Catalin Cimpanu
    in reply to

    No cap... this is actually pretty smart and how IPv6 should have been designed in the first place

    Perfectly compatible with the old IPv4 space

    In conversation about 7 days ago from mastodon.social permalink Repeated by soatok

    Attachments


    1. https://files.mastodon.social/media_attachments/files/116/416/012/353/908/205/original/ffc4bf041e429825.png
  12. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Thursday, 16-Apr-2026 23:55:56 JST Soatok Dreamseeker Soatok Dreamseeker
    • [Yaseenist] Nikola Orsinov [Joseph Grimaldi]

    @orsinov @theorangetheme No, I don't think they are

    In conversation about 7 days ago from furry.engineer permalink
  13. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Thursday, 16-Apr-2026 15:11:51 JST Soatok Dreamseeker Soatok Dreamseeker

    lol no https://www.ietf.org/archive/id/draft-thain-ipv8-00.html

    In conversation about 7 days ago from furry.engineer permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Internet Protocol Version 8 (IPv8)
      from Jamie Thain
      Internet Protocol Version 8 (IPv8) is a managed network protocol suite that transforms how networks of every scale -- from home networks to the global internet -- are operated, secured, and monitored. Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens served from a local cache. Every service a device requires is delivered in a single DHCP8 lease response. Every packet transiting to the internet is validated at egress against a DNS8 lookup and a WHOIS8 registered active route. Network telemetry, authentication, name resolution, time synchronisation, access control, and translation are unified into a single coherent Zone Server platform. IPv4 is a proper subset of IPv8. An IPv8 address with the routing prefix field set to zero is an IPv4 address. No existing device, application, or network requires modification. The suite is 100% backward compatible. There is no flag day and no forced migration at any layer. IPv8 also resolves IPv4 address exhaustion. Each Autonomous System Number (ASN) holder receives 4,294,967,296 host addresses. The global routing table is structurally bounded at one entry per ASN. This document is one of the companion specifications: draft-thain-ipv8-00 Core protocol (this document) draft-thain-routing-protocols-00 BGP8, IBGP8, OSPF8, IS-IS8, CF draft-thain-rine-00 Regional Inter-Network Exchange draft-thain-zoneserver-00 Zone Server Architecture draft-thain-whois8-00 WHOIS8 Protocol draft-thain-netlog8-00 NetLog8 Protocol draft-thain-support8-00 ARP8, ICMPv8, Route8 draft-thain-ipv8-mib-00 IPv8 MIB and SNMPv8 draft-thain-wifi8-00 WiFi8 Protocol draft-thain-update8-00 Update8 and NIC Certification
  14. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Wednesday, 15-Apr-2026 05:10:48 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • Ben Pate 🤘🏻
    • BlueWinds
    • Furbland's Very Cool Mastodon™

    @benpate @bluewinds @GroupNebula563 Sure! My signal is soatok.45 if you'd like to coordinate

    In conversation about 9 days ago from furry.engineer permalink
  15. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Wednesday, 15-Apr-2026 04:31:26 JST Soatok Dreamseeker Soatok Dreamseeker

    I guess I should get back to work on that damn key management blog post after all.

    In conversation about 9 days ago from furry.engineer permalink
  16. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Wednesday, 15-Apr-2026 04:24:15 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • Ben Pate 🤘🏻
    • BlueWinds
    • Furbland's Very Cool Mastodon™

    @benpate @bluewinds @GroupNebula563 I think you're confused.

    The public keys that are rotated frequently are encryption public keys.

    The thing I've proposed are for identity public keys.

    Using your identity secret key to sign each encryption public key, and having your recipient verify them, is basically a one-liner:

    https://github.com/swicg/activitypub-e2ee/issues/35#issuecomment-3738855995

    In conversation about 9 days ago from furry.engineer permalink
  17. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Tuesday, 14-Apr-2026 07:47:32 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • 23n27

    @23n27 That's a threat model- and use case-specific corner case, not the general case.

    In conversation about 9 days ago from furry.engineer permalink
  18. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Tuesday, 14-Apr-2026 02:41:45 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • Chris

    @chrisvest Algorithm agility will be achieved by "versioned protocols".

    The protocol versions will allow only one cryptography algorithm per version.

    The implementation details here are whether v1 should remain ed25519 (since this isn't deployed anywhere yet) or mldsa44.

    I expect v2 (circa 2030?) will use one of these: https://csrc.nist.gov/projects/pqc-dig-sig/round-2-additional-signatures

    In conversation about 10 days ago from furry.engineer permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Round 2 Additional Signatures - Post-Quantum Cryptography: Additional Digital Signature Schemes | CSRC | CSRC
      Official comments on the Second Round Candidates should be submitted using the 'Submit Comment' link for the appropriate algorithm. Comments from the pqc-forum Google group subscribers will also be forwarded to the pqc-forum Google group list. We will periodically post and update the comments received to the appropriate algorithm. All relevant comments will be posted in their entirety and should not include PII information in the body of the email message. Please refrain from using OFFICIAL COMMENT to ask administrative questions, which should be sent to pqc-comments@nist.gov. The rationale for choosing the Round 2 Candidates is described in NIST IR 8528, Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process History of Round 2 Updates   Code-based Signatures Algorithm Algorithm Information Submitters Comments CROSS Codes and Restricted Objects Signature Scheme Specification...
  19. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Tuesday, 14-Apr-2026 01:15:29 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • ex_06

    @ex_06 There's a trade-off between bandwidth and security and I think 44 is the right parameter set for my purposes.

    87 is for CNSA 2.0, but I don't listen to the NSA.

    In conversation about 10 days ago from gnusocial.jp permalink
  20. Embed this notice
    Soatok Dreamseeker (soatok@furry.engineer)'s status on Tuesday, 14-Apr-2026 00:51:21 JST Soatok Dreamseeker Soatok Dreamseeker
    in reply to
    • nadja

    @dequbed I'm excited for SQISign (or whatever future iteration of it survives NIST)

    In conversation about 10 days ago from gnusocial.jp permalink
  • After
  • Before

User actions

    Soatok Dreamseeker

    Soatok Dreamseeker

    He/him. Gay/demi dhole (Cuon Alpinus) furry.Blogger, programmer, security engineer, cryptography nerd. 30+Too spicy for Twitter (banned with all the prominent journalists on 2022-12-16)I don't represent any company, individual, or community.

    Tags
    • (None)

    Following 0

      Followers 1

      • GNU Too

      Groups 0

        Statistics

        User ID
        34725
        Member since
        21 Nov 2022
        Notices
        1340
        Daily average
        1

        Feeds

        • Atom
        • Help
        • About
        • FAQ
        • TOS
        • Privacy
        • Source
        • Version
        • Contact

        GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

        Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.