BuoyantCitrus

joined 2 years ago
[–] BuoyantCitrus@lemmy.ca 18 points 3 weeks ago

And we're happy to cooperate by signing our own version of that into law since there's an underlying treaty behind this warrantless data sharing: https://citizenlab.ca/2025/06/a-preliminary-analysis-of-bill-c-2/

I hope we can find a way to fulfill our treaty obligations with something that's not as terrible as the current one: https://www.michaelgeist.ca/2025/06/lawful-access-on-steroids/

[–] BuoyantCitrus@lemmy.ca 2 points 3 weeks ago

I'm not talking about the overall price of coffee, that's merely what caused me to think about the tariff affecting us via intermediaries thanks to Subtext's unusual level of transparency in disclosing it. I would have assumed tariffs wouldn't apply and found it interesting that, while sorta true in theory, in reality it may not be practical for small scale shipments. This roaster buys direct much of the time also, you can try their stuff without supporting Americans.

[–] BuoyantCitrus@lemmy.ca 5 points 3 weeks ago

This is from my favourite small roaster in my Canadian city. They're one of the only ones that give this kind of detail, almost all others I would have had no idea any Americans were involved in the process and might have bought these without realising as you undoubtedly buy from Canadian businesses with some US suppliers. Which is why I figured it might be an interesting topic for a post.

[–] BuoyantCitrus@lemmy.ca 8 points 3 weeks ago (1 children)

Sure, and this is a Canadian company roasting Ethiopian beans (as far as I know we don't grow coffee). There are many things we don't make here and even for those we do the supply chain likely intersects with the US.

Another example this had me thinking about is close to your goals: a Canadian baker making bread from Canadian wheat might use a mixer or an oven or whatever as part of that where the only way to get parts is from a US distributor because it's too niche a thing to have a Canadian presence.

 

While perusing some coffee to buy from my favourite roaster that also is extremely transparent about pricing, this caught my eye:

$7.35 USD per lb including $0.65 USD per lb "reciprocal" tariff placed on Ethiopian imports. * This coffee entered the US before being imported into Canada.

Hm. Seems the niche importer they worked with to access these particular beans was American. Since we're a small market, I suspect this kind of thing is going to be happening a lot.

I got an initial take from an LLM and apparently the company importing from Ethiopia and re-exporting to Subtext is eligible for a refund on the duty (a "drawback") but a big, um, drawback of that is that it's fairly onerous:

  • Many importers use a drawback specialist or broker because the paperwork is complex; fees are usually contingency-based (e.g. 20–30% of the recovered duty).
  • For small, irregular shipments, filing costs often outweigh the refund, so many small importers simply don’t bother.
  • For large distributors or commodities with steady re-export flows, drawback is routine and worthwhile.

Curious if anyone has similar anecdotes or run across an attempt to quantify this sort of trade flow and effect of US tariffs? I wonder if the impact of this across every little thing adds up to a meaningful amount of inflation?

[–] BuoyantCitrus@lemmy.ca 3 points 3 weeks ago

I would be astonished if VPNs were allowed to continue if they actually succeed in identity-gating everything. eg. that's next. Best we can do is keep talking about it, help people understand what's happening.

[–] BuoyantCitrus@lemmy.ca 3 points 3 weeks ago

Canada's version is currently hanging out in the Senate: https://www.parl.ca/legisinfo/en/bill/45-1/s-209

Here's some background and detailed analysis about it:
https://www.youtube.com/watch?v=cBJe3gB2Po4
https://www.michaelgeist.ca/2025/05/herewegoagain/

And yeah C-2 is also bad. As you point out, these sorts of things are often coordinated and some of that is at least documented in the form of treaties. That was really not made clear in the case of C-2 but it very much is:

Given significant democratic, public interest, and human rights implications of Canada’s potential agreement to a data-sharing framework with foreign authorities in the United States and/or elsewhere, it is surprising that the federal government is now quietly introducing the powers necessary to ratify the 2AP, without making this intent explicit to the broader public when it introduced Bill C-2.

https://citizenlab.ca/2025/06/a-preliminary-analysis-of-bill-c-2/

[–] BuoyantCitrus@lemmy.ca 9 points 1 month ago (3 children)

they likely have the capability to trivially decrypt TLS

Whoa. Anywhere to read more about this? Had not been paying close attention, didn't realise that was so starkly the case.

 

Two parts that stuck out for me were:

"There's no hiding from it. They can turn your phone into a camera. They can turn it into a microphone. You can turn the power off, they can still use the device. It's the most intrusive thing that exists in the world today."

and

He also learned from the April 2023 affidavit that the RCMP had ordered an ODIT on his union phone during the time he was engaged in collective bargaining conversations that year. He says this breached not only his privacy, but the privacy of some 19,000 union members.

 

It's concerning what a few billionaires are doing but there are way more of us so if everyone is doing small things it can add up.

One easy one is noticing where businesses you deal with get their boxes. My favourite coffee roastery used to use Uline boxes but is switching suppliers after they learned the back story on those guys: https://www.propublica.org/article/uline-uihlein-election-denial

What are some other small ways you've found to push back on the attempted coup of our southern neighbour?

 

I've blithely assumed that backups / snapshots of my home dir (including my Thunderbird profile) were covering my email. But it occurs to me it may be more difficult than expected.

I have message synchronization on for any folders I care about ("for offline use"). What I was assuming this meant was that if my mail host disappeared or mysteriously deleted an important folder, I would still be able to switch to a backup, start TB in offline mode (via a commandline parameter), and copy those folders to a local folder at which point I could reconnect and drag them back to my new host, a local imapd I use as an archive, or wherever.

But ...would that actually work? Anyone recover email from offline folders? How'd that go?


Edit:

Well, there can never be too many reminders to verify our backups and I'm all for that but that's less what I was after. I was specifically thinking about the scenario when an IMAP host somehow loses an important folder or disappears entirely. How would it go to recover from a sync'd folder in tb? What caveats would there be? Would attachments show up?

But ya, this post was silly, it's easy enough to try. Yes it works, yes the attachments come with. No major issues in my limited test.

However, I did learn one annoying thing: there is no command line option to start Thunderbird in offline mode. So in the case where the folder was deleted on IMAP I'd either have to:

  • disconnect from the network before running the app
  • quickly toggle offline before it finishes connecting and deleting the folder
  • use the pref to prompt if you want to go online every time you start

I think for as rare a scenario as this is it's fine to just disconnect but I'm a bit surprised it really doesn't seem to have a flag for it.

 

I know it's my fault for believing what my neglected laptop told me about its battery but I went ahead an did a kernel update anyway and wound up needing to repair my system.

After a quick search I wound up on https://wiki.debian.org/GrubEFIReinstallOnLUKS per usual.

The biggest hassle of this is having to type out the longish for loop to bind the various vfs to the chroot environment. It was bad enough when it was proc/sys/dev but it's worse these days:

for i in /dev /dev/pts /proc /sys /sys/firmware/efi/efivars /run; do sudo mount -B $i /mnt$i; done

I realise there are various things that'd automate that if I connected the rescue image to the internet and added a package but that's also hassles as I've really just booted it with the express purpose of reinstalling grub.

But maybe there is already some form of shortcut for this in the system that I've missed? Or some existing ticket/effort to enact one I could +1?

 

My Keychron Q11 showed up recently and I've been super happy with it. Main reason was that my Noppoo Choc Mini finally lost a switch and I don't have any on hand (nor a soldering iron ...yet) but it turns out I actually really wanted the pair of rotary encoders on this and didn't even realise.

Specifically, I've got it bound to Ctrl-PgUp/PgDown so I can scroll through my tabs with it and close them with a click binding to Ctrl-W and that's working out really well.

Anyone else use the knobs like that? I've got the other one set to volume and the vendor had zoom as a suggestion but I wonder what else people do with these?


Bonus newb Q: On the product page they demonstrate binding Ctrl-+ zooming to the encoder via a macro but neither macro13 nor the {KC_LCTL,KC-W} type syntax would let me click "Confirm" when trying to associate it to the knob in Via (eg. it wouldn't let me follow their example). Luckily it was happy with the alternative of LCTL(KC_W) that I stumbled on somewhere but now I wonder how to properly associate a macro to a knob?

 

Last time I needed to add rf to a desktop, Intel AX200 seemed like the chipset to get. But now there are various new standards and the BE200 apparently has issues with AMD systems? So is there something newish from Qualcomm or others that I should be aiming for or would I probably be better off just picking up an AX210?

Since the card might be kicking around a while I'm curious what has the best overall Linux support with as many significant 802.11 standards and Bluetooth codecs as possible for general future-proof-ness. Would also be nice if it had good support for AP mode as that's sometimes handy or I might repurpose it into a router at some point.

[–] BuoyantCitrus@lemmy.ca 2 points 1 year ago (1 children)

One thing that would be useful to understand is the distinction between CMR and SMR

[–] BuoyantCitrus@lemmy.ca 10 points 1 year ago* (last edited 1 year ago) (1 children)

I got a nice deal on the x280 and am happy with it, was also looking at the various X1 carbon. Two criteria I had were I wanted USB-C charging (since I have those chargers around and they can handle these laptops) and a single battery (eg. the T470s I have from work is nice but it has two small capacity batteries that each cost the same to replace as the full size single ones in the carbon and x280). One thing to keep in mind is some of the earlier X1 carbon don't support NVME SSD (I think it started with 5th gen?)

Edit: another thing to consider is soldered RAM. Part of why my x280 was cheap was it's only 8gb and can't be upgraded. Since you're looking at lighter weight things and using FOSS (and perhaps open to tinkering with things like ZRAM) that might be a useful aspect to focus on because there is probably a glut of such machines given how memory inefficient things are lately with every trivial app running a whole browser engine. OTOH, depending how many tabs you tend to have open and how many electron apps you tend to keep floating around, 8gb might start to feel cramped. Especially if you think you might want some VMs around.

[–] BuoyantCitrus@lemmy.ca 2 points 2 years ago (1 children)

Next time I look for a small laptop to have handy one thing I'm going to be sure to prioritise is: how much battery does it use while suspended? I'd really like to not need to have it switch to hibernate after 30m of sleep or w/e and ideally just plug it in overnight like a phone.

 

Apparently, while it's closed for new donations, liberapay is still going to renew existing ones.

 

cross-posted from: https://lemmy.ca/post/1926125

Too many perfectly usable phones are put into a questionable security situation by lack of vendor support for keeping key software up to date.

But what's the actual risk of using an Android phone on a stock ROM without updates? What's the attack surface?

It seems like most things that'd contact potentially malicious software are web and messaging software, but that's all done by apps which continue to receive updates (at least until the android version is entirely unsupported) eg. Webview, Firefox, Signal, etc.

So are the main avenues for attack then sketchy apps and wifi points? If one is careful to use a minimal set of widely scrutinised apps and avoid connecting to wifi/bluetooth/etc. devices of questionable provenance is it really taking that much of a risk to continue using a device past EOL?

Or do browsers rely on system libraries that have plausible attack vectors? Perhaps images, video, font etc. rendering could be compromised? At this point though, that stack must be quite hardened and mature, it'd be major news for libjpg/ffmpeg to have a code-execution vulnerability? Plus it seems unlikely that they wouldn't just include this in webview/Firefox as there must surely be millions of devices in this situation so why not take the easy step of distributing a bit more in the APK?

I'm not at all an Android developer though, perhaps this is very naive and I'm missing something major?

 

Too many perfectly usable phones are put into a questionable security situation by lack of vendor support for keeping key software up to date.

But what's the actual risk of using an Android phone on a stock ROM without updates? What's the attack surface?

It seems like most things that'd contact potentially malicious software are web and messaging software, but that's all done by apps which continue to receive updates (at least until the android version is entirely unsupported) eg. Webview, Firefox, Signal, etc.

So are the main avenues for attack then sketchy apps and wifi points? If one is careful to use a minimal set of widely scrutinised apps and avoid connecting to wifi/bluetooth/etc. devices of questionable provenance is it really taking that much of a risk to continue using a device past EOL?

Or do browsers rely on system libraries that have plausible attack vectors? Perhaps images, video, font etc. rendering could be compromised? At this point though, that stack must be quite hardened and mature, it'd be major news for libjpg/ffmpeg to have a code-execution vulnerability? Plus it seems unlikely that they wouldn't just include this in webview/Firefox as there must surely be millions of devices in this situation so why not take the easy step of distributing a bit more in the APK?

I'm not at all an Android developer though, perhaps this is very naive and I'm missing something major?

view more: next ›