observantTrapezium

  • 18 Posts
  • 348 Comments
Joined 3 years ago
cake
Cake day: June 30th, 2023

help-circle








  • My boss’s mom was on the MS St. Louis, and came to Canada eventually many decades later.

    And my phone bill is CA$19/month in the most populous city in the country (Public Mobile, I think I have 1 GB a month that I never get remotely close to using up, unlimited calls and texts). I know that by international standards $19 should get me more than 1 GB, but just putting things in perspective.


  • I would love closer ties, even very close like customs union and freedom of movement. Also personally I’m not attached to the Canadian dollar, and if it made economic sense to replace it with the Euro I wouldn’t mind.

    I’m not sure what a “European Republic” would entail. I assume that means that a lot more issues will come under the responsibility of EU institutions such as the EP, as opposed to local governments. Canada is big enough as it is, and people often complain (rightfully or not) about bad decisions made in far-away Ottawa. I think Canadians won’t like to delegate a significant chunk of our sovereignty to Brussels.

    And anyway as you pointed out the EU is far from perfect. What bothers me the most is the frequent need for unanimity and the ability of small countries like Hungary to block fairly routine decisions about spending. In Canada unanimous consent is required only to depose the King or something like that.









  • The fundamental difference between GPG encryption and encrypted partition is that of asymmetric vs. symmetric encryption. Whether you mount encrypted storage or decrypt a file with GPG, there’s some “effort” in putting in the passphrase and in both cases the system’s keyring is briefly aware of it and the plaintext is saved to memory (volatile, unless you have encrypted swap or other edge cases).

    Asymmetric encryption is not normally used for personal stuff but mostly to exchange material with one party holding the private key, and other having access to the public key (which is public). Of course you can act as both parties if you like. If you do, keep in mind:

    1. Asymmetric encryption algorithms may be vulnerable to quantum computing attacks in the coming years. There are quantum-resistant algorithms, but to my understanding they are not necessarily quantum-proof and could potentially be broken in the more distant future.
    2. If you do choose to use GPG, make sure that the plaintext never touches the disk, for example save it to /dev/shm before encryption.
    3. You can also protect your private key with a passphrase.

    Personally I use Joplin. On the clients it’s secure because the database is saved on encrypted storage secured by my login phrase. On the server it’s secure by Joplin encrypting the files saved to WebDAV storage. Is it 100% safe? Probably not, but probably good enough to stop all but a nation-state level actor.