• 2 Posts
  • 50 Comments
Joined 7 months ago
cake
Cake day: January 22nd, 2024

help-circle
  • That makes sense, thanks again! I think dynamic dispatch is not as much of a performance issue in my case, yet you’re totally right not to waste resources that aren’t actually needed. Keeping things on the stack if possible is also a good thing.

    I’ll definitely need to read more about Rusts type system but your explanation was already very helpful! I think this might be why my initial approach felt unnatural - it works but is quite cumbersome and with generics there seems to be a more elegant approach.







  • I’m able to speak German (native speaker) and English (fluent).


    Also, as a German speaker, I’d like to correct the question in the post:

    Formal would be “Welche Sprachen sprechen Sie?”.

    More fitting for a casual environment (such as Lemmy) would be “Welche Sprachen sprecht Ihr?” though :)

    This is, because in German there are formal and informal ways of addressing people, both with their distinctive pronouns. Usually, when talking to people you don’t know personally, you’ll address them formally and then, when offered to, switch to the informal style once you know them. Online or among the younger generation it is much more common to just use the informal case though.













  • First of all:

    You can always copy storage if you’re able to physically access it. The only way to prevent this is to secure the chip in a way it destroys itself if physically tampered with (like some TPM chips).

    You should instead opt for a passphrase that is practically impossible to bruteforce on current hardware due to its complexity. Also, try not to disclose the encryption algorithm or software used as this information opens the possibility of exploiting known vulnerabilities.

    VeraCrypt for example is able to completely hide its presence on a volume and the only way to know if a device is encrypted with it is trying to decrypt it using VeraCrypt with the correct passphrase.


    Trying to answer your questions:

    1. Most modern smartphones encrypt their data by default nowadays. The rest depends on the phone itself. Mostly they just delete the encryption keys from the TPM when formatted so this still enables an authority to copy your storage and bruteforce.

    2. No. Encryption does never prevent you from copying the encrypted information. Those are two completely different things.

    3. No. You cannot encrypt the SD card with say Bitlocker and use it on a phone afaik.

    4. Yes, some Androids allow you to encrypt the SD card from within the storage settings.



  • Thanks for sharing, actually this very project inspired me to do it myself. It is an incredible resource when it comes to certain aspects of the database format!

    Imho it has some deeper architectural issues though which I wanted to avoid in my implementation. I’m also using an entirely different tech stack I wanted to train myself in.

    My implementation is not as feature complete as osxphotos but I’m sure I will be able to contribute back to the project with the occasional bug fix.