avidamoeba

joined 1 year ago
[โ€“] [email protected] 3 points 1 year ago (1 children)

Now where do new vulnerabilities come from? ๐Ÿค” Oh that's right - from new code. And how often does new code show up on Arch? Oh..

[โ€“] [email protected] 1 points 1 year ago

Right. So they could store them encrypted this way but they still have the opportunity to copy them at the intake point as you suggest. All of this make sense and I agree it's probably the closest you can get to E2E with email without employing some OTG encryption that both sender and receiver participate in. Thanks for the musings!

[โ€“] [email protected] 5 points 1 year ago

No. You can use the firing to purge the lowest performers (or others you don't like) while you're hiring at the same time, with stricter requirements. You might even be able to get new people at a discount since you just flooded the market with people looking for jobs.

[โ€“] [email protected] 2 points 1 year ago (3 children)

Err how is mail E2E encrypted when mail isn't typically E2E encrypted? It has to reach a mailbox. If that mailbox isn't on your computer, then it's on Proton's.

[โ€“] [email protected] 12 points 1 year ago (1 children)

Pixel, Fairphone, Xperia

[โ€“] [email protected] 4 points 1 year ago

The ones I've used that trickled into my family:

  • OG Pixel XL, alive, retired
  • 3 XL, alive, in active use
  • 3a XL, alive, in active use
  • 5, alive in active use
  • 6a, alive in active use
  • 6 Pro, alive in active use

I'm debating between Fairphone 5 and a Pixel 8 Pro for my next. It depends on FP5's camera performance and it's frequency band allocation for Canada, as well as Pixel 8 Pro's battery performance. I could keep my 6 Pro too as it works flawlessly.

[โ€“] [email protected] 6 points 1 year ago

This possibility among others lies firmly within my statement. โ™ฅ๏ธ

[โ€“] [email protected] 4 points 1 year ago (3 children)

You are your worst enemy.

[โ€“] [email protected] 6 points 1 year ago (3 children)

This is not exactly true but it mostly is. Check the transistor and laser for some counterexamples. The sampling theorem was also discovered at Bell Labs.

[โ€“] [email protected] 1 points 1 year ago

Docker, Jenkins, Docker-in-Docker (dind)

[โ€“] [email protected] 1 points 1 year ago* (last edited 1 year ago)

Yeah, and I don't buy the argument. It only works if the players haven't figured out they have conmon goals and that they have to pool resources to achieve them. That's not a hard thing to figure out. The tendency to cartelization demonstrates this. But cartelization only demonstrates that people can figure out they need to pool resources. They don't need a cartel to pool money and funnel them into politicians pockets. All they need is industry lobbying associations and think tanks. Wouldn't you know it, we have both and they're working splendidly to further the regulatory interests of the corporations funding them. That competing parties won't be able to do this seems like wishful thinking to me. That tech couldn't do it during the Napster days I think is rather circumstantial and evidence for the people running those companies not having their shit together. Which makes sense given their age at the time.

[โ€“] [email protected] 10 points 1 year ago* (last edited 1 year ago) (6 children)

A small wrinkle, industries seem to have little issue with acting collectively to spend cash on enacting policies that benefit those industries. For example, the oil industry has successfully blocked climate change action for decades even after they knew an action was needed. Perhaps they're not as powerful as Standard Oil but they surely are powerful enough to profit maximize at the expense of so much else.

Put differently, if the breakup of monopolistic industries in the first half of last century produced a virtuous cycle, which supposes some durability, why do we find ourselves with virtually the same problem today?

view more: โ€น prev next โ€บ