drspod

joined 2 years ago
[–] [email protected] 3 points 2 days ago

Yes sorry, I didn't realize that until I posted it and saw all of the "cross-posted to:" links. It's the first time it's posted to this community though, and I think it's an important topic.

[–] [email protected] 3 points 1 week ago (2 children)

I get why you'd suggest the previous commenter is out of touch with what users want, but what does that have to do with being a software engineer?

[–] [email protected] 13 points 2 weeks ago (2 children)

I've had this one in my images folder for at least a couple of decades. No idea where I saved it from:

[–] [email protected] 5 points 2 weeks ago
[–] [email protected] 10 points 3 weeks ago (1 children)

Anyone who falls for the scam of thinking that you can determine IQ from the genome of an embryo is probably below average themselves.

[–] [email protected] 15 points 3 weeks ago (2 children)

You're just unabashedly supporting eugenics? Is that because you're too young, or too uneducated to know any better?

[–] [email protected] -2 points 3 weeks ago (1 children)

Did you read the article?

[–] [email protected] -3 points 3 weeks ago (3 children)

If you think that I'm misunderstanding something and arguing from a false premise then please feel free to engage with the discussion.

[–] [email protected] 13 points 3 weeks ago (5 children)

I thought passkeys were supposed to be a hardware device?

This is typical embrace/extend/extinguish behavior from the large platforms that don't want their web-SSO hegemony challenged because it would mean less data collection and less vendor lock-in.

The whole idea of passkeys provided by an online platform should have been ruled out by the specification. It completely defeats the purpose of passkeys which is that the user has everything they need to authenticate themself.

[–] [email protected] 22 points 3 weeks ago

They didn't break RSA.

 

cross-posted from: https://lemmy.ml/post/4912712

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

 

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

view more: next ›