suicidaleggroll

joined 3 weeks ago
[–] [email protected] 3 points 4 days ago

Pretty sure the country of origin for Apple products isn’t the US anyway. They’d be coming from China, India, etc. Reciprocal tariffs on the US should have no effect on Apple products sold in other countries.

[–] [email protected] 38 points 4 days ago* (last edited 4 days ago) (3 children)

I mean, you're not wrong, but the same applies to all phone manufacturers. Samsung, Pixel, etc. are going to see similar price hikes due to tariffs in the US, and a similar drop in demand in China as the population there moves to Chinese manufacturers. I'm not sure why you're singling out Apple.

[–] [email protected] 5 points 5 days ago* (last edited 5 days ago)

Main reason is that if you don't already have the right key, VPN doesn't even respond, it's just a black hole where all packets get dropped. SSH on the other hand will respond whether or not you have a password or a key, which lets the attacker know that there's something there listening.

That's not to say SSH is insecure, I think it's fine to expose once you take some basic steps to lock it down, just answering the question.

[–] [email protected] 3 points 5 days ago* (last edited 5 days ago)

Some people move the port to a nonstandard one, but that only helps with automated scanners not determined attackers.

While true, cleaning up your logs such that you can actually see a determined attacker rather than it just getting buried in the noise is still worthwhile.

[–] [email protected] 4 points 6 days ago

Reverse proxy + DNS-challenge wildcard cert for your domain. The end. Super easy to set up and zero maintenance. Adding a new service is just a couple clicks in your reverse proxy and you’re done.

[–] [email protected] 7 points 1 week ago* (last edited 1 week ago) (3 children)

Yes at a cursory glance that's true. AI generated images don't involve the abuse of children, that's great. The problem is what the follow-on effects of this is. What's to stop actual child abusers from just photoshopping a 6th finger onto their images and then claiming that it's AI generated?

AI image generation is getting absurdly good now, nearly indistinguishable from actual pictures. By the end of the year I suspect they will be truly indistinguishable. When that happens, how do you tell which images are AI generated and which are real? How do you know who is peddling real CP and who isn't if AI-generated CP is legal?

[–] [email protected] 9 points 1 week ago

It wouldn't matter. The public doesn't listen directly to politicians, it gets filtered through the media first, and the media picks and chooses which parts they actually report. The people who would actually hear this already know. The people who would need to hear it never will because Fox won't show it to them.

[–] [email protected] 22 points 1 week ago* (last edited 1 week ago) (3 children)

The complaint isn’t about the colon in OP’s image, it’s the colon in OP’s explanation.

OP complaining about an insignificant capitalization mistake in a Twitter post, while making a far more egregious grammatical error in their explanation is just...*chef's kiss*

[–] [email protected] 3 points 1 week ago* (last edited 1 week ago)

I don't understand why everything isn't just rated in Wh or mWh. It gives them a bigger number to advertise and it's voltage-independent. Sure there are load-dependent conversion efficiencies that complicate things a bit, but nobody is going to get up in arms about a 5% deviation from the advertised spec due to less than ideal conversion efficiency. Compared to trying to figure out how many recharge cycles I'll get on my 5000mAh laptop battery from my 20000mAh power bank (what voltage is that laptop battery running at again?) a 5% efficiency drop is a big nothing burger.

[–] [email protected] 3 points 1 week ago* (last edited 1 week ago) (1 children)

Yes, and Bitwarden+SimpleLogin. Bitwarden to keep track of login info including the alias that is used for that site. SimpleLogin is where the aliasing is actually handled, they have a decent UI for enabling/disabling or generating reverse aliases (for outgoing emails) when needed.

It does take a little more effort to manage it, but it’s worth the payoff. I’ve been using this setup for about 9 months now and I finally got my first spam email a week ago. I looked at the address it was sent to, it was an alias I used at a site I ordered something from about 6 months ago. I sent them a message letting them know that either someone at their company is selling customer info to scammers or their database has been leaked, then I shut off the alias. No more spam.

[–] [email protected] 0 points 2 weeks ago

it gives people the option to use an alternate app store if they want but it doesn’t force anyone to.

That argument sounds great in theory, but would break down after a month or less, when companies start moving their apps off of Apple’s App Store and onto a 3rd party store that allows all the spyware Apple has forced them to remove if they want to have an iOS market. This move DOES force people to use alternate app stores when companies start moving (not copying, moving) their apps over to said stores to take advantage of the drop in oversight.

view more: next ›