vk6flab

joined 6 months ago
[–] [email protected] 2 points 1 day ago

It is again beginning to feel rather dysfunctional..

[–] [email protected] 5 points 2 days ago* (last edited 2 days ago) (3 children)

Perl is the only language that looks just as incomprehensible before and after a rot13 transformation.

Python on the other hand is the only language that will cause your application to stop working because you mixed up tabs and spaces, even though it looks perfectly fine on your scr.

And lisp is hard to say if you have one.

Edit: aa -> after a

[–] [email protected] 11 points 4 days ago (1 children)

We've been using an Apple TV. From memory, there's a Jellyfin client.

[–] [email protected] 48 points 5 days ago* (last edited 5 days ago) (4 children)

Next step: Apple removes hardware from box and ships aspiration only.

[–] [email protected] 11 points 6 days ago

destielmytimelord

tumblr.

Follow

Trying to Explain my Sexuality to my Dad

Me: Okay, so I would identify as bisexual.

Dad: And that means you would have a male partner.

Me: Yep.

Dad: Or a female partner.

Me: Yep.

Dad: And that means you're bi.

Me: Yep.

Dad: So that means if you don't find a partner you're on standbi?

Me:

Me:

Me:

Me: Did you just

#bisexual #lgbtq+ #convo with my dad #conversation #my dad is amazing

236,032 notes

...

[–] [email protected] 7 points 6 days ago

It absolutely is.

It's possibly also how they'll get broken up by the DoJ.

[–] [email protected] 5 points 6 days ago (1 children)

I think that every single provider tracks your activity and the vast majority of them use it to optimise their service income from you, either by giving you better engagement, ie. making you use the service more - endless searching for content for example, or by selling the captured tracking data to the highest bidder.

[–] [email protected] 23 points 6 days ago (13 children)

I experienced this crazy onslaught of advertising to the point of reducing how much I watched YouTube. I was pretty upset and not at all inclined to pay, especially since YouTube was even putting ads on my own videos without me seeing a single cent, because my channel is too small.

Then my partner bought me a few months of a Premium Subscription as a Christmas gift.

It was pointed out to me that I watched more YouTube than any other streaming service which I was paying for.

Combined with background music on mobile, it's changed my life.

I'm still unimpressed with the business model, but the alternative is so far worse.

Find me a self publishing video platform with the reach of YouTube that doesn't require self hosting and I'll happily move my content there.

[–] [email protected] 4 points 1 week ago

You could use a cron job to grep through the file and reformat the output into a webpage, markdown, or plain-text file.

[–] [email protected] 25 points 1 week ago

Reddit support to the rescue..

[–] [email protected] 1 points 1 week ago (1 children)

It's really simple to use, and markdown is essentially plain text.

 

A cookie notice that seeks permission to share your details with "848 of our partners" and "actively scan device details for identification".

 

How are you storing passwords and 2FA keys that proliferate across every conceivable online service these days?

What made you choose that solution and have you considered what would happen in life altering situations like, hardware failure, theft, fire, divorce, death?

If you're using an online solution, has it been hacked and how did that impact you?

 

There is a growing trend where organisations are strictly limiting the amount of information that they disclose in relation to a data breach. Linked is an ongoing example of such a drip feed of PR friendly motherhood statements.

As an ICT professional with 40 years experience, I'm aware that there's a massive gap between disclosing how something was compromised, versus what data was exfiltrated.

For example, the fact that the linked organisation disclosed that their VoIP phone system was affected points to a significant breach, but there is no disclosure in relation to what personal information was affected.

For example, that particular organisation also has the global headquarters of a different organisation in their building, and has, at least in the past, had common office bearers. Was any data in that organisation affected?

My question is this:

What should be disclosed and what might come as a post mortem after systems have been secured restored?

26
submitted 5 months ago* (last edited 5 months ago) by [email protected] to c/[email protected]
 

U2F keys can be purchased online for the price of a cup of coffee. They're being touted as the next best thing in online security authentication.

How do you know that the key that arrives at your doorstep is unique and doesn't produce predictable or known output?

There's plenty of opportunities for this to occur with online repositories with source code and build instructions.

Price of manufacturing is so low that anyone can make a key for a couple of dollars. Sending out the same key to everyone seems like a viable attack vector for anyone who wants to spend some effort into getting access to places protected by a U2F key.

Why, or how, do you trust such a key?

The recent XZ experience shows us that the long game is clearly not an issue for some of this activity.

view more: next ›