Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)I
Posts
0
Comments
198
Joined
3 yr. ago

  • I use it for providing a text summary of YouTube videos that I can parse quickly. Because everything has to be a gorram video these days.

  • Or at least mark it NSFW. 😅

  • This almost describes mine and my wife's experience to a tee.

    I feel bad for anyone trying to date online in this enshittified world today.

  • Yeah I was terrified of the headline at first, but after reading the article came to the same basic conclusion as you.

    At first I thought they were going to find a way to trade our 401(k)s without our consent like the mortgage-backed securities from pre-2008.

  • You can order it dipped, wet, or dry. Wet is the traditional so it usually just has one or two ladles of juice poured over it. Dipped is when they dunk the whole thing. But the bread is high quality so it can usually take it. I prefer wet myself (hehe).

  • Probably the 9950x3d. And we've known for a while now that the cache would only be on one CCD.

  • Yeah you really need a password or TPM PIN protector to protect from cold boot attacks if that is in your threat model.

  • Bitlocker is extra vulberable because it stores the key in the TPM and requires no password to boot. An attacker can extract the key even if the computer is off when they get it.

    This is not true.

    You would additionally need to bypass Secure Boot with a separate exploit such as the one in this article (which is mitigated by disabling USB boot) or LogoFAIL to put the TPM PCRs in a state where the keys can be released.

    LUKS2 is no different here as either can be TPM-only or require a separate PIN.

  • Linux on enterprise user endpoints is an insane proposition for most organizations.

    You clearly have no experience managing thousands of endpoints securely.

  • An SSO-like payment system with tracking and revocation is a great idea and would be amazing for us consumers. I'm just not holding my breath waiting for the corpos to implement it.

    While nowhere near perfect (far from it, really), as long as the sites you are shopping on are PCI-compliant (most should be), you don't have to worry too much about a compromised site leaking your payment details for use elsewhere.

    Basically just use a password manager and don't worry about saving credit card (NOT debit card) details in the site as long as they aren't extra-sketchy.

  • Same here. Sometimes the same/next day shipping can help in an emergency, but otherwise it's local if possible, or direct from the vendor if not.

    Amazon's shipping has declined and everyone else's has caught up to the point it's not much of a difference anymore.

  • Looks like they found someone.

  • It doesn't sound like he can do that without giving up his ownership stake in his company. Or is that what you are suggesting?

  • If you're willing to wait 2 weeks for shipping (with an added shipping cost of $0.40) you can just order that stuff directly from Aliexpress and cut out the middle man.

  • I agree with the first part but vehemently disagree with the third paragraph.

    I suspect it varies wildly based on where you live, but in Chicago there absolutely ARE places with waitstaff worth getting a burger from.

  • I'd be careful about completely trusting any AV to give you any certainty that you aren't infected.

    As I mentioned in another comment, Pegasus is comprised of many different exploits. So just because Bitdefender can detect some older Pegasus variants, doesn't mean it can detect all of them.

    In fact it's quite unlikely they can detect the latest variants.

  • I don't know the full answer, but Pegasus isn't one single piece of spyware, but rather a toolkit of many, many zero-day exploits.

    A lot of them (the majority maybe?) are non-persistent meaning that they don't survive a reboot.

    That said, aside from keeping your phone up to date with security patches and rebooting frequently, I'm not sure there's much the average person can do if you're actively being targeted.

  • We still do.