Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)W
Posts
1
Comments
867
Joined
2 yr. ago

  • Unfortunately it really doesn’t. And it’s actually Linux that’s the bigger problem: whenever it decides to updates GRUB it looks for OSes on all of your drives to make grub entries for them. It also doesn’t necessarily modify the version of grub on the booted drive.

    Yes I’m sure there’s a way to manually configure everything perfectly but my goal is a setup where I don’t have to constantly manually fix things.

  • I played the previous mobile version of the Pokemon TCG. The problem is, the game doesn’t even try to be balanced. Whoever has the most valuable cards wins - full stop. The more valuable cards are just straight up more powerful, rarely with any cost difference or drawbacks.

    There are plenty of good mobile TCGs out there though.

  • It hasn’t actually been $5 in a long time. It was like $7 last time I went (a few years ago).

  • Don’t show this to the Rust fans

  • a small hacking group years in advance to plan and execute a voting machine manipulation without anyone noticing

    This is actually incredibly difficult. Finding vulnerabilities isn’t easy, and exploiting them often isn’t easy either. Sometimes a vulnerability requires the user of the device to do something specific, and sometimes it requires direct access to the device. This comes back to social engineering, as a hacker may have to trick a poll worker into triggering the vulnerability. Also some vulnerabilities might be less impactful than others, e.g. leaking some information rather than allowing a hacker to manipulate votes. Finally, vulnerabilities are discovered and patched all the time. The problems discovered at this year’s DefCon, maybe not all of them will be patched before the election. But planning an attack years in advance? That’s not happening.

    What about a 150 million or more country, what would be easier, manipulation of paper votes across the country involving a lot, and I mean a lot, of people using ballot stuffing and count rigging

    So here’s a list of actual vote manipulation techniques that are commonly used in this country:

    • gerrymandering
    • laws that make it harder for certain people to vote (e.g. laws where your huge city is only allowed one polling booth and you have to take a day off work to vote and there’s strict time requirements and you aren’t allowed water while in the long line)
    • people intimidating people they don’t think will “vote correctly” to stay away from polls

    Here’s a list of vote manipulation techniques that were attempted but failed:

    • bringing a fake set of electors to declare votes that didn’t match with what the people voted for
    • interrupting the official counting and certification of the voting process
    • potentially the killing of government officials in charge of the vote certification process (this didn’t happen, but the mob raiding the capital had constructed a gallows…)

    I really, deeply think that some unspecified electronic vulnerabilities are the least of our concerns for this upcoming election.

  • A piece of paper isn’t exactly perfectly secure either. Most hacking ends up being manipulating people rather than machines.

  • They should just take the route BandCamp takes and tell you to go to the website to make purchases

  • This is pretty close to how the US government is organized.

  • What about the test case where I’m using the browser’s dev tools to re-send http requests in random orders?

  • With self hosting you have to trust that you won’t fuck up, that your house or wherever you are hosting won’t lose power when you need it, or burn down or face some other disaster. At the very least you should have an external location, which you also should trust pretty thoroughly.

    Also that’s not to mention that open source projects still have security vulnerabilities sometimes, and also sometimes they get a lot less developer attention than profesional projects.

    I love self hosting stuff and do a lot of my own computer backups etc. but the most important stuff I rely on professional cloud solutions for. I simply don’t have the resources to be able to compete.

  • Scary. I think a VPN would help against this kind of attack (although it also shows what could happen if your VPN gets compromised).

    Encrypted DNS is the real solution though.

  • If you can pull it off, successful merchandising is far more lucrative than the original media. A tale as old as consumerism.

  • The ClownStrike person didn’t attempt to use Cloudflare’s counterclaim system.

  • Starting with the second but eventually the first

  • My experience was that the school provided free Windows keys for a personal computer if you needed one (they didn’t provide the computer itself) but the majority of computers I interacted with on campus (mostly in the computer lab) were Linux (some Debian variant iirc). I think the printing computers in the library were windows. I took an art class at one point and they had Macs (it was for using the Apple’s Final Cut Pro).

    We never used LibreOffice though. Everyone just uses Google Drive.

  • We’ve known they’ve been working on other games for years now. A lot of the community thought Marathon would take resources away from D2 (to the point there’s a meme about Marathon being “The Destiny Killer”).

    The denied those allegations about Marathon but not it turns out those were fairly accurate.

  • This is a great game but also there’s already a remake of it for Switch.

  • There are comic plotlines where Dr. Doom is a variant of Iron Man. It’s not necessarily driven by some sort of desperation.

  • That has more to do with game design than matchmaking, but yes, it’s hard to balance games so that dying has consequence but isn’t too un-fun.