• 0 Posts
  • 24 Comments
Joined 3 months ago
cake
Cake day: August 12th, 2024

help-circle



  • You didn’t read the article did you? Its not about the inclusion of a character, but about how a specific scene with that character is handled. The author claims it is completely jarring, doesn’t fit into the games setting and doesn’t even use the games existing lore for transgender people but instead uses modern terminology.

    I found the article to very informative and not at all “gamergatey”.

    Its points are:

    • this is the scene
    • it is bad
    • here is exelent trans representation in a fantasy setting
    • “its a BioWare self insert”
    • this is how they could have handled it better
    • the game is great, but now everybody will just talk about woke, so again the game is good



  • groet@feddit.orgtoComic Strips@lemmy.worldCorporeal Key
    link
    fedilink
    English
    arrow-up
    16
    ·
    25 days ago

    The ghost is sad because it locked itself out/forgot the key inside. Second ghost shows up an tells them to just warp through because they are ghosts. But instead of being happy they are inside and never needed the key, they try to move the key outside so they can unlock the door to get inside.







  • groet@feddit.orgtomemes@lemmy.worldShowerThoughts
    link
    fedilink
    English
    arrow-up
    13
    ·
    1 month ago

    And the brain didn’t even know it was naming itself.

    The ancient Egyptians removed the brain before mummification because they considerd it to be basically useless. Later associations between motor control of muscles and the brain were discovered but it wasn’t until the development of modern neuroscience that the brain was considered to be the seat of awareness, self and intelligence.


  • groet@feddit.orgtoTechnology@lemmy.worldWhat the hell Proton!
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    1 month ago

    Client isolation doesn’t help. That is just the access point not routing traffic between connected devices. The problem with WiFi is it is a radio signal. Everybody in range can receive 100% of all communication on that network. Just by being in range the attacker can do passive sniffing. No wiretap needed like with cabled networks.

    WiFi is encryoed if it uses a password. So any public WiFi without a password can be sniffed by literally every device in range (no need to connect to the WiFi for sniffing). On public WiFi with a password, the radio signal is encrypted but everybody knows the encryption key. So everybody connected to the WiFi can still sniff the traffic of everybody else.

    That encryption is only on the WiFi level, so encrypted radio signals, not on the actually traffic level (like TLS/HTTPS etc).


  • groet@feddit.orgtoich_iel@feddit.orgich🏥iel
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 month ago

    Und der Patient der Symptome 10 Jahre mit globuli bekämpft und dann an einer vorbeugbaren Krankheit stirbt? Klar kein (gescheider) Arzt behandelt akut gefährliche Krankheiten mit globuli aber wenn durch Verzicht auf funktionierende Medizin später ein schlimmeres Krankheitsbild auftritt, liegt dies auch in der Verantwortung des Arztes.


  • The post office knows who you are sending letters to. They have to know because they have to deliver it. They do not know the content of the letter. They also dont know if the letter will be passed along by the receiver to a different destination.

    Your ISP knows you are sending traffic to a VPN but not where they are sending it to. The VPN knows where you are sending traffic to but not the content of that traffic. So if you browse a website that only serves pirated content, then they knows you are consuming pirated media but not which media.

    If the law requires the VPN to report any and all traffic to blacklisted sights then a “no logs policy” would breach that law.

    However to make this law work, Italy would have to ban all VPNs and http proxy services outside of Italy. Italy would have to force pretty mutch the whole world to follow this law for it to work.

    What happens if you run a tiny server on AWS in the USA to proxy your private traffic. Unless AWS USA is watching all traffic to see if it complies with Italian law there is no way to enforce it.



  • groet@feddit.orgtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    74
    ·
    2 months ago

    No, why would it? It will run code in the context of the current user which is absolutely enough to start a new process that will run in the background, download more code from a attacker server and allow remote access. The attacker will only have as much permissions as the user executing the code but that is enough to steal their files, run a keyloggers, steal their sessions for other websites etc.

    They can try to escalate to the admin user, but when targeting private victims, all the data that is worth stealing is available to the user and does not require admin privs.


  • groet@feddit.orgto196@lemmy.blahaj.zoneMarcus Aurelius rule
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    2 months ago

    Almost all predator animals have a territory and they will fight for that territory to keep others out. Chimpanzees and other great apes have clan wars over territory. And they have social hierarchies where some get more food than others.

    There is a 100% chance early humans were fighting each other long before the invention of agriculture.