Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)H
Posts
0
Comments
311
Joined
3 yr. ago

  • Uhhhhh does Dead Space have a sexy Lady in it? Yeah didn't think so bud.

  • Lol every day, brother

  • Slow down, I think nuance might not be well understood by this person.

  • I know this is a joke but for anyone reading: Linux has many advantages and is great but is NOT immune to viruses or exploits.

  • Looks a little dry tbh, but that can be hard to tell from a picture.

  • I wish all the billionaires would launch themselves into space to fuck off forever.

    That or go on more submarine expeditions I guess.

  • Musk is a moron and I hope he keeps getting exposed

  • Oh no, a colonizers famously historical exploitation is experiencing the consequences of some of their own actions.

    I mean, people don't NEED chocolate right?

  • Very informative, I think people will learn from what you're saying, but it doesn't really matter to what I'm saying.

    Yes, absolutely, consider the human element in your data encryption and protection schemes and implementations.

    Beating someone with a pipe is a joke, but not really defeating an algorithm.

  • I appreciate the explaination, that's a cool scheme, but what I saying is the human leaking the key is not the fault of the algorithm.

    Everyone and everything is, on a very pedantic level, weak to getting their ass beat lol

    That doesn't make it crypt analysis

  • Doesn't break the algorithm though, you would just have the key and then can use the algorithm (that still works!) to decrypt data.

    Also you're talking about one class of cryptography, the concept of key knowledge varies between algorithms.

    My point is an attacker having knowledge of the key is a compromise, not a successful break of the algorithm..

    "the attacker beat my ass until I gave them the key", doesn't mean people should stop using AES or even RSA, for example.

  • No, really though, where's it from?

  • Where is this from? I don't think exposing the key breaks most crypto algorithms, it should still be doing its job.

  • 7-11 is owned by a Japanese company, and has stores worldwide. You're free to make whatever you want, though!

  • Seems like company decision makers continue to be out of touch with what people want. People seem much more excited about products like the steam deck which play most of your whole library on Linux at very reasonable quality.

    I think the console exclusivity game is nearing the end, there's going to have to be some actual innovation for people to come out of their pockets.

  • Looks

    Jump
  • ONLY I HAVE THE BRAINS TO RULE LYLAT!

  • Employed

  • I wish the states would just implement better privacy protections and not play whack a mole with individual companies.

  • These are the questions we need to keep putting out there so the law can finally catch up to the monotony of license agreements and terms.

    It shouldn't be acceptable to present a layman with a 10 page legal jargon document for them to agree to and call it binding.