Skip Navigation

Posts
1
Comments
76
Joined
3 yr. ago

  • The Constitution assumes the people through the ballot box or through protest would clean up any issues like that

  • There are multiple ways of doing this and I'm not sure which methods tik tok is using.

    • ip address there's a group called IANA that issues blocks of IP addresses to ISPs and there a companies like Maxmind that package that info. apps can create rules block requests based on that info that block requests coming from a specific location or return an error to the user
    • removing from the app store Companies can ask app stores to no longer offer downloads in a specific region and as the app updates it will become more busted over time
    • user information Based info provided by the user directly during sign up or from the social login a user used to sign up with tik tok
  • Bullet seed hit 3 times

  • There is a signal legal entity that can fail and take out all of signal which is less true with matrix since there are multiple client and server implementations the only thing a government can achieve by breaking a single entity is disrupt governance

  • I prefer the ini files systemd uses to bash scripts

  • It's possible it could be a local firewall that is reaching out to their cloud for lists of bad IP addresses or domains or a local firewall that is configured from a cloud interface. The other case is it could be web application firewall or WAF which where a company intercepts traffic, drops malicious requests and forwards it to your actual web server

  • What are they going to do next? Make registry of dildos? Have a dildo buyback program? Regulate the length and girth?

  • So you are saying the IRA assassins have a better healthcare plan than most Americans?

  • They sell a lot of coozies and shirts like this at the cumming tap in cumming Iowa

  • Interesting case of military tatics in a civilian settings. First Decide is blasted at the Vatican embassy, then born in the USA is looped at Guantanamo Bay, now this

  • I tried a couple of times but prefer fedora over redhat on lab servers and desktops. Fedora is easier to upgrade between releases and you get features faster and it's just as stable. The only time I use enterprise oses in my lab is for things that are picky about the os they run on

  • Tailscale is the best with netbird in a close second if you want to self host, headscale works great.

  • The art of the deal would be way more interesting if Alistor wrote it

  • ~/repos

  • Basically every game without anticheat runs on Linux now

  • Both grandpas are dead but all 4 are amazing and I wish I saw my grandma's more. I never learned a ton about their past first hand besides my dad's dad who told me about Korea. I mostly talk about what's going on not the past. Sometimes it feels like seeing a teacher or coach outside of school when we talk about the past because you saw them as grandparents and not normal people.

  • I don't think so. You need to get a large amount of training before you can make a comparable salary, and if you do get a high paying cyber security job there's still a good chance of it being stressful. You can see if you like it using the free tier of try hack me, and if you love it and can afford to take the paycut it might make sense but you are probably better off finding a way to use your existing skills than aquiring new ones

  • The issue isn't how it's built or based on its that Microsoft can use its control of the os to make it extremely difficult to avoid it.

  • AI is worse than crypto. Most crypto projects use proof of stake which is way more resource efficient than mining. Also the mining that does happen usually happens where there is excess generation instead of azure datacenters