Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)T
Posts
2
Comments
1642
Joined
3 yr. ago

  • Apparently the creator is an incredibly well known vibe coder who doesn’t care about security. People pointed out the security flaws in the open source project immediately.

  • And wait, no you’re thinking of a different thread. This thread mentioned no such thing.

  • They can connect to open WiFi spots and just ignore the fact that you didn’t connect it.

  • Depends on the signature.

  • You can use your router or access point tools to check what address it’s trying to resolve and then set up a redirect to a device that can respond with a fake response.

  • If you are at a business you should have an access point or router that is capable of blocking specific devices from WAN access. But I would create a new segmented network, block that network from WAN access entirely, put it on its own VLAN, and then connect the TV to that network.

  • That doesn’t, unless you’ve blocked your TV from network access, because they use ACR - Automated Content Recognition - that literally scans what is being displayed over your hdmi port and then sells it off to advertisers.

  • Tell him to leave the bathroom door open anytime he’s taking a shit in public then.

  • Same for ours, but we think it’s cause she learned we’d go get it even if she didn’t.

  • Sleep

    Jump
  • I mean this looks like AI.

  • So, once again you are incapable of explaining how it’s not carbon neutral, though you think you are. Carbon neutrality has nothing to do with development costs and construction costs are almost always dwarfed by running costs (which I literally mentioned if you would bother reading).

    You're just angry it's not a miracle machine.

    I’m not the one getting angry. You are making a bunch of bullshit claims and then getting mad that people don’t believe your lies.

  • They’re an “optimized for gaming and high speed workloads” distribution as far as I understand. Lots of customizations to GPU drivers and what not for games.

  • We switched to symmetrical gigabit the moment it was available, in fact we were one of the first in the state. I’m never going back. In 5 years we’ve only had to call for help once and they didn’t need to come out to do anything. They were able to fix the issue over the phone in about 5-10 minutes. The rest of the time the internet just fucking works.

    Amazing how offering a working product gets you customers.

  • Brb. Gonna eat oats for two days then switch to steak, half and half, and candy.

  • Windows 7’s Aero was amazing. Liquid Glass is terrible.

  • Oh definitely, but the person I originally replied to asked if they were servers, not real SIM cards.

  • It is though. Think of it this way. You are a spy, you are communicating with someone over Signal. Signal is e2e. The person you are talking with doesn't know you are a spy. They've verified that Signal is working and yet their secrets keep getting out. They go to law enforcement and say "they're a spy" and you say "no I'm not, it's e2e, nothing could have been getting out!".

    If you can read the text on the screen, then it's past the point of e2e. e2e is just about transmission. It has nothing to do with the endpoints.

    In this case Meta can utilize iOS App Groups which allows applications by the same company to access shared data. So imagine the easiest to understand scenario.

    You get a message on WhatsApp. Your Operating System takes a screenshot of the message, and sends it off to the FBI. Nothing has broken e2e here. Your OS can't be trusted (in this example).

    Now let's expand it:

    • You get a message on WhatsApp
    • WhatsApp takes a screenshot of the message and saves it to its storage. It does NOTHING ELSE WITH IT.
    • Facebook (which you also have installed) now accesses that shared data store, utilizing iOS App Groups, takes the screenshot, and sends it to Meta.

    Nothing has broken e2e here. The client can't be trusted, so no matter what you do, e2e doesn't have to be broken, since the company is untrustworthy. They can claim e2e, implement fully working auditable e2e, and still exfiltrate your data.

    Of course, WhatsApp probably isn't taking screenshots. They can just save off the text after they decrypt it (even if they use the Signal protocol).