i don’t understand the comic?
i don’t understand the comic?
Don’t listen to this guy at all.
I’ve long held that my phone is a single point of failure and that I should be able to function without it. So I don’t do banking on my phone, I still carry a wallet even if I do have Apple Pay and I will certainly carry physical identification until I’m legally unable to.
I don’t know about the history of the project, but it sounds like those blobs have been there for quite some time. When in reality, the PR that added the blobs in the first place shouldn’t ever have been approved.
Actually just checked 3+ years.
This isn’t a knock against opensource programming, but there shouldn’t ever be precompiled blobs in the repo unless they are the official builds for the various OS’s and if you want to build from source, the pre-compiled blobs shouldn’t be part of that, otherwise you can’t really claim you are opensource.
Hey guys open source is great you can look at all the code and therefore there are no security backdoors etc. Also here are a bunch of pre-compiled blobs in the repo, don’t worry about those, but they are required to run the program.
Turn off broadcast of the SSID
Don’t do this. It provides zero security, and just reduces usability. Now you should call your SSID something non-identifiable. So instead of “$YourName Wifi” call it “pleasure chest” or something. Additionally do not set a ridiculous 64 character + special characters password, because again you are providing next to zero additional security, while hugely reducing usability.
Use a simple password scheme of 3-5 unrelated common words like from here: https://www.correcthorsebatterystaple.net/index.html for your wifi password.
The genetic science is cool, the consequences of the science are non-existent. The consequences of using them as bio-engineering agents is obviously an open question, but a distraction at this point of time since governments around the world have no appetite for environmental science that doesn’t directly make someone money.
As for “what happens next,” it either becomes commercially viable and wolly mammoths are seen as mundane and numerous in the next few decades, or it becomes a one-off like Dolly the sheep and the herd population of woolly mammoths stays <10 plus maybe a few zoos.
I guess having a thick provisioned VM image on your laptop means that you are hiding something. Again if the evil government you are trying to hide something from doesn’t need reasonableness as a reason to detain you, then who cares? No matter what you do you are rolling the dice every time you interact with them.
Which is of course similar to the US today, so if I needed to hide something from them I’d make sure that once i’m legally compelled to give my password they at the very least wouldn’t have what they are looking for, since there is no way I could prove I didn’t have it anyway.
Beat what out of you? You already gave them a password that decrypts a specific file/volume/etc. If they want to beat you, they will beat you regardless of your possession of any encrypted materials.
They know it exist as a concept. They can’t prove that the specific decrypted message contains a super-secret encrypted message as well.
The metric system brain-worms run deep.
Did you know that potential attackers can pinpoint your location if they are in the same public place as you?
This really seems like complaining that a location enabled app that explicitly shares your location with other users is sharing your location with other users. That is 100% the purpose of the app to begin with!
I’m a network engineer and I run ipv6 natively in all of our datacenters. There are even a handful of end systems that have ipv6 native networking stacks with ipv4 sockets for our non-ipv6 compatible applications. IPv6 issues are basically self-inflicted at this point by companies that see their IT systems as cost centers, or by basilisk directors who’s knowledge stopped in the 90’s.
If the labor force could opt out of the rat race because they didn’t have to work, then they gives them immense power especially considering what they have now. Of course the necessities would have to be controlled in a not-for-profit manner so that you can’t just have some land baron that adjusts the cost of rent and food upward to ensure it eats up all the UBI, same with utilities/internet/etc.
But for consumerist goods that people want because they enhance life, if people could realistically withhold their labor unless the capitalist offered equity etc in industries that produced those things, you would quickly see the power of the leaders of those industries wane significantly.
Seems novel. But from a security aspect, if OpenSSH has security vulnerability that allows an unauthenticated user to login, via whatever means, once you are in the system as a non-privileged user, you are now free to use the same vulnerability to get root.
Basically this exercise is like using two locks that have the same key to open them. If the same key opens them, then a weakness in one, is now a weakness in the other so why bother with two identical locks?
New York City is the land of owners, and while there a ton of pro-tenant laws on the books, the reality is that they aren’t worth the paper they are printed on if they won’t ever be enforced in a way that isn’t a burden to the tenant. So maybe your ignorant comment of “redneck shit holes” should be examined, and contextualized.
The first 3 are why I can’t get any work done anymore. The last 3 I would absolutely love to have more time to do.
It’s actually a great game. But it’s Eurojank to the extereme. If you want a superior experience, play Gothic 2. But it’s still janky, just not as bad as Gothic 1. Gothic 3 I didn’t like at all.
Oh shit. I totally missed the different label on the 3 otherwise identical pictures. Now I get it. I originally thought it was just literally 3 identical pictures.