This profile is from a federated server and may be incomplete. Browse more on the original instance.

thann,

POW! Right in the symbiote!

thann,

No, they had corrective surgery

thann,

Imagine if Lockheed martin “shut off” a jet because it was “getting too close to China”

What would be the response by the DOJ?

I would think the military would call that an act of treason and imprison or disappear any executives they thought were involved

thann,

I can’t control the software on my 2003, but the software can’t control me

thann,

Yeah, the security of the commercial smart locks is a disaster, so I had to program my own lol

github.com/thann/doorbot

Any chance to have a separated [PORN] tag to avoid blocking all kind of NSFW posts?

Many NSFW have nothing to do with porn. Sometimes are horror contents, some times are crude images, some times are just lazy people who don’t know of the Spoiler tag. Can we have a quick and easy way to filter off all the (very funny but not alway wanted) Porn posts without locking out those other contents???

thann,

This is really the best solution

thann,

What if we fucked over all of the people that like our website to try and cater to people that don’t like it?

thann,

Or like some effective form of public transportation

thann,

Radical inclusion now includes cholera

thann,

I went to pick up neuromancer, but someone kidnapped me and put a bomb in my head, and now I have to rob a bank

thann,

But they look better than jerboa! =,[

thann,

One of my friends who’s a windows user asked me the other day, “what program do you use to uninstall your video card drivers” because he saw some article about how using some third party app to uninstall your drivers before updating will give you better frames… IDK where to begin with that…

thann,

Creamy is concerned about you

thann,

Incidentally, you’ll want to avoid draining the Beepy’s battery too deeply if you can help it — according to the schematics (and confirmed on my actual hardware) SQFMI have used a 10K resistor on the “programming” pin of the TP4054 charging IC. That sets the chip’s charge rate to a measly 100 mA, which means a full recharge of the battery would take somewhere in the neighborhood of 20 hours. It’s hard to believe this was intentional, and may be addressed on a later hardware revision.

Yeah, this is a really cool idea, but they need to flush it out a little more. analogue audio and faster charging would make it a lot more appealing

thann,

Where’s the tankies to explain how the Uyghur concentration camps are not a big deal?

thann,

I knew he was full of shit, because hell talk about really complicated things like ram timing like he’s an expert, then when he tries to use Linux, a package manager is too complex for him and he becomes less tech savvy than my 75 year old mom, so its pretty obvious he knows nothing when he’s not being feed answers by some marketing goon

thann,

it was a different style video, but he had used linux before.
he even knew he should use the package manager, but for some reason didnt ¯_(ツ)_/¯

thann,

Because they’ve gone to such lengths to hide what chemicals they are using, we already knew they were an environmental and health disaster, but its good to finally get evidence

thann,

According to the sources, Manuel wanted West Maui Land to get permission from a taro, or kalo, farm located downstream from the company’s property.

We are sooo fucked

thann,

We can’t save your house because the companies that own everything are fighting over which one of them owns the water

thann,

MBS less evil than apple?

thann,

yeah, plus steam takes 30%

thann,

IDK what your comment is about, but its not a coincidence the first blizz game coming to steam is free to play,

thann,

what is misleading exactly? the part where every app you open gets sent to apple along with third parties along with your IP?
because I’m pretty sure that’s all 100% true, and I think its been true for over 5 years…

you’re just suggesting that because they do one thing well they do everything well, which is a fallacy.
Also, any proprietary program that does “E2EE” is misleading you by omitting the part where they could totally steal anyones keys at any time with the push of a button, if they haven’t already. it is completely laughable to suggest any proprietary E2EE program is secure!

so who is spreading the missinfo again?

EDIT: I found the pedantic mistake that they claim makes this “highly misleading”: gatekeeper doesnt send the “application hash” it sends the “applications certificate id”

Bravo in finding this detail, but it doesnt change anything!
Apple was sending (1) what apps youre opening (2) in plantext to (3) third parties!

youre being missleading by suggesting that everything is encrypted!

thann,

yup, but some people think theyre beyond reproach

thann,

if you trust everything a sales person says, I have a bridge to sell you.

there is no reason to believe any proprietary program does what is says, and even if you decompile it and convince yourself its not sending your keys home, they could update it at any moment.

IDK where you get all of this trust from

thann,

youre being misleading by saying why!
unless you were in the room, your speculation is as good as mine, and Im not saying why, Im just stating facts!

thann,

you know whats funny about certs is you dont need to phone home to check them, (see SSL)

The issue is that they did it in a laughably insecure way that involved exposing every app that every person opened for years…

And yet sill this thread is super-saturated with shills telling me that im spreading misinformation and that apple is super secure and encrypts everything and you should trust them. so idk what is wrong with pushing back against their narrative?

thann,

I believe in the security of open source software, because Ive worked with it for over 15 years but for some reason youre arguing with me that thinking apple is insecure is a circle jerk because google and microsoft are also bad. I know google and MS are bad, I talk about it all the time. I want to talk about how much better open source software is but because I’m shit talking apple you need to tell me how secure it is.

The idea that shills would even be here is laughable.

really? its just impossible for a corporation to have made a lemmy account? youre going aout of youre way to talk about how trustworthy apple is with literally no substance. was anything in the video wrong? no. you just want to tell me how trustworthy apple is and how much of a circle jerk it is to talk about their flaws. its impossible to tell a brain-dead apple lover from a chat bot.

thann,

no, its just an additional attack vector, having the code to inspect makes validating updates much easier and more secure.

I’m evaluating the security of the software I’m using? what are you doing casually excusing a massive security flaw? you must not look either way before crossing the street

thann,

do you realize that im not the one making the speculation?

thann,

I guess I dont get the point of your comment then

thann,

I just posted this to bring visibility to a topic I think has been overlooked.

A lot of people may not be aware of this security flaw, or the general lack of security and privacy with apple products and proprietary software in general.

I know that most people will downvote anything criticizing apple because they are cultists, so it definitely wasnt for karma.

thann,

Gatekeeper didnt even use TLS, the most basic of security features, so security and privacy were the last things apple were thinking about when they came up with the idea for gatekeeper. This should alarm anyone with their ear to the ground

As for the FBI not being able to unlock phones is exactly what they want you to think, because they do it for money on the regular allegedly.

EDIT: the link you sent is two years old, so IDK why youre complainin about my link being 2 years old

“Millions” of sensitive US military emails were reportedly sent to Mali due to a typo (www.theverge.com)

For over 10 years, millions of emails associated with the US military have been getting sent to Mali, a West African country allied with Russia, due to a typo, according to a report from the Financial Times. Instead of appending the military’s .MIL domain to their recipient’s email address, people frequently type .ML, the...

thann,

They would just mail the encryption keys to mali

thann,

I went to do this but I already gave them 1 star in 2017 lol

thann,

Lemmy will be a dinosaur like hacker news and we’ll all use a bunch of different softwares to connect to the fediverse

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • uselessserver093
  • Food
  • aaaaaaacccccccce
  • test
  • CafeMeta
  • testmag
  • MUD
  • RhythmGameZone
  • RSS
  • dabs
  • KamenRider
  • TheResearchGuardian
  • KbinCafe
  • Socialism
  • oklahoma
  • SuperSentai
  • feritale
  • All magazines