![](https://lemmy.world/pictrs/image/189c4267-7b10-4147-a98a-e782efec7af1.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
Fuck it. Gun it at the brick wall. Jerry’s rigging up an emergency break as we speak. Don’t mind that the last piece to said break may be missing.
- Man who will probably die before we hit the wall
Fuck it. Gun it at the brick wall. Jerry’s rigging up an emergency break as we speak. Don’t mind that the last piece to said break may be missing.
- Man who will probably die before we hit the wall
I was working at a company at one point that got a contract to build something I viewed equivalent to malware. Immediately I brought it up to several higher-ups that this was not something I was willing to do. One of them brought up the argument “If we don’t do it someone else will.”
This mentality scares the shit out of me, but it explains a lot of horrible things in the industry.
Believing in that mentality is worse than the reality of the situation. At least if you say no there’s a chance it doesn’t happen or it gets passed to someone worse than you. If you say yes then not only are you complicit, you are actively enforcing that gloomy mentality for other engineers. Just say no.
Publicly traded corps just saw the letter “p”, assumed profit, and announced a 5 year plan to discover the rest of that sentence. Their shareholders are still upset it took them a whole letter before they had a plan…
Search telemetry in a web browser is absolutely insane. I can understand more usage statistics but search telemetry just makes it sound like they want data on who to make an offer to for the next default search provider slot.
Or worse yet, another half-assed partnership with some sketchy 3rd party with a completely fucked moral compass and a privacy policy to match.
Good video going over practical pros and cons currently:
We’re the front line dog. Strike me down so Debian Stable’s legacy may live on.
Something something furmark
They have been around for a little while now. Had one in college ~4 years ago. Upstream kernel support was a little rough but spec wise they were impressive alternatives to the RPi 3B
Friendlyjordies watchers knowing it would be abc that advocates for this…
I don’t know man, I’ve always liked the idea of a project outliving me. Though for the sanity of future engineers I hope that is not the case. Today’s solutions are usually just tomorrow’s problems.
Part of the problem is the game of telephone drops the cell chemistry related to the method almost immediately leading to general consumers applying it as a blanket rule for all batteries
Interesting source though…
Yep. Battery chemistry is a real pain in the ass. Every few years someone spins a wheel and determines the next big thing that everyone needs to do to prevent batteries from dying early. For a while people were told full cycles were healthy for avoiding cell memory. Now more sporadic cycles are being peddled.
Use the device as you need it. If you complete a full cycle, cool; if not, that’s fine. Just don’t let the damn thing completely die and don’t keep it permanently on charge. Those are the common things most people do on accident that can really screw up a cell.
I wish more distro’s packaged librewolf. I know there’s an appimage and such but I prefer native tested packages where possible.
The most useful quote to those familiar with the linux boot process:
“An attacker would need to be able to coerce a system into booting from HTTP if it’s not already doing so, and either be in a position to run the HTTP server in question or MITM traffic to it,” Matthew Garrett, a security developer and one of the original shim authors, wrote in an online interview. “An attacker (physically present or who has already compromised root on the system) could use this to subvert secure boot (add a new boot entry to a server they control, compromise shim, execute arbitrary code).”
If an attack needs root then it doesn’t matter. Your box is toast anyway. If you’re using http boot without verification then you should have seen a MITM attack coming.
Something akin to haveibeenpwned.com password hash partial match? Can that even be done with this data?
Edit: You goofs know you can calculate the hash locally and submit it for review without actually exposing your password to them right? That’s how bitwarden does it’s check. https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity
Ah, but Mozilla isn’t even trying to do anything cool like that. They just use onereap and those fuckers look shady. Quotes from their privacy policy: https://onerep.com/privacy-policy#what-data-we-collect-and-how-we-do-that
We use your Personal Information for a number of purposes, which may include the following:
[snip]
- To display advertisements to you.
- To manage our Affiliate marketing program.
There will be times when we may need to disclose your Personal Information to third parties. We may disclose your Personal Information to:
[snip]
- Third-party service providers and partners who assist us in the provision of the Services and Website, for example, (a) those who support delivery of or provide certain features in connection with the Services and Website (e.g. Stripe, a payment services provider; Sendgrid, an email delivery service; HubSpot, a CRM platform, and Sentry, a crash reporting platform); (b) providers of analytics and measurement services (e.g. Google Analytics, ProfitWell etc.); © providers of technical infrastructure services (e.g. Microsoft Azure, Google Cloud, and Amazon AWS); (d) providers of customer support services (e.g. Zendesk); (e) those who facilitate conduct of surveys (e.g. Hotjar); (f) those who help to advertise, market or promote our Services and Website (e.g. Mautic, Facebook Ads, Google Ads, Linkedin Ads, Reddit Ads, and Microsoft Ads);
The bastards
I’m still trying to figure out good nftables rules for ipv6 prefix delegation…
Am I the only one who didn’t want another background service so I just wired a local Feedpushr instance to direct entries to my existing Gotify instance?
I mean, it works fine until some asshole puts HTML that their parser can’t understand in the content section but then you just need to read between the tags…
Well, when the game is essentially running in a virtual machine with an address translation layer that scrambles the backing memory every few minutes you’re lucky the game even runs. Good luck trying to decipher that hell. A few guys have done it, I remember the one dude ranting on Twitter about trying to crack Borderland’s 3 back around launch.
And then the follow up which was that Denuvo was basically adding a ~30fps overhead to the game and everyone was initially blaming the devs for releasing unoptimized garbage.
Gabe had it right, piracy is a service problem. And my motto has always been if the game has some garbage like Denuvo, then you couldn’t even pay me to take a copy. Not worth the headache.
Lol, changing the country of origin doesn’t constitute innovation from a consumer standpoint…
Now if this was using 5nm or chiplit or any of the other buzzwords of the day it could be marketed as innovative in the modern sense of the word.
Realistically there is no innovation left for ARM platforms. They all use the same core schematics. They only control data flow and peripheral IP as a manufacturer, unless they feel like building their own core from the spec (nobody really does that anymore as ARM has been desperately trying to standardize everything). The most “innovation” I’ve seen has come from stubbornness around keeping legacy bus architecture around instead of adopting AXI (even when all the IP they are trying to use already uses AXI and they keep having to make translation hardware).