JuxtaposedJaguar

@JuxtaposedJaguar@lemmy.ml

This profile is from a federated server and may be incomplete. Browse more on the original instance.

JuxtaposedJaguar,

Giving permission by saying yes to a “would you mind” question is the hill I die on. Usually I say “I would not mind” but if I’m feeling frisky I’ll say no and watch their brain melt.

JuxtaposedJaguar, (edited )

How is that different from mutual TLS authentication?

Edit: It seems like OPAQUE just initiates mutual TLS authentication after the TLS session has already been negotiated with PKI. So it basically just allows websites to design their own login page instead of the one designed by the web browser.

JuxtaposedJaguar,

I’m surprised that other people are surprised that for-profit companies constantly try to increase their profits; such companies only contribute to FOSS when that’s more profitable than the alternative. The Linux kernel, AMDGPU, Steam, etc only exist because some part of the software/hardware stack is proprietary (which becomes a more attractive product as the FOSS portion of the stack improves).

I’m definitely not justifying the “rug-pulling”, but people need to stop supporting projects with no potential for long-term profitability unless those projects can survive without any support from for-profit companies. Anything else is destined to fail.

JuxtaposedJaguar,

While Linux itself isn’t proprietary, it supports loading proprietary firmware/microcode blobs and running on proprietary hardware. Thus, part of the Linux hardware/software stack is proprietary.

JuxtaposedJaguar,

I don’t. Could you elaborate?

JuxtaposedJaguar,

I just replied to the other person’s comment.

JuxtaposedJaguar,

Not all FOSS projects need to be profitable to survive. IOW if a project cannot survive without being profitable and it cannot be profitable long-term, then it cannot survive long-term.

OpenAI's GPT Trademark Request Has Been Denied (tsdr.uspto.gov)

First, applicant argues that the mark is not merely descriptive because consumers will not immediately understand what the underlying wording “generative pre-trained transformer” means. The trademark examining attorney is not convinced. The previously and presently attached Internet evidence demonstrates the extensive and...

JuxtaposedJaguar,

It’s a nightmare to search for anything about GUID Partition Tables (GPT) now.

Is anyone else worried about the apple vision pro?

i wouldn’t normally be concerned since any company releasing a VR product with this price tag is obviously going to fail… but it’s apple and somehow through exquisite branding and sleek design they have managed to create something that resonated with “tech reviewers” and rich folk who can afford it....

JuxtaposedJaguar,

My biggest concern is that everyone will eventually be forced by societal and institutional expectations; for now people can easily choose not to wear them, but if/when your employer requires it for work or if/when the only way to talk to your friends is by using it, then you won’t have much of a choice.

For example, Zoom has very shady ties with the Chinese government (and several reports say that they’ve used it to surveil and censor people), yet many schools and workplaces required it (and many still do now). You could refuse to install/use it, but then you’d lose your job or fail your classes. It’s a similar story for TikTok, Discord, and Facebook before that.

JuxtaposedJaguar,

I’d love yearly Debian releases instead of just every 2 years.

JuxtaposedJaguar,

Free (As in beer and speech!)

Do you live in a utopia where you get as much beer as you want without having to pay for it, or do you live in a dystopia where you have to pay to be able to speak your mind and only in limited quantities?

JuxtaposedJaguar,

I’m not a cryptographer (so maybe this is wrong), but my understanding is that although it’s possible to modify the cipher text, how those changes modify the plaintext are very difficult (or impossible) to predict. That can still be an attack vector if the attacker knows the structure of the plaintext (or just want to break something), but since the checksum is also encrypted, the chances that both the original file and checksum could be kept consistent after cipher text modification is basically zero.

JuxtaposedJaguar,

The data block would be modified but the signature of that block can’t be recomputed without the key used to sign it

Isn’t that also true of an encrypted checksum, though? For some plaintext block q there is a checksum r, but the attacker can only see and modify the encrypted q (Q) and encrypted r (R). How any change to Q would modify q (and R to r) can’t be known without knowing the encryption key, but the attacker would need to know that in order to keep q and r consistent.

JuxtaposedJaguar,

Maybe I’m Jia Tan 😉

JuxtaposedJaguar,

In exchange, FF uses Google search by default. So they’re also getting direct value from the deal.

JuxtaposedJaguar,

I vaguely remember the advice actually being to leave it running but disconnect it from the internet. Although maybe hard disconnect the backups if you can.

JuxtaposedJaguar,

The classic gonewild is a bit sexist, though. They say it’s for porn of all sexes, but male posts get buried. It’s fine to be female-only, but then just say that.

JuxtaposedJaguar,

My biggest problem with The Matrix is where the machines are getting the food from to feed the humans. You need a continuous supply of food to support continuous energy conversion; that energy isn’t being created from nothing. Normally that comes from the sun photosynthesizing plants (which then works its way up the food chain), but with no sunlight then plants can’t grow. They say they feed the liquified remains of dead humans to the living ones, but even if digestion were 100% efficient (which it definitely isn’t), the amount of usable “food” would constantly decrease until there’s nothing left.

JuxtaposedJaguar,

I still enjoyed the first movie.

JuxtaposedJaguar,

There was a thread about that on c/selfhosted a few weeks ago. Created by a particular wild-cat-inspired sysadmin, I might add.

But on a more serious note, the interactions between a sysadmin and their servers (that they have enough responsibility for to be able to name) are much more intimate than the interactions between a dev and their variables. The server names also exist in a much larger namespace, so they need to be more unique.

JuxtaposedJaguar,

…Because no one else wants to write my documentation.

JuxtaposedJaguar,

I really like that bluetooth devices can still work at distances farther than a typical cable would allow. I have a decently-sized studio apartment and I can see my computer screen from most places. It’s nice to continue watching a video as I move around the apartment to clean, get up to stretch, play with my cat, etc.

You could probably get wired headphones that long, but then you’d be dealing with that giant cable all the time. Or you’d have to constantly swap cables and interrupt the audio during that time. My AirPods work reliably from 15ft away. I can’t argue with that convenience.

JuxtaposedJaguar,

Pi-hole works by giving clients non-routable addresses in response to DNS queries of known ad-serving domains. If the client (web browser, phone, smart device, etc) doesn’t let you set its DNS server (as many no longer do) and doesn’t obey DHCP, then you can’t feed them those addresses. You could block outbound DNS traffic from all clients except your Pi-hole, but in response some clients will just refuse to work entirely. And if they require DNSSEC (or DoT/DoH with a pinned certificate), there’s nothing you can do.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • Durango
  • ngwrru68w68
  • thenastyranch
  • magazineikmin
  • hgfsjryuu7
  • DreamBathrooms
  • Youngstown
  • slotface
  • vwfavf
  • PowerRangers
  • everett
  • kavyap
  • rosin
  • anitta
  • khanakhh
  • tacticalgear
  • InstantRegret
  • modclub
  • mdbf
  • ethstaker
  • osvaldo12
  • GTA5RPClips
  • cubers
  • tester
  • normalnudes
  • cisconetworking
  • provamag3
  • All magazines