refalo

@refalo@programming.dev

This profile is from a federated server and may be incomplete. Browse more on the original instance.

refalo,

gotta see what juicy tidbits are on the old permanent record

refalo,

How is the index page returning an error indicative of federation problems?

refalo,

That doesn’t show the same comment for me, it’s one of the child comments… “show context” and “view all comments” still don’t show me this comment, nor does the user’s profile page.

refalo, (edited )

Nice try FBI.

But seriously… if everyone knew about better options, I think they would already be blocked too :)

refalo,

Some only use a VPN for geoblocks, like to watch the Netflix content of another country… and in that case I think it makes more sense.

refalo,

Isn’t this just a cat-and-mouse or whack-a-mole situation? If the people who create these block lists can also see the new IPs just by having that service, they can also add them to block lists.

refalo, (edited )

Why can’t we have bulk downloads of the main A records for most domains similar to IP block owners? Even if they have to be updated often… I think it could increase privacy.

refalo,

if it was normal it wouldn’t be news

refalo,

guns don’t kill people… stupid does.

there are countries with guns AND no crime.

refalo,

Most people

Then how did google make money?

refalo,

I think a lot more people are jumping ship than getting onboard as of late.

refalo,

Perhaps a fork like Aux, or to Guix

refalo,

It is indeed an effective tool to scare people. Too bad it works

refalo, (edited )

I don’t know, there’s probably not a singular reason. For one, many are just consumers/users and not actual devs, they only want “open source” because people told them to want it, or they think it’s safer or has a better community or something, but many times they don’t actually want it for anything useful besides being able to say it’s open source, even though they never contribute anything. I think these are the kind of users who always demand ridiculous features and way too much time from the real devs.

I’ve also seen other devs that just had wildly different views on fundamental parts of a project, or had unrealistic expectations, or just lived in some kind of fantasy world that most people disagreed with.

refalo,

The effectiveness of obscurity in operations security depends on whether the obscurity lives on top of other good security practices, or if it is being used alone. When used as an independent layer, obscurity is considered a valid security tool.

IMO Obscurity is at least as effective as the attacker’s inability to locate the resource, but I don’t recommend that being your only defense for everything of course.

That being said, you’re absolutely right when you look at it that way. If reverse engineering or copying ASM isn’t out of the question, then IMO all bets are off. Even closed source proprietary programs are not immune from that.

But in the general sense of people casually copy/pasting source code, I think the only defense is not having source available in the first place.

refalo, (edited )

I think we majorly disagree on the definition of “harder” and “just as easy” here. I don’t consider that making me “wrong”, I consider it a difference of opinion. One could argue that it is indeed harder to copy assembly code especially when you do not understand it, or like you contradictingly already stated, when the architecture differs. I was speaking in the context of “the general sense of people casually copy/pasting source code” which I was also implying that meant that those people also did not easily understand assembly already. Sorry for the confusion.

refalo, (edited )

perfectly acceptable

At least some governments in Japan appear to disagree:

jobsinjapan.com/…/housing-discrimination-challeng…

Japan signed the “International Convention on the Elimination of All Forms of Racial Discrimination (ICERD)” in 1996

Tokyo Metropolitan Government educates real estate agents on the illegality of nationality-based rental refusals, considering them discriminatory

And the article itself seems to contradict with those statements…

refalo,

I just saw a post the other day from a guy who dumped fedora because it couldn’t be installed with a Bluetooth mouse.

Allegedly the installer requires a mouse click, and he had no other pointing device. They also said the keyboard navigation was not helpful and was also unable to switch to a console to manually pair his mouse.

refalo,

TIL you can view and reply to lemmy posts from mastodon

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • cisconetworking
  • DreamBathrooms
  • khanakhh
  • magazineikmin
  • mdbf
  • Youngstown
  • everett
  • slotface
  • ngwrru68w68
  • rosin
  • thenastyranch
  • kavyap
  • Durango
  • JUstTest
  • InstantRegret
  • tester
  • osvaldo12
  • GTA5RPClips
  • cubers
  • tacticalgear
  • ethstaker
  • normalnudes
  • provamag3
  • modclub
  • Leos
  • anitta
  • lostlight
  • All magazines