• 0 Posts
  • 118 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle
  • Most of America (all but 7 states) and all of Canada are one-party jurisdictions. That means you can record conversations without anyone else knowing so long as you are a primary participant in said conversation.

    If you have an iPhone (which prevents calls from being recorded as a security feature), it helps to invest in a small digital recorder and to take all calls on speakerphone.

    If you take communications through apps like Teams or Slack, there are third-party apps that can screen record your entire monitor such that the other person won’t be informed of the recording. Recording through teams, for example, would have Teams tell the other person that the screen is being recorded.

    Don’t just record convos that you think might be important. Record all calls just in case someone does something particularly in your favour, such as asking an illegal question.




  • Legally they cannot.

    gender supremacists:

    “Hold my beer and watch me do exactly that. Again and again and again without any censure or pushback, purely because I am being a gender bigot against men, and for no other reason. We have full societal and legal ability to employ open misandry, because opposition of any kind is misogyny by default.”

    domestic violence happens to men too.

    71% of non-reciprocal (only one person being abusive) physically violent (actually striking) domestic violence involves women striking men.

    As in, 71% of those victims are men.

    And under those same conditions (non-reciprocal physically violent DV), two-thirds of victims that were injured seriously enough to require hospitalization were men, yet almost 100% were also arrested as the “perps”, even though they were the only victims.

    Losts of people have problems with these facts. Wild how bad anti-reality ideological indoctrination has gotten.



  • If someone owns a billion dollar company (based on the price of their shares of stock) we call them a billionaire but they might not have very much money in cash (say a few million).

    And yet…

    The moment shares are used as a source of value to leverage, they should be taxed on that assessed value. Because this is also how so many of the wealthy can get away with “$0 income” - they are “paid” in shares, then turn around and use those shares to get loans from the bank to pay their living expenses. They essentially leverage shares for tax-free income.

    If any and all leverage on shares are taxed on that assessed leverage, the Parasite Class would no longer have any way to shield their obscene wealth from taxation.




  • The fact that the deceased man had his hands and feet tied at the time of his death has led many in the public, including investigators, to treat the death as murder.

    So, not immediately being dismissed as a suicide?

    Amazing.

    Belgian investigators might actually be rubbing more than two functional neurons together, and are realizing how stupid they would look if they actually punted the suicide angle.

    Officials, however, continue their illustrious tradition of running entirely functional-neuron-free.




  • 16 characters was the minimum length a password should be due to how easy it was to crack… something like a decade ago.

    Now it’s something like 20 to 24 characters.

    Seriously, if your company is defining maximum password length and demanding specific content, it is failing at the security game. Have the storage location accept a hashed UTF-8 string of at least 4096 bytes - or nvarchar(max) if it’s a database field - and do a bitwise complexity calculation on the raw password as your only “minimum value” requirement.

    Look at how KeePass calculates password complexity, and replicate that for whatever interface you are using. Ensure that it is reasonable, such as 150-200bit complexity, and let users choose whatever they want to achieve that complexity.


  • rekabis@lemmy.catoLinux@lemmy.mlProjects To Watch Out For: Ladybird Browser
    link
    fedilink
    arrow-up
    20
    arrow-down
    6
    ·
    edit-2
    1 month ago

    We don’t have anyone actively working on Windows support, and there are considerable changes required to make it work well outside a Unix-like environment.

    We would like to do Windows eventually, but it’s not a priority at the moment.

    This is how you make “critical mass” adoption that much more difficult.

    As much as I love Linux, if you are creating a program to be used by everyone and anyone, you achieve adoption inertia and public consciousness penetration by focusing on the largest platform first. And at 72% market share, that would be Windows.

    I hope this initiative works. I really do. But intentionally ignoring three-quarters of the market is tantamount to breaking at least one leg before the starting gate even opens. This browser is likely to be relegated to being a highly niche and special-interest-only browser with minuscule adoption numbers, which means it will be virtually ignored by web developers and web policy makers.


  • Any brands protected by American law must be independently-owned, with full transfer of all branding, patents, trade secrets, intellectual assets and physical assets.

    So, for example, for even a single bottle of Perrier to be sold in America, it needs to have been made by a company registered with the brand name of Perrier, with exclusive use of that name within the country, independently owned and under zero control by Nestle, being manufactured using the exact same process with the exact same ingredients, and having control of the exact same patents and American-side infrastructure.

    America is such a large marketplace that it would be impossible to split a company like this. Patents alone would prevent this, forcing Nestle to divest themselves of each individual subsidiary.




  • I remember reading about a guy who got on the list because he got blackout drunk and peed on a fence. At something like 2AM. That fence? Happened to be an Elementary school fence. So his life got destroyed because he peed in the wrong place, while too drunk to even know where he was, even though there were absolutely no children in the area to “harm” at the time of the incident.

    I am all for strong laws that put large barriers between actual pedophiles and children. But current laws are hoovering up far too many people who are not pedophiles in the least.


  • His router is tri-band though meaning it has 2 5ghz transceivers.

    Unfortunately, for many models - like the Linksys WRT 3200ACM - that second antenna (technically the third one if you include the 2.4Ghz one) doesn’t function at all without the manufacturer’s firmware. It’s a dead stick with any third-party firmware, and is 100% software-enabled.

    I have found this fact to be reliable whether it is DD-WRT or OpenWRT, and across several different manufacturers including Asus and D-Link.


  • What makes the built-in database easier to attack than a separate one?

    For performance reasons, early versions weren’t even encrypted, and later versions were encrypted with easily-cracked encryption. Most malware broke the encryption on the password DB using the user’s own hardware resources before it was even uploaded to the mothership. And not everyone has skookum GPUs, so that bit was particularly damning.

    Plus, the built-in password managers operated within the context of the browser to do things like auto-fill, which meant only the browser needed to be compromised in order to expose the password DB.

    Modern password managers like BitWarden can be configured with truly crazy levels of encryption, such that it would be very difficult for even nation-states to break into a backed-up or offline vault.