@resist_berlin_ Also, device encryption (while very useful) doesn't solve all of the problems created by unlocking the bootloader. Adding a keylogger to /system is the first thing that comes to my mind - there are certainly more attacks possible (eg. replacing systemui with a one without support for screen locking).
#cloudflare, please protect us. We can trust you as much as we trusted #google in the past. Nothing can possibly go wrong.
Related: 6 stages of debugging...
1. That canāt happen.
2. That doesnāt happen on my machine.
3. That shouldnāt happen.
4. Why does that happen?
5. Oh, I see.
6. How did that ever work?
@lightweight @ruivieira
By using CAPTCHAs you are making your website less accessible on purpose which is terrible on its own, but you justify it by saying it stops bots or only allows humans. You are dehumanizing people by placing criteria on what it means to be human that excludes disabled people. You classify disabled people as non-human. Even more importantly: You are making these human variations not just variations but disabilities. You are the problem.
Our focus should be on prosperity and quality of life, not growth. Most gov'ts are actually presiding over fragile ponzi schemes - I hope that much is now clear to us all.
another classic favorite of mine:
<@insomnia> it only takes three commands to install Gentoo
<@insomnia> cfdisk /dev/hda && mkfs.xfs /dev/hda1 && mount /dev/hda1 /mnt/gentoo/ && chroot /mnt/gentoo/ && env-update && . /etc/profile && emerge sync && cd /usr/portage && scripts/bootsrap.sh && emerge system && emerge vim && vi /etc/fstab && emerge gentoo-dev-sources && cd /usr/src/linux && make menuconfig && make install modules_install && emerge gnome mozilla-firefox openoffice && emerge grub && cp /boot/grub/grub.conf.sample /boot/grub/grub.conf && vi /boot/grub/grub.conf && grub && init 6
<@insomnia> that's the first one
RT @SJKSalisbury@twitter.com
For those preparing for isolation, please remember to hide a series of notes, diary entries, and audio recordings that chart your decline around your home, so that players can slowly piece together what happened and earn the Find All Collectibles trophy.
š¦š: https://twitter.com/SJKSalisbury/status/1238037573282430978
Today I learned that many/most color laser printers layer an array of yellow microdots on top of documents š¬
This Machine Identification Code https://en.wikipedia.org/wiki/Machine_Identification_Code encodes a print date and a serial number unique to the machine. It only became public knowledge in 2004, ~20 year after deployment š
The Technical University of Dresden released a tool 2 years ago to layer on _even more dots_ to render the MIC unreadable and aid whistleblowers publishing https://github.com/dfd-tud/deda ā
Want to help fight #covid19 ? Download client from foldingathome.org -> Install -> Set category to "ANY" is prioritized. GPU and CPU projects are up.
in my dream-future-present there are countless protocols and countless apps that use countless subsets of them to communicate. some types of data are appropriate for broad syndication, some arenāt, but in either case itās trivial to prove matters like authorship or integrity for a given object or identity. āthe webā becomes an emergent property of your infraās supported protocols rather than a bequeathed index of purchased names
About time somebody wrote about Silicon Valley apologists
"The prodigal tech bro doesnāt want structural change. He is reassurance, not revolution. Heās invested in the status quo."
"Prodigal tech bro stories skip straight from the past, when they were part of something thatāsurprise!āturned out to be bad, to the present, where they are now a moral authority on how to do good, but without the transitional moments of revelation and remorse."
The Prodigal Techbro
https://conversationalist.org/2020/03/05/the-prodigal-techbro/
# Regarding why software is so bad
> There is no way for Google, Facebook, or Twitter to quit ad revenue and continue to exist in the marketplace. There is no way for Microsoft or IBM to turn down contracts with body counts and continue to maintain their power. Profit enthralls them, and it infects our craft. To afford food, we have paywalled the sum total of human knowledge.
@gabriellelim We're glad it exists too.
I was going to ask if you had any suggested readings or a bibliography, and do you ever: https://citizenlab.ca/wp-content/uploads/2019/05/Disinformation-Bibliography.pdf
(That's 72 pages worth, peeps.)
Yours is bigger than mine: https://old.reddit.com/r/dredmorbius/comments/7k7l4m/media_advertising_sustainability_externalities/
Squawk at us, y'hear?
Aggrorithm (n): an algorithm written to incite aggression. Aggrorithms are a dark pattern employed by businesses with bottom lines tied to confrontation and conflict (āengagementā). Profiling data is used to nudge users into conflict and increase revenue.
Advertising Is a Cancer on Society
...Real world advertising is not about informing, it's about convincing. Over time, it became increasingly manipulative and dishonest. It also became more effective. In the process, it grew to consume a significant amount of resources of every company on the planet. It infected every communication medium in existence, both digital and analog. ...
-- @temporal
So you want to know about how starships work, huh? Well you came to the right place.