None of that amature level pain here.
- 0 Posts
- 163 Comments
ShellMonkey@lemmy.socdojo.comto Today I Learned@lemmy.world•TIL - About Room 641A - NSA intercepting everything at AT&TEnglish311·16 days agoProject Prism, supposedly shut down but realistically a safe bet the painted the door and said it’s totally not them any more.
You got F’d when you 69’d in school? Sounds wild.
ShellMonkey@lemmy.socdojo.comto Lemmy Shitpost@lemmy.world•I tried this coffee but it kept sticking to my teethEnglish15·1 month agoA cafe selling ‘cum drops’ in Bangkok, they knew what they where doing.
ShellMonkey@lemmy.socdojo.comto Cybersecurity@sh.itjust.works•US Warns of Heightened Risk of Iranian Cyber-Attacks After Military St - Infosecurity MagazineEnglish1·1 month agoDonnie soon; ‘computers are for nerds, I don’t use em, we where a lot better off without all this cyber nonsense, and their Intel is wrong, Tulsi is wrong here, should have gone with AMD, sound a lot like and, and this and that, brings things together…’
ShellMonkey@lemmy.socdojo.comto People Twitter@sh.itjust.works•Overview of the Iran-Israel Conflict - June 22, 2025English16·1 month agoIt’s kind of unfortunate that Democrats tend to be more respectful of people’s property because the Trump ‘I did that’ stickers would be flying off the shelves otherwise when this stupidity spikes gas prices.
ShellMonkey@lemmy.socdojo.comto [Closed] Moved to !fedigrow@lemmy.zip@lemm.ee•RFC - Every community should have active moderators or get auto-lockedEnglish10·2 months agoI would think this all this is perhaps a personal preference on a given instance, but not practical on a global scale.
If an instance owner wants to accept the risk of a chaotic, unmoderated space on their server so be it. Other instances are quite capable of blocking a comm or defederating if it’s an instance wide problem.
There’s also the potential to blockade new comms on small instances when I think of it here. If I, as an admin of a single person instance, try and set up a few niche comms for personal interests and they where report-bombed by people just being trolls, there would never be a way to get them off the ground. You would spend all your time responding to reports rather than creating content in order to avoid them being locked.
ShellMonkey@lemmy.socdojo.comto [Closed] Moved to !fedigrow@lemmy.zip@lemm.ee•bad stonks :(English3·2 months agoNot bad at all, we got about 5M users since the 27th it seems.
ShellMonkey@lemmy.socdojo.comto Privacy@lemmy.ml•The European Comission is looking for feedback on forcing retention of metadata from all communication services for "a reasonable period of time", for purposes of criminal investigation!English1·2 months agoRight, I just use the term sometimes to say hiding things, even if it’s hidden via encrypting it.
Will have to delve into the papers for simplex later here, but in the end there needs to be some type of known identity to pin a communication to, otherwise you’ve already breached the confidentiality point of the security triad by not authenticating the recipient.
ShellMonkey@lemmy.socdojo.comto Privacy@lemmy.ml•The European Comission is looking for feedback on forcing retention of metadata from all communication services for "a reasonable period of time", for purposes of criminal investigation!English1·2 months agoI would say no criminal uses public services to do their business, but then there was the whole Signal thing at the DOD…
ShellMonkey@lemmy.socdojo.comto Privacy@lemmy.ml•The European Comission is looking for feedback on forcing retention of metadata from all communication services for "a reasonable period of time", for purposes of criminal investigation!English1·2 months agoIt depends on how many layers of obfuscation you are looking to deal with. There always needs to be some publicly shared token to initiate a connection, even if that’s only the public key of a asymmetric key pair to a 3rd party auth system.
There are ways to do it, but part of the difficulty is there are so many ways to do it that coming to an agreed method is like herding cats.
ShellMonkey@lemmy.socdojo.comto Privacy@lemmy.ml•The European Comission is looking for feedback on forcing retention of metadata from all communication services for "a reasonable period of time", for purposes of criminal investigation!English10·2 months agoWhich means encrypted messaging without a backdoor would be illegal if this passes! That’s a slippery slope!
Metadata is not content, so no E2E would not be illegal. Metadata is things like who sent messages to who at what time, duration, volume of data, other externally parsable metrics like that.
ShellMonkey@lemmy.socdojo.comto Privacy@lemmy.ml•Can I delete my Lemmy account and just vanish?English6·2 months agoIt’s interesting that this is kicking up some controversy. Personally I’ve held similar thoughts since the time of AOL, that once it leaves your system it’s no longer in your control. You can ask people to delete it, and maybe they did, or maybe they deleted the one copy but not the cache version, or maybe just didn’t and lied about it. I’ve actually accidentally found stuff I thought was long lost when I decided to just mess around with some data recovery tools and pulled a bunch of pictures back from a drive I didn’t remember them ever being on.
One of my kids I saw take a picture of a snapchat with another phone. Asked what they where doing and it was explained that if you do a regular screenshot it notified the other person, so this was how they kept a copy secretly. So with that in mind, you never know who has copies of what that was posted.
All the fediverse stuff is pretty well plugged into each other, how well they interact is another matter though. I’m wishing for the day when federated ID happens so the same ID can be used on multiple platforms.
Kids and their fancy winders machines…
Local hardware shop, some assembly required. Nothing says it needs to be extraordinarily fancy so long as it keeps the contents dry.
ShellMonkey@lemmy.socdojo.comto People Twitter@sh.itjust.works•The new-age edge of MAGAismEnglish14·3 months agoSo who’s gonna propose we bring back leeching and lobotomies first, this lady or captain brain worm?
ShellMonkey@lemmy.socdojo.comto Cybersecurity@sh.itjust.works•Attacks surge against antiquated routers, FBI warnsEnglish2·3 months agoRouters don’t even need to be old to be targets. A sizable chunk of people will plug in a router, set up the WiFi and never touch it again other than to reboot so the firmware is never updated again.
It really has become a perennial thing, but with the inmates running all three houses of the asylum this time it’s a particularly dangerous round.
Long running troll, posts a bunch of hyper-capitalist, winner take all, libertarian bullshit. I’d almost call it a bit.