Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)S
Posts
1
Comments
348
Joined
3 yr. ago

  • “Counterrevolutionary” is a word devised in order to avoid saying “rules for thee by not for me”.

  • Deleted Locked

    Permanently Deleted

    Jump
  • Genocide is not a numbers competition. Fucking get lost with that narrative.

    Convention on the Prevention and Punishment of the Crime of Genocide is literally four pages long, with barely 30% fill. It takes less than 10 minutes to read it fully. It takes one minute to get to the part that you directly contradict.

  • You’re telling on yourself by claiming those peppers to be unavailable in Europe. I wouldn’t be surprised if you thought cilantro to be exclusively American at this point.

  • Identification != Authentication

    As obvious as this sounds, I’ve learned over the years that most people don’t understand what it means exactly.

  • Monitor the room temperature.

  • It’s called Russia Law because it’s literally a Russian law copied verbatim

  • If you use HTTPS, the attacker can still see what websites you connect to, they just can't see what you are sending or receiving. So basically they can steal your browsing history, which defeats the purpose of a commercial VPN for many users.

    This is blatantly false. They can see IP addresses and ports of you connect to from IP packets, and hostnames from TLS negotiation phase (and DNS requests if you don’t use custom DNS settings). HTTP data is fully encrypted when using HTTPS.

    If exposing hostnames and IP addresses is dangerous, chances are that establishing a VPN connection is as dangerous.

  • Control of the DHCP server in the victim’s network is required for the attack to work.

    This is not a VPN vulnerability, but a lower level networking setup manipulation that negates naive VPN setups by instructing your OS to send traffic outside of VPN tunnel.

    In conclusion, if your VPN setup doesn’t include routing guards or an indirection layer, ISP controlled routers and public WiFis will make you drop out of the tunnel now that there’s a simple video instruction out there.

  • Sounds a lot like US House of Representatives, but in this case I don’t see why not.

  • As we all know, siphoning of the power to the small percentage of people had never happened prior to capitalism.

  • I mean, Schwarzschild radius shows that for a medium of constant density (and on a large scale, Universe is fairly uniform) there is an upper limit of a radius of a ball comprised of said medium above which it will form an event horizon.

    https://en.wikipedia.org/wiki/Schwarzschild_radius#Calculating_the_maximum_volume_and_radius_possible_given_a_density_before_a_black_hole_forms

    Which means that an infinite universe of non-zero density is either a bloody paradox (spend a minute deciding where exactly event horizons should form and whether there will be gaps), or our understanding of gravity and spacetime breaks on ginormous scales just as it does on micro ones.

    PS: I have seen no physicists talk about this, so there’s a good chance that there’s a simple resolution to the problem and I’m just stupid.

  • Support for QUIC and HTTP/3 protocols is available since 1.25.0. Also, since 1.25.0, the QUIC and HTTP/3 support is available in Linux binary packages.

    https://nginx.org/en/docs/quic.html

    2023-05-23 nginx-1.25.0 mainline version has been released, featuring experimental HTTP/3 support.

    https://nginx.org/2023.html

    It’s not a dev code. It would also take a mere minute to check this before failing to sound smart.

  • Even better, the dude forked because a security issue in “experimental” but nonetheless released feature was responsibly announced.

    Talk about an ego.

  • Problem with money is that money only have value when people are willing to exchange money for goods and services.

    The moment that exchange stops, value of money plummets.

    A very good analogy I saw in Charles Stross’ “Neptune’s brood” is that money is a concrete representation of an abstract debt. Exchange materializes that debt into a trade, which is where valuation happens. I’m pretty sure I just made a lot of economists justifiably angry though

  • Yet another piece of evidence about Ukrainians being nazis and terrorists. How dare they show up in a peaceful life of a regular Russian man who’s not at all complicit in Putin’s war!

  • Modern CPUs are also extremely efficient at dealing with contiguous data structures. Branch prediction and caching get to shine on them.

    Avoiding memory access or helping CPU access it all upfront switches physical domain of computation.

  • So many castles lost to recent history…

  • Please correct me if I’m wrong, but doesn’t this allow one to represent virtually any resource as a mail inbox/outbox with access through a generic mail app?

    I’m working with a specialized healthcare company right now, and this looks like a way to represent patient treatments data as an intuitive timeline of messages. With a local offline cache in case of outages. Security of local workstations is a weak point of course, but when is it not…