Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)DM

🚀 Seen my posts and want more? Dive deep into the issues with Big Tech at Escape Big Tech!

💡 Need FOSS-focused software solutions? Reach out on Matrix at @dannym:balooga.xyz!

Posts
16
Comments
184
Joined
2 yr. ago
  • definitely agree with you.

    also PGP is so easy to use that honestly I really cannot grasp why it's not more used for critical communication like this. if the emails were encrypted this would be much less of a problem

  • The main thing I would point to is that Matrix itself only does text; the Element client uses Jitsi to add in audio/video calls and screensharing [...]

    Matrix VoIP is a thing, and it's usable for audio & video on many clients, element and fluffychat come to mind, but probably more.

    element call is also coming into element (and possibly other clients) for video calls and screensharing

    My other gripes are just with the user interface, [...] it really doesn’t look like Discord

    why does that matter?

  • The medical industry has very bad security practices in general from what I hear. You can basically expect that your medical history is accessible to lots of companies that should have nothing to do with it, not just Microsoft. Pretty much all of your health data is probably in the hands of at the very least Google and Amazon and the sad reality is that people don't care about security and privacy until it's too late. The number one server provider for anything healthcare related is AWS and the legal requirements they have to follow for data protection, HIPAA, are the sort of requirements that only a politician would think are actually beneficial to keeping data secure.

    EDIT: to be clear, I hate it, and I think you made the right choice, but sadly expecting privacy of our medical information is gonna keep being a battle, until the medical industry starts taking it more seriously

  • Thanks for checking out the article! As for skimming through it, well, I guess I'll take that as a hint that I need to write shorter posts as I do have a tendency of blabbering too much when writing haha

    I didn't know about scribe.rip, I will definitely use that instead of medium from now on thank you!

  • Permanently Deleted

  • Those tests are worth more than four years of college?

    Yes a test to figure out if you can perform your job is significantly more valuable than a collage degree, this doesn't mean that college has no value, mind you, it just means that knowing how to do the job and knowing that you fit in with the company culture is vastly more important.

    Go get a bunch of I.T. certifications. Get your CompTIA A+, Network+, Security+ Get a Microsoft MCP or MCSA

    Those certifications are useless, they look good on your resume because managers love showcasing their staff's "certifications", as many companies that don't understand IT put value on the certifications more than anything else, but they don't actually provide you any value in of themselves. Sure it might be interesting how many network switches you can daisy chain according to the standards, but it has no real value most of the time, if that's information you need in your job it's something you can just look up, HOWEVER, asking you random questions that pertain to the job during the interview IS a good way to understand if you're a good candidate, and, often, the actual response doesn't matter as much as your reasoning for getting to that response.

    When an interviewer at google asks you how many pennys it would take to make a structure as tall as the empire state building, it doesn't matter what the answer is, truly, even if you got the exact number of pennys, just saying the number would mean you don't pass the interview, your answer would be worth less than an answer that gets it wrong by 75% but is well reasoned, what they care about is how you come up to the conclusion that you come up with, the solution is useless.

  • That’s not the issue. You can attempt as many passwords as you want in actually secure password managers as well. KeepassXC for instance IS secure, you can still brute force the password, but because of the hashing algorithm they use it’s extremely hard. With PKZIP if you know some of the words in the file, you can easily guess the password in just a few hours because the encryption algorithm it uses isn’t secure

  • Thank you! More people should do this. It may seem like $5 is nothing, but it’s actually great help. Even $1 helps out FOSS projects, as if even just 1% of the users of such projects donated $1 each month that’d be able to make a good income,

  • How about using LDAP? It's a bit complicated to learn but it's easy to integrate it in a bunch of applications and it allows you to manage user accounts and permissions in one central place.

    Maybe try LLDAP which is a modern implementation (haven't used it myself) which is designed to be simplified and I assume more welcoming to newcomers.

  • Technology @beehaw.org
    Danny M @lemmy.escapebigtech.info

    I'm a software engineer and I love actual technology, but I think we have reached the peak of mt. stupid

    Technology @lemmy.ml
    Danny M @lemmy.escapebigtech.info

    TKey: A reasonably secure RISC-V computer in a USB stick

    Note: I am not affiliated with the project

    Technology @beehaw.org
    Danny M @lemmy.escapebigtech.info

    TKey: A reasonably secure RISC-V computer in a USB stick

    Note: I am not affiliated with the project

    Technology @lemmy.world
    Danny M @lemmy.escapebigtech.info

    TKey: A reasonably secure RISC-V computer in a USB stick

    Note: I am not affiliated with the project

    Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ @lemmy.dbzer0.com
    Danny M @lemmy.escapebigtech.info
    Technology @lemmy.world
    Danny M @lemmy.escapebigtech.info
    Privacy @lemmy.ml
    Danny M @lemmy.escapebigtech.info
    Escape Big Tech @lemmy.escapebigtech.info
    Danny M @lemmy.escapebigtech.info
    Escape Big Tech @lemmy.escapebigtech.info
    Danny M @lemmy.escapebigtech.info
    escapebigtech.info Showcase Friday #2: Purplix, end to end encrypted surveys

    Welcome back to Showcase Friday, my enlightened Penguins of the digital tundra! I present to you another hidden FOSS gem this week. This week, we’re diving into Purplix, the survey platform that gives Big Tech a proverbial wedgie by encrypting everything end-to-end! Yes, you read that right: everyth...

    Escape Big Tech @lemmy.escapebigtech.info
    Danny M @lemmy.escapebigtech.info
    escapebigtech.info Showcase Friday #1: Nextcloud

    Welcome to Showcase Friday, put down those fish and listen up. Today is no ordinary Friday—it’s Showcase Friday, the day we plunge headfirst into the icy waters of Free and Open-Source Software. Showcase Friday is a new series of articles where I’ll be showcasing a FOSS project that I think deserves...

    Privacy @lemmy.ml
    Danny M @lemmy.escapebigtech.info

    Total surveillance: How today’s digital mass surveillance threatens free societies

    Privacy @lemmy.ml
    Danny M @lemmy.escapebigtech.info
    Escape Big Tech @lemmy.escapebigtech.info
    Danny M @lemmy.escapebigtech.info
    Escape Big Tech @lemmy.escapebigtech.info
    Danny M @lemmy.escapebigtech.info
    escapebigtech.info In Defense of Bounties in Open Source Development

    The recent blog post by Andrew Kelley and Loris Cro about the supposed damages bounties inflict on open source projects, like Zig, warrants a well-articulated counter-argument. In this article, we’ll explore the oft-ignored benefits of competition in Free and Open Source Software (FOSS) and how the ...

    Escape Big Tech @lemmy.escapebigtech.info
    Danny M @lemmy.escapebigtech.info
    escapebigtech.info Dependent devices are not smart

    The “smart” home of the future: a paradise where devices cater to our every need, adjust to our routines, and offer unprecedented convenience. While this dream is often powered by proprietary systems and platforms, we’ll explore why the Free and Open Source Software (FOSS) movement...

    Dependent devices are not smart
    Escape Big Tech @lemmy.escapebigtech.info
    Danny M @lemmy.escapebigtech.info
    escapebigtech.info VPNs - Oh sweet summer child

    Everyone told me to use a VPN to protect myself from tracking online and I know that staying safe online is an ever growing difficulty and I could be exploited by hackers. [REDACTED] allows me to change my IP address, making me harder to track, securing my privacy. The average privacy concious perso...

    VPNs - Oh sweet summer child

    In the realm of Cyberworld, VPNs are akin to knights guarding your privacy. However, they cannot singlehandedly protect you from all the monsters lurking in the Interweb Forest. It's essential to arm yourself with knowledge and the right tools, as your journey through the Cyberworld is filled with threats like Tracker Cookies and DNS Dragons. It's not just about having the right VPN, but also about adopting secure practices to enhance your protection.