Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)AS
asmoranomar @lemmy.world
Posts 0
Comments 43
Democrats' Gen Z dream just died
  • Keep in mind that part of the reason I think they've given up is because there's no reason to believe the promises made will ever be delivered. They may care about taxes, but you'd probably get more engagement by making an AI generated tiktok video of a dinner table splayed with food in the image of rich oligarchs. There just isn't much left but the jokes, it's not code - it's that if everything is going to be bullshit, it might as well be entertaining.

  • Democrats' Gen Z dream just died
  • Everything has to be a meme. Lower taxes, healthcare, or racism isn't exciting. Couches, weird, eating pets and out of context outbursts get way more engagement. Mostly, because people have given up.

  • Boeing allegedly overcharged the military 8,000% for airplane soap dispensers
  • Let's not also forget the fleet of passenger aircraft for distinguished persons, maintained by the military, with everything custom made and embroidered with presidential seals and produced in the USA and run through vigorous inspection to prevent microphone or pagers or something inside your soap dispenser.

  • Chinese scientists hack military grade encryption on quantum computer: paper
  • There's also no such thing as "Military Grade" Encryption. The government as a whole, as directed by NSA, uses the same encryption technology. If anything, one of the defining techniques is how said technology is implemented as a process. That means less about the algorithm and more about the hardware and handling. For example, when dealing with classified networking, one of the key differences is using dedicated hardware. These aren't PC's that can be hacked, they are devices whose specific role is to handle encryption, key loading, or key acquisition. They are hardened to prevent emissions from leaking and will dump keys, firmware, memory if tampered with. End devices can only accept keys with no way to retrieve them for reuse.

    Advertisers that claim they are offering you "Military Grade" encryption just do regular NSA encryption methods in software, with no hardware component, and no handling process. Which would never be used in the military to secure classified data.

    Also, most encryption used in these devices don't use one key, they use key generators. Each device talking to another generates a unique, temporary session key. These session keys do not last long, so if any one key is compromised it limits any potential unauthorized disclosures. Capturing encrypted data for later cracking would prove to be a time and resource exhausted process that would provide too little information, too late. At this point it would be easier to actually try to steal the keys and hardware, rather than crack them.

  • Cox slows Internet speeds in entire neighborhoods to punish any heavy users
  • The same thing happened to me years ago. When I complained the response was that "unlimited" meant "we don't block access to the content we provide you", not "you can expect to download speeds at maximum throughput". This was many years ago before net neutrality was a buzzword, and it was common for certain carriers (like cellular) to serve up alternative sites or isp's prevent you from running quake servers or such. Not sure if that's the excuse now, but it's vague for a reason so they can exercise that wordplay.

  • Starfield's first DLC is one of the worst Bethesda DLCs of all time
  • I feel like starfield is an experiment in user driven content (mods) to sell a game. The issue with Skyrim is that there is really only one map, and before any map extension mod came out, there were so many mods out there that competed for space on the map. Even today, large world overhaul mods are constantly stepping on the toes of other mods. City redesigns are also a problem unless you're really good at load orders and merging.

    Starfield feels like each world is an open map, ready for people to start designing content: either a colony, a cave, or anything really. The story seems loose and open ended so that it won't interfere with large collaborative content. It's not a game they are selling, but a modding storefront. It's like Skyrim Creations, but putting the horse (armor sold separately) before the cart.

  • They did the math
  • A little known side effect of the Schrodinger's Equations is that sometimes the cat isn't dead or alive, it triggers recursion and now you have a cat in a box within a cat in a box within a ....

  • mf'ing 8K banana PNGs
  • In it's early days? My nephew played that a long time ago. It filled his PC. I thought it was mods. As in, the entire game would clone itself when it created a mod profile. I don't think it does that anymore.

  • Who still uses pagers?
  • Pagers are not guaranteed to be 1 way comms and bringing them into secure locations is a security violation. Additionally, depending on the classification, no unauthorized and undisclosed devices of any kind would be permitted, including any electronics or electronic media such as tapes, CDs, discs, etc. Even when I was issued a verified 1-way pager, I was specifically briefed I was not permitted to bring it into a classified location. Most of the highly classified SCIFS are shielded anyways, you can't use it inside so it's safer to leave it out, along with all other devices.

    If your organization allows it, then (if federal) they are breaking the law and should be reported/up-channeled. If it's corpo, you should bring up additional concerns with your security team.

    Edit: Also, it goes without saying, current events are probably a good reason why pagers (and other devices) aren't allowed in classified areas. While most focus on disclosure (getting out), we must not forget the risk of data/operations getting destroyed.

  • Navy commander relieved of duty after photo showed him firing rifle with scope backward
  • All valid concerns, but the fact is if you accept the weapon and anything happens, you are at fault.

    We've had people get issued, and immediately, check and clear their weapon in the presence of an armorer in the bucket, and get in trouble for it misfiring, despite the fact that it should have been checked and cleared prior to change of hands and in addition to the fact that you hadn't been issued ammo yet. It's dumb, but people die over this, so they are very strict, even when it sometimes seems unnecessary.

  • Navy commander relieved of duty after photo showed him firing rifle with scope backward
  • We've had similar incidents with weapon safety (and other things) in the past that were more serious than what was going on in that picture. It all depends on the circumstances, and I've seen it go both ways. The point I was making is if there was anything more substantial, it would not just be 'relieved of command'. No mention of an actual reprimand, which is more serious. I'm not saying it couldn't ultimately lead up to that, but we don't know that yet.

  • Navy commander relieved of duty after photo showed him firing rifle with scope backward
  • It was also a relief of command, not a court martial, not non-judicial punishment, not a demotion or and not a punitive action. It happened because it affected the image of the force, but not necessarily anything that is terribly bad. Relieving someone of command can be a precaution or a temporary measure, not always leading up to anything drastic. He will probably get additional training and a small mark on his record that will go away in a short time as long as the trend doesn't continue. He may even still get to keep his command or just move somewhere else to command.

  • Layered encryption?
  • In some instances of private/public key systems, this is done. It's mainly for the purpose of ensuring the recipient knows who the sender was and also ensuring the sender knows who the recipient is.

    Quick primer: If you encrypt with your private key, everyone knows it was sent by you. If someone encrypts with your public key, they know you will receive it. Use your private key and someone's public key together and you know only that person got it.

    In practice, lately another step is added to negotiate a third temporary/session key. This ensures keys aren't used forever, and if compromised a new one can be generated. This is more secure than encrypting twice, because you never know what data is sensitive and picking the wrong one requires the attacker to start from scratch.

  • There has to be another way
  • I used to exercise quite a lot, I know what the runners high feels like and how being sore and able to use motion and stretching to alleviate the soreness felt so good. I could easily lose myself when I exercised.

    I don't get that anymore. I have bad joint pains, I never get that high feeling anymore, and everything is a distraction. I want to go back, but whatever happy chemicals used to work no longer do and what's left over makes the whole endeavor feel the opposite.