sorted by: new top controversial old
[-] Bitrot@lemmy.sdf.org 1 points 1 day ago

Harder on the corporate side, but this has been an issue in the warehouses.

[-] Bitrot@lemmy.sdf.org 17 points 3 days ago

Encrypt them before they’re ever put there. One example I can think of is in resilio sync, which has the option for sharing a folder to an encrypted peer. Other peers encrypt it before sending anything, that peer doesn’t have the decryption keys at all.

[-] Bitrot@lemmy.sdf.org 1 points 4 days ago

Yeah, I want my passwords unencrypted in the browser, where they belong!

[-] Bitrot@lemmy.sdf.org 3 points 4 days ago

Remainder that Tails is an NSA PRISM targeting keyword. Congrats on making the list, folks!

[-] Bitrot@lemmy.sdf.org 47 points 4 days ago

They are logged, but swatting people get around it. They are suspicious “looking” calls, but so are bomb threats.

Swatting is pretty much always a blocked number to a non-emergency line. If they are traced it is typically one of those free online voip services. It takes work and access to really get from A to B, which is why it only happens when there are awful results.

In the US at least, 911 gets special access and calling it will always get you to your local dispatch (unless you have voip with the wrong account address). Non-emergency is just a normal phone number. If someone wants to call from out of the area or hide their number, non-emergency is how they have to do it. This is suspicious because in a real situation like “I just shot my dad” or whatever they say, nobody is taking time to look up non-emergency.

[-] Bitrot@lemmy.sdf.org 2 points 5 days ago

It has activation issues as the license is tied to hardware. If you have a retail license tied to your account it will prompt you to transfer from another machine, OEM does not. Nowadays people don’t even get a key, although it can be extracted from the firmware.

[-] Bitrot@lemmy.sdf.org 1 points 5 days ago

Most people are running Windows OEM licenses that don’t transfer to VMs. A retail license you can move around.

[-] Bitrot@lemmy.sdf.org 5 points 1 week ago

It’s probably something most people could learn a bit more about. On Red Hat or Fedora you don’t have to get too far out of vanilla before SELinux starts breaking things (oh, you wanted your custom systemd service to run that binary from that directory? Tough! Figure it out!), in comparison AppArmor on Ubuntu and Debian seems to get in the way a lot less. I’m not sure if that’s due to how it functions as a product or upfront work to configure it to be less intrusive.

[-] Bitrot@lemmy.sdf.org 5 points 1 week ago

Specific configuration is an implementation, as are hooks they may add to their own software to leverage features. Both Debian and Ubuntu also build their own profiles.

[-] Bitrot@lemmy.sdf.org 11 points 1 week ago* (last edited 1 week ago)

Thats why they said “Ubuntu’s AppArmor implementation”, as in how they configure and integrate it.

[-] Bitrot@lemmy.sdf.org 4 points 1 week ago* (last edited 1 week ago)

CEC. Typically works well. Sometimes buggy.

[-] Bitrot@lemmy.sdf.org 11 points 1 week ago

Throwing all the taking points into a bucket. I bet those prisoners are also learning critical race theory.

view more: next ›

Bitrot

joined 1 year ago