No, no, no. It’s clearly a city since the photo is flight info boards. Clearly he means Dallas Tort Worth, it’s a little tiny place unlike its bigger brother DFW.
Martian colony, 2224, your guide at the Museum of Mars: And here we have the famous hitchhiking stone, which was retrieved after a 3500 kilometer trek from the colonial landing site to reclaim the Perseverance so that these two old friends could finally be reunited in time for the 200th year anniversary of their untimely separation.
“Don’t forget to stop by the give shop and pick up your ‘hitchhiking stone’ keychain!”
“Why do they call a cheap piece of plastic shaped like the rock with a small split ring attached to it a ‘keychain’? What does any of this have to do with digital encryption keys?”
“I don’t know either, but make sure to buy one as a souvenir.”
I work in IT. We don’t run CS here, but a bunch of clients of my old employer do. I had just shitposted about this fiasco in a discord server populated with fellow techs from that company, fired up lemmy, and this was the first post. What a fucking banger! I immediately shitposted again pasting this image. You’ve made my day. I need to stop using the internet because it’s all downhill from here. Thank you.
Fun story, my company just kicked off a PoC with crowdstrike 2 days ago. So far my computer was the only one that the agent was on as we had other work that needed to be done and we paused the rollout to the rest of my team. I woke up to boot loop hell today. Got it fixed right away, but so glad we didn’t roll it out any further. Not a good look to be starting a PoC with.
Sophos endpoint for years. We had an issue like this when we installed their software on one of Microsoft surface that use MS CPU we bricked every one of them. Kept Sophos and got rid of all the surfaces with Microsoft CPU.
If it’s any consolation, this is the first issue of its kind in the multiple years we’ve been using CS. Still unacceptable, but historically the program has been stable and effective for us. Hopefully this reminds higher ups the importance of proper testing before releases
For sure, my previous company I left last August ran CS for 3 years and we had no issues. Hopefully they hire a bunch of QA folks that were probably part of the layoffs earlier this year.
I mean it seems almost impossible that they either didn’t have a staging process to test N number of machines either virtual or otherwise or it passed through but it just seems insane that a problem of this magnitude went out to this many people.
I like how the image itself is ai generated for some reason (as if there weren’t enough images exactly like this you could use) but the bandaid is just poorly shopped onto it.
Because AI art is shit at this kind of thing. Not incapable of, just absurdly fiddly to get obedience from. It’ll get you 75% of the way there, and then you actually need to know how to edit an image, which is where it lets you down.
Go ahead and try generating images of a family during benediction wearing ear bandages and you’ll find it really struggles with getting that last part right because it’s not typical subject matter.
I believe it’s about how often the app is used. Advertisers label people with “gullible” and stuff like this, so when you use a calculator regularly, that may be a hint that you are not.
This is why everyone is trying to have their app installed, there’s a lot of information that the phone provides, and now you no longer get warned what data is available.
If we collect data and we do vaguely here’s what we might do which might include this other stuff that we might or might not do depending on what data is being collected.
That’s basically the language. It’s so vague and general/generic and it applies to all products, that it’s impossible to know what is being collected without sniffing the traffic (maybe?).
Same as for any app: crash reports, to fix issues.
I was curious so I installed it (it’s the Google calculator app), and it just links to the generic Google privacy policy. There is nothing specific to the Calculator.
The reason the Linux kernel on Android does not have root and it is so challenging to hack the devices for the first time is because of how the user space is made.The entire premise of a device where the user is not required to understand graduate level computer science, networking, and operating systems, is based upon a simple principal. The mobile operating system is designed so that the app developer is essentially a user with the same privileges as the user. In practice, they are at the same access level but have far more knowledge about what that means and what they can do with it. The reason the root binary packages like su or sudo are not present is so that the app developer can not intentionally (or accidentally) take over the device completely. When the hardware manufacturer is done setting up the device’s OS, they log out with a script that removes all administrative access and any packages that can be used to import a new kernel binary like wgetgit or curl. The app developer is using a sandbox that is something like your user space sandbox. Within that app sandbox they have access to all kinds of stuff needed to configure almost any service, network, hardware access, or library they need in order to make their stuff work. This is what is being abused for data mining stalkerware. With Android, all applications are loaded into memory on boot. The excuse given is faster boot up of applications. In practice, this is a small fraction if a second difference with no bearing on your persistent mental level of comprehension. These apps are like users all traveling along with you in the background 24/7. Indeed, the integrated battery is a hacking exploit to maintain continuous operations of the stalkerware and promote users never fully power cycling their devices so that these apps remain uninterrupted. It is not about the calculator. It is about the stalkerware, which is ultimately ownership over a part of your digital person with the intent to manipulate, aka digital slavery. Search engines are not deterministic. There are only two relevant web crawlers and all search engines use these either directly or indirectly. This is the primary choke point where you can be easily manipulated with information, especially when combined with YouTube’s link to one of these crawlers. This is not banner ads, this is political opinions, foreign policy, and manipulation of information down to the individual scale. It is theft of autonomy. It is an attack on the third pillar of democracy - press/freedom of information. It always has been since the dawn of the free stalkerware internet. The fix is simple. The kernel modules and documentation for all hardware sold commercially must be open source. Anything less is ultimately theft of ownership, neo feudalism, and will lead to the end of democracy. THAT is the true weight of this tiny little message and annoyance. It is a much bigger issue than it first appears to be.
The idea that someone could buy a big one gallon jug of mace to refill their little keychain pepper spray is quite frankly terrifying lol there’s no way that could end well
Edit: according to Google you CAN actually buy a big one gallon jug of pepper spray, but only the kind designed for wildlife… That still seems wildly irresponsible lol
I think most things you can make yourself, if you’re talented enough. Might take a lot of effort though. But afterall, someone made everything in the first place.
I’m sure there’s some way you could in theory, but that really seems like a good way to gas yourself out of your own home and/or end up in the hospital from inhaling it or giving yourself a serious chemical burn.
And the government will pay him for his emotional distress because his unlawful use of unlawful unapproved spray has somehow caused him emotional harm.
lemmy.world
Active