There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

CyberSeeker

@[email protected]

This profile is from a federated server and may be incomplete. Browse more on the original instance.

CyberSeeker ,

So the article repeats, several times, “waymo relies on remote operators”. I don’t think the author knows what “self-driving” means.

CyberSeeker , (edited )

Possible? Yes. Likely? Not at all.

To perform a zero knowledge proof, you’d have to have structured data to support the claim, which most whistleblowers would not have. If a whistleblower already had the hard evidence in hand, e.g., serial numbers and timestamps, they could have just provided those anonymously, and someone could follow up. The problem is, you can’t always get a copy of the hard evidence without revealing your intent to the employer, or at least, other employees.

Presumably most whistleblowers are making unsubstantiated claims that something happened, or maybe with light evidence. Based on who they are, a journalist or investigator may then elect to follow up and dig up the hard evidence to support the claim. This requires revealing your name and position/relationship to at least one person. Rarely, they would be willing to put themselves out there to provide an affidavit under oath, which itself is not enough to pursue criminal charges (though it could help build a case around intent or willful neglect, or help support a warrant or discovery).

It’s illegal, but not unheard of, to try to force journalists to reveal their sources, but the same protections are not universally in place if you reported a finding to a company’s internal affairs, for example. But unlike attorney-client privilege, or shield law protections, the risk in signing an affidavit is, as we’ve seen in recent US trials, that records will not stay sealed, and your name will be revealed to the defense and/or public.

Has ethernet become illegitimate? A librarian flipped out after spotting me using ethernet

I plugged into ethernet (as wifi w/captive portal does not work for me). I think clearnet worked but I have no interest in that. Egress Tor traffic was blocked and so was VPN. I’m not interested in editing all my scripts and configs to use clearnet, so the library’s internet is useless to me (unless I bother to try a tor...

CyberSeeker ,

As far as people I’d trust to not just make shit up, I’d say Librarian, aka, professional fucking researcher is high on the list.

CyberSeeker , (edited )

So if ISPs are once again Title II common carriers, how can they enforce the TikTok ban? 🤔

CyberSeeker ,

When are you adding the bok choy to your stir fry? I’d wager you’re over cooking it; try adding it much later to the cooking process. It should only take a minute or two at most to cook.

The greens are also quite bitter, so possibly don’t use all of the leaf.

CyberSeeker ,

That’s the benefit of a custom domain, I suppose; you can always change he provider without changing your email.

CyberSeeker ,

I believe this is already the case; domain reputation is weighted pretty heavily by Gmail and others, so it will take some months before you’ve established enough rep. Following SPF/DMARC/DKIM is crucial, followed with time your domain has been registered and typical outbound volume from your domain.

CyberSeeker ,

What’s worrying about this report is that it’s coming from Google itself.

Google just bought Mandiant, one of the leading cybersecurity and threat intelligence firms. Therefore, Google is one of the leading cybersecurity and threat intelligence firms.

arstechnica.com/…/google-makes-second-largest-acq…

It’s now expected that Google would release this kind of report, seeing as they sell this as an enterprise service.

Mandiant has previously released this type of report regularly; for instance, they were the firm that disclosed the SolarWinds hack.

CyberSeeker ,

Agreed, the echo chamber is real on Reddit/Lemmy. Easy to hate on Elon, but people are acting as if the old men leading most other Fortune 100 companies think any differently than he does. You can find the rare exception, but you’ll have a hard time living in modern society without your money filtering up to a bigot somewhere.

Elon just lacks the filter to keep himself from saying it.

Fairbuds are Fairphone’s proof that we really could make better tiny gadgets (arstechnica.com)

But of course we all know that the big manufacturers don’t do this not because they can’t but because they don’t want to. Planned obsolescence is still very much the name of the game, despite all the bullshit they spout about sustainability.

CyberSeeker ,

Why do you think they all opposed right to repair?

And specifically, right to open repair? They’ll happily send you a $600 TPM-locked biometric sensor, because they would control the market and ROI, but won’t let you buy a $90 alternative from someone else.

Best resources to learn more about networking

I have been exploring the world of home servers/self-hosting for a little over a year now, and feel like I have at a decent understanding of a lot of things that go into this. The one thing I am not remotely comfortable with yet is networking. It’s like a foreign language to me....

CyberSeeker ,

Don’t bother with the cert if it’s not your job, but at least look into CCNA Routing and Switching. There are tons of courses available, both in person and online, as well as numerous YouTube videos on the subject.

See if your local library or community college has an adult education center that provides a course. At some point, you will need to learn subnetting, which is just math, but practice makes perfect, and your life is easier if you have it committed to memory.

Proper written work is still one of the most effective ways to do this.

Citizen Lab: "Not only the Chinese government, but also US-based firms, are complicit in the political and religious censoring of content on China-accessible platforms" (citizenlab.ca)

In its submission to the Congressional-Executive Commission on China, the University of Toronto’s Citizen Lab gives recomnendations to hold Chinese and U.S. firms accountable for their involvement in online censorship and assisting victims of digital abuse and intimidation.

CyberSeeker ,

While true, it’s pretty asinine to hold companies operating in China accountable for complying with Chinese law. It sucks, but they aren’t just going to abandon the Chinese cash cow market.

CyberSeeker ,

Original Doom was not GPU accelerated.

CyberSeeker , (edited )

The games in progress I mark as favorites, I have “Finished” and “Play Next” categories, and I have a big dump category called “Won’t Play”.

Aside from that, I have some big categories for collections of old games from humble bundles and steam sales, like legacy Myst, Wizardry, or Sierra games, or like Star Wars game collections.

CyberSeeker ,

BlackRock, for one, which shouldn’t make you feel any better.

CyberSeeker ,

NeXT was a mediocre BSD front end and a few interesting Objective-C libraries. Apple’s board of directors pretty much crawled back to Jobs hat in hand after the disasters of Sculley and Spindler.

CyberSeeker ,

Or, the real sign of gentrification is that the Google Maps car drives by your neighborhood more than once every five years. Guarantee that’s not happening in the projects.

US sues Apple for illegal monopoly over smartphones (www.theverge.com)

The US Department of Justice and 16 state and district attorneys general accused Apple of operating an illegal monopoly in the smartphone market in a new antitrust lawsuit. The DOJ and states are accusing Apple of driving up prices for consumers and developers at the expense of making users more reliant on its iPhones.

CyberSeeker ,

antitrust law does not regard as illegal the mere possession of monopoly power where it is the product of superior skill, foresight, or industry

United States v. Grinnell Corp. (1966).

A market share of ninety percent "is enough to constitute a monopoly; it is doubtful whether sixty or sixty-four percent would be enough; and certainly thirty-three per cent is not.

United States v. Aluminum Co. of America (1945)

CyberSeeker ,

Who cares if the code is open source, or pre-training weights are released? Virtually every Masters in CS student in 2024 is building this from scratch. The differentiator is the training dataset, or at worst, the weights after fine tuning the model.

CyberSeeker ,

Sorry if I’m about 10 years behind Linux development, but how does Docker compare with the latest FlatPak trend in application distribution? How you have described it sounds somewhat similar, outside of also getting segmented access to data and networks.

You guys should check out the reddit clone I've been working on (matrix.gvid.tv)

It’s sort of a different concept. Posts and users also have position in addition to age and score. The sorting algorithm gives you complete control over how much to weight each one. It’s like if new and hot existed on a continuous spectrum. It’s sort of like what Aaron Swartz initially wanted to do with Reddit where what...

CyberSeeker ,

Linked List Array Node Key Value Pair Attribute

CyberSeeker , (edited )

Reddit is not a “big corporation”.

How big is big? They’re working on a 6.5 billion dollar valuation. Sure, that’s not S&P 500, but that’s not your mom and pop coffee shop.

cnbc.com/…/reddit-seeking-a-valuation-of-up-to-6p…

CyberSeeker ,

Not cheaper. More likely there is budget available for National Guard resources and things like anti-terror, disaster relief, etc., as opposed to next to nothing for infrastructure improvements and staffing.

CyberSeeker ,

It happens because consumers insist on buying and eating processed shit like this decade after decade. In what world were Cheerios considered a healthy option?

The White House wants to 'cryptographically verify' videos of Joe Biden so viewers don't mistake them for AI deepfakes (www.businessinsider.com)

The White House wants to ‘cryptographically verify’ videos of Joe Biden so viewers don’t mistake them for AI deepfakes::Biden’s AI advisor Ben Buchanan said a method of clearly verifying White House releases is “in the works.”

CyberSeeker ,

Digital signature as a means of non repudiation is exactly the way this should be done. Any official docs or releases should be signed and easily verifiable by any public official.

CyberSeeker ,

There are other videos that will hash to the same value

This concept is known as ‘collision’ in cryptography. While technically true for weaker key sizes, there are entire fields of mathematics dedicated to probably ensuring collisions are cosmically unlikely. MD5 and SHA-1 have a small enough key space for collisions to be intentionally generated in a reasonable timeframe, which is why they have been deprecated for several years.

To my knowledge, SHA-2 with sufficiently large key size (2048) is still okay within the scope of modern computing, but beyond that, you’ll want to use Dilithium or Kyber CRYSTALS for quantum resistance.

CyberSeeker ,

Bingo. If, at the limit, the purpose of a generative AI is to be indistinguishable from human content, then watermarking and AI detection algorithms are absolutely useless.

The ONLY means to do this is to have creators verify their human-generated (or vetted) content at the time of publication (providing positive proof), as opposed to attempting to retroactively trying to determine if content was generated by a human (proving a negative).

CyberSeeker ,

Good catch, and appreciate the additional info!

CyberSeeker ,

When using an external TPM. Which next to no one does.

CyberSeeker ,

So let’s say I ask a talented human artist the same thing.

Doesn’t this prove that a human, at some level, is storing the data of the Joker movie screenshot somewhere inside of their memory?

The library of Anonymous' hacked/leaked datasets is in danger of being closed (ddosecrets.com)

The administrators of the DDoSecrets website write that they have run out of money for funding. If they don’t raise $150,000 by January 31, 2024, they might be forced to suspend operations. This is written on the red banner that appears when you go to the site....

CyberSeeker ,

They’ve been around since 2018, and with only two weeks notice, now are saying they need $150k?! Who the fuck is their CFO, and how did their burn rate get so out of control? Shouldn’t they have started the campaign months ago if this was an expected problem?

This just fucking reeks of embezzlement; grossly mismanaging the funds charitable individuals had entrusted them with.

CyberSeeker ,

This. They clearly overextended due to the boom in streaming during the pandemic, and are now reacting to the contraction in content consumption both here, and on YouTube.

CyberSeeker , (edited )

Linux device attacks preventable by standard security precautions

3 senior OpenAI researchers resign in the wake of Sam Altman's shock dismissal as CEO, report says (www.businessinsider.com)

3 senior OpenAI researchers resign in the wake of Sam Altman’s shock dismissal as CEO, report says::Jakub Pachocki, Aleksander Madry, and Szymon Sidor told associates at OpenAI that they had quit, The Information reported.

CyberSeeker ,

Any competitor worth their salt will match and exceed that as a signing bonus.

CyberSeeker ,

Why are you running a VPN? If you are simply shielding your internet activity from your ISP, Google won’t give a shit where you sign in from.

If you are browsing to shield your identity, you want to be fully disassociated with any non-secure browsing habits. If this is your use case, even if you are using discrete internet accounts, tracking cookies are common enough that, you would still be identifiable from your browser fingerprint. It all depends on what your risk factors are, and how much you want to spend to mitigate them.

CyberSeeker ,

You are absolutely correct— major blog hosting, image hosting, and video hosting sites are all “free” for the content creator, but YouTube by far has the largest audience and highest monetization rates of any of them.

This is just creators buying in with their wallets; it makes sense to go where the money is, even if the format sucks for the idealized content consumer.

CyberSeeker ,

The biggest mistake users will make is thinking their data is safe JUST because they have a NAS or a RAID. It’s common parlance in Systems Administration that RAID is NOT backup.

To wit— not truly understanding RAID and how it relates to capacity, parity, and especially the time required to rebuild in failed disk situation. It is a crucial mistake to use RAID 5 with greater than 2TB disks, and even that is pushing it, but RAID 5 is at least in the zeitgeist.

There are also some outside concerns such as Drive batch dates and knowing to pre-purchase spare disks well in advance that may hamper recovery.

CyberSeeker ,

I wouldn’t immediately jump to that conclusion. There are plenty of legitimate business opportunities that do not imply “taking money to promote products”. In-line advertising and properly disclosed free samples are standard operating procedure for the tech industry, but they are completely above board, and by themselves do not imply bias.

Nearly every content creator’s YouTube channel About page or website will have a similar line, somewhere.

CyberSeeker ,

Take that Geiger counter close to most old concrete sometime. Now think of what these old buildings are made of.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines