Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)RA
Posts
0
Comments
494
Joined
2 yr. ago

  • I mean, who cares? It's the smokers' problem? If you can't dispose of your trash take it with you or stop producing it until you can. That's true for any trash.

    We expect people to carry doggie bags, too. Just clean up after yourself.

    I realize that's idealistic and it's never going to happen because smokers be littering, but it makes me mad regardless.

  • Also, you're very hardly ever 100% sure someone deserves to die. It's morally much better to not kill just in case - and there's been tons of cases where new evidence, like DNA, has exonerated convicted prisoners. You might be keeping someone fed and warm who didn't deserve it, but personally I'd rather err on the side of humanity.

  • My parents got one somewhat recently (😒) and I have to say, features are also a negative point. Model Y door override is so inaccessible it might just as well not exist. No haptic control for most things except indicators as they are required by law.

    Other than that it's a car like any other, so no reason to support Tesla specifically.

    I got myself an i3 2017 a few months back and while you can tell it's a first gen EV and only basic non-BMW features (no Android Auto, only basic BT) I much prefer the i3. No random braking on the road, no crazy lane corrections. Not as powerful as the Tesla, but I drive in Eco, anyway.

    I love Tesla for what they did for the EV market, but I'll happily attribute that to the original founders and engineers. M*sk was only PR; if the car was half as tech geeky they'd still be where they are today.

  • Reset password via email. Reset second factor via email. Email is the only factor, neither password nor the 2fa.

    Usually, the actual login is not the easiest target for an attacker, the recovery methods are. You call a helpline to get a second SIM for SMS codes. You guess (or dig up) answers to recovery questions if available. You get access to email accounts, e. g. via phishing.

    If a recovery path for a security factor is weak, it ceases to be a security factor. By allowing both password and the second factor to be recoverable via email, both factors collapse into one: get access to the email and you're in.

  • That train will just keep coming. Once such a freight train is going you better get out of the way. The amount of kinetic energy that's coming towards you is dwarfing compared to a measly tank.