Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CY
Posts
3
Comments
139
Joined
2 yr. ago

  • You can't attack Trump by criticising him for things people want him to do.

    Here's the thing; most people actually don't like what he's doing. Or they like the aesthetics and don't actually understand the execution and effects.

    Democrats fail spectacularly in aesthetics (elite, preachy, corpo suits) and at explaining the effects these policies actually have on regular people.

  • The far-right loves law enforcement and the military, and the military and law enforcement love the far-right.

    Those that work forces...

    Dude could just say some tacticool bullshit like he was "securing government contacts" and they would eat it up.

  • DJI drones are paired with and controlled by a smartphone app. The app downloads a map database to local storage, and the position of the drone is tracked via onboard GPS and reported back the controller app.

    Of course there are exceptions for law enforcement. American police can get full auto rifles and armored vehicles. Getting an authorization for restricted airspace is nothing.

    Even hobbyists can operate within certain restricted areas if they get pre-approval from local air traffic control.

  • Yeah, containerization does make it much easier to just throw away the base system and start fresh. This way, you don't have to worry about possibly straying the recommended upgrade path and accidentally breaking something.

    More code adds complexity, complexity leads to more bugs, more bugs means more vulnerabilities. Virtualization takes a lot of code. With all this extra code, it is possible that you are actually expanding the attack surface instead.

    It is likely inconsequential for most people just running a couple personal services at home, but organizations are pretty frequently targeted by sophisticated attacks, where the consequences of a breach can be severe.

    Yes, many of these vulnerabilities are difficult to exploit, either requiring local access or the existence of another vulnerability to achieve local access.

    However, there also exists a massive market segment whose entire business model relies on selling local access to VM compute resources, cloud server providers. An attacker could simply rent a VM on a vulnerable platform to gain the needed local access, launch an attack on the host and thereby compromise the other guests on the same machine.

    There have been an incredible number of flaws found and fixed (for now) in the isolation provided by virtual machines. VMware had a spat of critical vulnerabilities in 2024.

  • Yes, it matters.

    Also, the actual isolation of container environments varies greatly, on a per container basis. Containers are far less isolated than virtual machines, and virtual machines are less isolated than separate hosts.

    Neither containers or VMs will will protect from attacks on the host, see regreSSHion. You may be able to limit access to your host by using containers or VMs, but container escapes and VM escapes are not impossible.

    There is much time and effort required to maintain each of these layers. With "stable" distros like Debian, It is often the responsibility of the distribution to provide fixes for the packages they provide.

    Given Debian as the example, you are relying on the Debian package maintainer and Debian security team to address vulnerabilities by manually backporting security patches from the current software version to whatever ancient (stable) version of the package is in use, which can take much time and effort.

    While Debian has a large community, it may be unwise to use a "stable" distro with few resources for maintaining packages.

    OTOH, bleeding edge distros like Arch get many of their patches directly from the original author as a new version release, placing a lower burden on package maintainers. However, rolling releases can be more vulnerable to supply chain attacks like the XZ backdoor due to their frequent updates.

  • I'm sorry, but there is no situation where it is permissible to stand idle as someone suffers an untimely and preventable death.

    Even soldiers at war, captured in foreign territory without visas, are entitled to lifesaving care.

  • OK. So by that logic, let's say you are touring Europe and have a heart attack. The paramedics are in the area and available, but refuse to take you to the hospital. You are left to die on the street.

    You think you deserve such foul treatment?

  • Is it really so different though? The outcome of both situations is the same. Migrants are dying, through direct action and deliberate inaction.

    Mediterranean nations have the opportunity to protect lives, but instead they choose kill / let migrants die.

  • You are defending willful negligence that leads to the deaths of migrants.

    Up to 1 in 13 migrants die in the Mediterranean. Italy as well as Greece have been allowing migrants to die as a part of deterrence-based migration policy. Rescuing the passengers of capsized migrant vessels has been criminalized. There are plenty of articles that confirm these facts. Here is one example.