A sweeping new ICE operation shows how Trump's focus on immigration is reshaping federal law enforcement
sylver_dragon @ sylver_dragon @lemmy.world Posts 4Comments 951Joined 2 yr. ago
I work for a fairly large company, and we're hearing about "AI" constantly. CoPilot is available and its use encouraged. Also, in the cybersecurity space, AI is fucking everywhere. Vendors won't shut up about their "AI Enabled" products. And the new hotness is "Agentic AI", which is basically automation, but we're going to let AI hallucinations fire off the automated process which could bring production systems down.
Good times are surely coming. /s
It looks like archive.org is capturing some of lemm.ee. So, it's possible that most of the images are there and could be referenced.
He got tired of shoveling corporate shit and decided to put those skills to use for himself, shoveling chicken shit.
I don’t remember it that way. To me, it was a minefield of viruses, popup ads, chain mail, and unexpected extreme NFSW content.
What, you don't want to punch the monkey and also have 50,000 pop-up and pop-under windows spawn because you picked the wrong link?
Also, accidentally discovering that python[.]com was NOT where one went to download the scripting language back around 2006, while trying to help a student get her laptop setup. It's still not, but that's not how I wanted to learn that fact.
With a long, strong, flexible tongue and a reputation for eating things, one of those collaborations basically writes itself.
I was talking about his mechanics in Brawl Stars, what were you thinking about, sicko?
After my time in Finance (which, curiously, also involved a Crash in the Industry I was working in)
A-ha! We've found the cause of the market crashes.
Joking aside, I was around for the dotcom bubble burst and the 2008 crash. Both were caused by wild speculation and we seemed to have learned nothing from them. I have little doubt we're headed for another recession and it will again, be driven by speculation. We also have a problem with private equity (I call them "vulture equity") which likes to capitalize on businesses which are struggling . They swoop in, buy up the company in a leveraged buyout, and then start extracting as much value from the company as possible. Usually this is in the real estate that the company owns. Once all of the value is extracted, the company is spun back off, saddled with the debt used to buy the company in the first place, and then it flounders until it ultimately collapses. This was the fate of companies like Sears or Red Lobster. Once a vulture equity company engages in a leveraged buyout of a company, that company is doomed.
I very briefly considered it but don’t trust my awareness to get out in time, plus participating in the scam would eat me up.
Ya, one of the best pieces of advice I got was, "never gamble money you can't afford to lose". This is what keeps me out of trying to chase that tiger. Sure, it could be possible to make some money by jumping on one of these scams early and trying to ride sell the bump. But, it's also likely that be the sucker losing out in the end. I'd rather not waste my money that way.
Live a good life. If there are gods and they are just, they will accept you for your virtue. If the gods are unjust, then they weren't worth worshiping anyway. And if there are no gods, then at least you lived a good life to be remembered by .
How do you know a crypto scheme is a scam?
You already know, the answer is "yes". It's always "yes".
The only question is, can you hold the tiger's tail just long enough to make a mint and still let go in time that you aren't the last one holding it.
As other folks have already covered, most modern websites use TLS (formerly SSL) which will encrypt any thing going to/from those sites. Someone could redirect a page to a server they own and try to get you to enter your credentials into their site for harvesting, though you'd probably notice due to errors related to the security certificate. There is a risk here, but it's not all that bad. Just pay attention to any security errors and maybe don't go to high value sites (e.g. banking websites). There are some highly technical attacks (e.g. TLS downgrade) which could pose a risk. But, it's not all that likely, and you're probably fine. For the most part, you can ignore the "zomg! you need a VPN" ads clogging up YouTube. Yes, they have a use case. No, that's probably not you.
The other consideration is the security of your system itself. If you are running and old and vulnerable OS, it's possible that an attacker could use the greater exposure to attack your system. For example, if you are running a Windows 7 system, there's a real chance that you don't have the EternalBlue patch applied or some other remote exploit vulnerability can be used to compromise your system. Even with a newer OS, if you haven't been installing updates, you could have some holes which would allow an attacker in. Though, for most situations, there's not going to be an attacker just waiting to pounce on your system. So, you probably don't need to be worried. But, it's also a good reminder to keep your system up to date, if you're going to be using WiFi regularly. Some folks just get bored and start poking at anything around them. Make sure the doors are locked when those folks rattle the handle. It can also be useful to have a host based firewall running, even just setting the network to "Public" in Windows will do a lot to mitigate this risk.
Security is always going to come down to a trade off between risk and convenience. Public WiFi can be very useful, but it does carry some risk. In most situations, you can mitigate that risk by keeping your system up to date, having a host based firewall running (even if its just Windows setting the network to "Public"), watching URLs/Links carefully and watching for certificate errors in your browser.
On the Privacy side, assume someone can track the domains you are visiting (though likely not the full URL). If you use normal DNS, the network owner can look at DNS logs and know all the sites you visited. Even if you use a different DNS server, the network owner could be sniffing the packets on the wire (DNS is not encrypted). Additionally, WiFi is logically a bus topology; so, anyone on the same network could be sniffing packets and also get all your DNS traffic. This is a good use case for DNS over HTTPS (DoH). With DoH, you can stick to a DNS provider of your choice and get TLS encryption to keep things private. Anyone sniffing packets would know that you are using DoH and would likely know what provider you are using, but not see the contents of the DNS queries.
Of course, even with DNS traffic encrypted, most web servers still rely on Server Name Identification (SNI) to determine the host you are connecting to. The end result of this is that the domain you are visiting is sent, unencrypted over the wire and could be sniffed. There are solutions for this (e.g. eSNI), but they are not widely adopted yet. So, assume that anyone sniffing packets can get a list of the domains you are visiting. If this poses a serious risk to your safety (e.g. you are a journalist working in a repressive regime), this is a use case for a VPN. Though, using a VPN may be obvious to anyone monitoring and they could apply Rubber Hose Cryptanalysis to the problem.
The tl;dr of this all is, you're probably fine. The fact is, it's more likely that no one gives a shit about you and all the other folks on that public WiFi are too busy looking at cat pictures to try and hack you. A few simple security hygiene things will cover the 99% situation, and the other 1% isn't worth worrying about.
An Operating System is a tool. Would you be annoyed because you had to use a hex key on a bolt with a hex socket, when what you really like using is a robertson drive? If the work you are doing is dependent on a particular OS choice, then use that OS and get over yourself.
That said, if this is for work and you want to avoid the crapware in Windows 11, talk with your IT team. By default, Recall is removed on commercially managed devices. I'm not 100% sure, and can't be arsed to look it up at the moment, but this likely refers to devices managed via Intune. Assuming your IT team isn't stuck in the 90's, they are probably doing this already. Telemetry can also be mostly disabled via Group Policy, and many IT organizations will already be doing this. Or, as you have arrived at, use a Mac and disable the telemetry.
On the other side of that coin, if you expect privacy on a work owned device, I have bad news for you. More and more organizations are using Endpoint Detection and Response (EDR) products on all endpoint devices. Yes, this includes Mac and Linux devices. So, your organization is watching you browse porn on your work device. If you are doing something and you don't want someone watching over your shoulder, don't use a work device. Keep your work device for work and your personal device for everything else.
When my father's dog was getting towards the end of his life, my father would order an extra burger patty, with nothing else for the dog. He figured the dog was close enough to the end of his life, the occasional burger patty wasn't going to cause meaningful harm and it gave the dog a nice treat.
You may have had a customer with a similar situation.
But, we'll know where the aircraft is. It's a built in, instant location flare. No more aircraft disappearing and not being found.
I played naked frisbee on the front lawn of my college once. I thought it would be effortless but in fact it’s extremely painful to have your nuts bouncing around unsupported like that.
I had a similar discovery about kickboxing practice and boxers. It's not fun when you're holding a thigh pad for your partner to practice kicking, and you realize that your legs can transmit energy, much like a newton's cradle.
It seems that internal polling put the "weird" message as not really helping (or hurting) the Harris campaign. Arguably, keeping up the "weird" message may have been useful, but they were likely trying to find something that seemed to have a larger impact.
It's rather amazing that this one guy keeps churning out fixes for FromSoft's complete inability to understand multiplayer.
That said, I do plan to try the vanilla setup first (finishing up Shadow of the Erdtree before we change over). I just worry about my wife and I dropping into a session and having some rando who either wants to faff about; or, we run into the type of toxic behavior which seems to inundate online games. We had pretty good luck with Vermintide 2, back in the day. But, with way too many years of playing WoW, we've also run into a lot of assholes. And we just don't have the patience for that sort of thing anymore.
Well, the world should have moved on to IPv6 a long time ago.
The short answer is, it's what we were taught in school. Like many preferences, it's shaped by the culture we grow up and live in.
I’m sorry but it doesn’t make sense to me.
Of course not, you were raised and live in a different culture; so, your preferences are different.
Ultimately, the right answer is ISO8601. It's unambiguous and sorts well on computers. But, I don't think any culture is teaching that as the primary way to write dates, so we're stuck with the crappy ways.
Imagine the flight envelope as a graph. Going further to the right means going faster. Going further up means going higher. The goal of test flights is to push against the upper-right hand corner of that envelope. Unfortunately, that's also where your postage gets stamped.
ICE was formed in 2002, following the attacks which destroyed the World Trade Center. Like basically everything the US did in the wake of that attack (e.g. Patriot Act) this has been an absolute disaster and should be rolled back.