This profile is from a federated server and may be incomplete. View on remote instance

lemmyng ,
@lemmyng@lemmy.ca avatar

Lemmy and Mastodon are social media as well, and they are not profit driven. Non-social media like newspapers and cable TV also spread toxic content.

In the end, you got the causality reversed. Media (both social and non-social) gravitates towards what drives the most engagement. Negative/toxic content drives the most engagement because that content elicits a strong emotional response in the consumer.

Media amplifies the problem, but ultimately the problem is people. Toxic content is going to stick around until people stop giving it attention, and unfortunately in all of the history of humanity we have yet to figure out how.

lemmyng ,
@lemmyng@lemmy.ca avatar

There are plenty of real life scenarios that both equate and predate your example, and which don't rely on anonymity. Lynch mobs in the US, rape gangs in southeast Asian countries, Hitler rallies, heck even bully groups among children. The size of the group does not have to be big to allow toxic behavior, as long as you have a catalyst (such as someone getting away with something) that engenders a feeling of safety from consequences and in- and outgroups. The Internet is just another medium for this behavior, anonymous or not. What is different is that the internet is the first medium that actively records it.

lemmyng ,
@lemmyng@lemmy.ca avatar

AKA you'll be removed from the voter pool of you wear it.

lemmyng ,
@lemmyng@lemmy.ca avatar

Celery responded "If you don't like it just leaf."

lemmyng ,
@lemmyng@lemmy.ca avatar

Someone with more talent than me please photoshop their faces onto the Super Troopers scene.

lemmyng ,
@lemmyng@lemmy.ca avatar

Geordi: "That's my shuttle! And my girlfriend!"

Edit: would also work with Broccoli.

lemmyng ,
@lemmyng@lemmy.ca avatar

Perfection!

lemmyng ,
@lemmyng@lemmy.ca avatar

You can carbonate and then add Kool aid liquid drink mix. That will keep the carbonating nozzle clean while still giving you your choice of flavor.

lemmyng ,
@lemmyng@lemmy.ca avatar

Monthly would be nice, but don't feel obligated to do it - we'd enjoy it but don't burn yourself out providing content. What I would suggest though is to make sure you put a big "FAKE" watermark on them to avoid confusing the casual onlooker.

lemmyng ,
@lemmyng@lemmy.ca avatar

Children of Men

This was the first thing that came to mind.

Requiem for a Dream

Fuck you for reminding me that this depressing film exists.

lemmyng ,
@lemmyng@lemmy.ca avatar

If it was really smart it would scan your butthole.

lemmyng ,
@lemmyng@lemmy.ca avatar

rapid mitosis

As in you are seeing multiple boot entries? It's likely one entry per kernel version that you have installed. It doesn't happen often these days any more, but in some situations it's handy to be able to revert to a previous kernel if for example third party modules break.

lemmyng ,
@lemmyng@lemmy.ca avatar

Or just request the desktop version.

lemmyng ,
@lemmyng@lemmy.ca avatar

Yep, if you request the desktop version you don't get that redirect.

lemmyng ,
@lemmyng@lemmy.ca avatar

I'm puzzling at that reflection in the bathroom mirror.

lemmyng ,
@lemmyng@lemmy.ca avatar

It has implications on the effectiveness of VPNs on public networks.

lemmyng ,
@lemmyng@lemmy.ca avatar

Sure they can. If you put a network behind a router they will share an egress/ingress IP. And there are certain high availability setups where computers share IPs in the same subnet for hot/standby failover.

lemmyng ,
@lemmyng@lemmy.ca avatar

Phone numbers can be spoofed, and SIM cards can be cloned. The analogy stands.

lemmyng ,
@lemmyng@lemmy.ca avatar

When you do call routing with a PBX each phone has an unique extension, equivalent to the private IP of each host.

Oh, and there's also anycast, which is literally multiple active devices sharing an IP.

lemmyng ,
@lemmyng@lemmy.ca avatar

A phone number does not uniquely identify a phone either.

lemmyng ,
@lemmyng@lemmy.ca avatar

Laptops don't get a new IP address every time they switch from one AP to another in the same network either. Your cell phone will get a new IP address if it switches to a different cell network.

lemmyng ,
@lemmyng@lemmy.ca avatar

Ah, I see we are resorting to ad hominem attacks now.

lemmyng ,
@lemmyng@lemmy.ca avatar

Whoa, that's a sizeable edit to the post! Regardless the answer is pretty straightforward: your VOIP client (either the device if you have one or the software) is connected to a VOIP service which acts like a gateway for your client. Since the client initiated the connection to the gateway and is keeping it alive, you don't need to make any network changes. Once the connection is established, standard SIP call flows (you can Google that for flow diagrams) are followed.

So no, you router is not part of the cell service. The VOIP provider is part of a phone service that receives calls and routes them for you, just like the cell towers are part of a telephony provider that routes calls through the appropriate tower.

lemmyng ,
@lemmyng@lemmy.ca avatar
  1. A static IP is actually not necessary, but what you need is a consistent identifier. For the server, that's typically a DNS address, but for clients and peer to peer networks there's other ways to identify devices, usually tied to an account or some other key kept on the device.
  2. For centralised communications yes, you would need an always online server. For decentralised networks, you just need a sufficient amount of online peers, but each individual peer does not need to be always online.
  3. Pretty much, yes. Even push notifications on cell phones work this way.
  4. Route, yes. Manually. VPN is usually not necessary. In modern web-based services this is typically done with websockets, which are client-initiated (so the client address can change), and which allow two-way communication and typically only require a keepalive packet from the client every minute or so.

There's other reasons why universal addressing is not done - privacy, network segmentation, resiliency, security, etc. And while IPv6 proponents do like to claim that local networks wouldn't be strictly necessary (which is technically true), local networks will still be wanted by many. Tying this back to phone numbers - phone numbers work because there's an implicit trust in the telcos, and conversely there's built in central control. It also helps that it's only a very domain specific implementation - phone communication specifications don't change very often. On computer networks, a lot of work has been done to reduce the reliance on a central trust authority. Nowadays, DNS and SSL registries are pretty much the last bastion of such an authority, with a lot of research and work having gone into being able to safely communicate through untrusted layers: GPG, TOR, IPFS, TLS, etc.

lemmyng ,
@lemmyng@lemmy.ca avatar

Works on Summit and Connect for Android.

lemmyng ,
@lemmyng@lemmy.ca avatar

Not sure about erasing all of it, but it is (or was) certainly possible to delete enough of it to brick a motherboard https://www.phoronix.com/news/UEFI-rm-root-directory

lemmyng ,
@lemmyng@lemmy.ca avatar

Not sure what you are talking about. Paragraph 1 has

The malware is delivered through a fake Google Chrome update that is shown while using the web browser. 

and the article makes it pretty clear after that that the user is tricked into installing the fake apk.

The Sign ( lemmy.stuart.fun )

For context, in case you don’t have kids (therefor you probably don’t watch Bluey), the family in the car (the Heelers) was selling their house to move for a job but ultimately, the dad (Bandit) decided staying at their house with family was more important. As a final act of demonstration, he lifts the for-sale sign out of...

lemmyng ,
@lemmyng@lemmy.ca avatar

Hey, Consul was pretty big for a while. But yeah, Terraform and Vault take the top two spots.

lemmyng ,
@lemmyng@lemmy.ca avatar

GM had at one point been working on an eCrate block for conversions, but they seem to have abandoned it.

lemmyng ,
@lemmyng@lemmy.ca avatar

For me Hyperion ended up giving me the closest out of the box experience to what I wanted.

lemmyng ,
@lemmyng@lemmy.ca avatar

Just because it has a CVE number doesn’t mean it’s exploitable. Of the 800 CVEs, which ones are in the KEV catalogue? What are the attack vectors? What mitigations are available?

lemmyng ,
@lemmyng@lemmy.ca avatar

The fact that you think it’s not possible means that you’re not familiar with CVSS scores, which every CVE includes and which are widely used in regulated fields.

And if you think that always updating to the latest version keeps you safe then you’ve forgotten about the recent xz backdoor.

lemmyng ,
@lemmyng@lemmy.ca avatar

I don’t know where you got the idea that I’m arguing that old versions don’t get new vulnerabilities. I’m saying that just because a CVE exists it does not necessarily make a system immediately vulnerable, because many CVEs rely on theoretical scenarios or specific attack vectors that are not exploitable in a hardened system or that have limited impact.

lemmyng ,
@lemmyng@lemmy.ca avatar

You did a recursive chown or chmod, didn’t you.

lemmyng ,
@lemmyng@lemmy.ca avatar

Here’s a third one: They have a Welcome Stamp visa program where you can work remotely from there for a year, and it’s renewable. You can even bring your family. Under this program you only pay income tax on your country of origin.

lemmyng ,
@lemmyng@lemmy.ca avatar

four-door

Looking at the pictures, I think there’s a problem with that description.

lemmyng ,
@lemmyng@lemmy.ca avatar

Brian Kernighan. Got the chance to have lunch with him!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • tech
  • kbinEarth
  • testing
  • interstellar
  • wanderlust
  • All magazines