Bitrot

joined 1 year ago
[–] [email protected] 16 points 1 day ago

Encrypt them before they’re ever put there. One example I can think of is in resilio sync, which has the option for sharing a folder to an encrypted peer. Other peers encrypt it before sending anything, that peer doesn’t have the decryption keys at all.

[–] [email protected] 1 points 2 days ago (1 children)

Yeah, I want my passwords unencrypted in the browser, where they belong!

[–] [email protected] 3 points 2 days ago

Remainder that Tails is an NSA PRISM targeting keyword. Congrats on making the list, folks!

[–] [email protected] 47 points 2 days ago

They are logged, but swatting people get around it. They are suspicious “looking” calls, but so are bomb threats.

Swatting is pretty much always a blocked number to a non-emergency line. If they are traced it is typically one of those free online voip services. It takes work and access to really get from A to B, which is why it only happens when there are awful results.

In the US at least, 911 gets special access and calling it will always get you to your local dispatch (unless you have voip with the wrong account address). Non-emergency is just a normal phone number. If someone wants to call from out of the area or hide their number, non-emergency is how they have to do it. This is suspicious because in a real situation like “I just shot my dad” or whatever they say, nobody is taking time to look up non-emergency.

[–] [email protected] 4 points 3 days ago

Cylons leave nothing to chance.

[–] [email protected] 2 points 3 days ago (1 children)

It has activation issues as the license is tied to hardware. If you have a retail license tied to your account it will prompt you to transfer from another machine, OEM does not. Nowadays people don’t even get a key, although it can be extracted from the firmware.

[–] [email protected] 1 points 3 days ago (3 children)

Most people are running Windows OEM licenses that don’t transfer to VMs. A retail license you can move around.

[–] [email protected] 31 points 3 days ago

Easter egg and a little fun. Been there for decades.

[–] [email protected] 5 points 5 days ago (1 children)

It’s probably something most people could learn a bit more about. On Red Hat or Fedora you don’t have to get too far out of vanilla before SELinux starts breaking things (oh, you wanted your custom systemd service to run that binary from that directory? Tough! Figure it out!), in comparison AppArmor on Ubuntu and Debian seems to get in the way a lot less. I’m not sure if that’s due to how it functions as a product or upfront work to configure it to be less intrusive.

[–] [email protected] 5 points 5 days ago (3 children)

Specific configuration is an implementation, as are hooks they may add to their own software to leverage features. Both Debian and Ubuntu also build their own profiles.

[–] [email protected] 11 points 5 days ago* (last edited 5 days ago) (5 children)

Thats why they said “Ubuntu’s AppArmor implementation”, as in how they configure and integrate it.

[–] [email protected] 4 points 5 days ago* (last edited 5 days ago)

CEC. Typically works well. Sometimes buggy.

58
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

@[email protected] or whomever is responsible, thanks for updating the software to 0.19.1 (rc). Silly me I thought it was unlikely to happen over Christmas.

Really appreciate you taking the time over the holiday to update and hopefully resolve the issues we've been seeing for a while.

Let the comments flow!

view more: next ›