[-] gencha@lemm.ee 51 points 1 month ago

Do it anyway. Having anything behind a TLD that is tied to the political control of a tiny geographic area is insanely careless

[-] gencha@lemm.ee 45 points 2 months ago

How do you sell what you did as "it just worked"? Rightaway? You lied to them. You have your coworkers on an unmanaged machine with a foreign OS on the guest WiFi with custom networking. Don't oversell a workaround as a solution.

Simplifying the problem to "Windows" seems unfair, given how many problems you found. All of them still require a long-term solution for regular operation.

[-] gencha@lemm.ee 49 points 2 months ago

Drunk people might accidentally get pregnant and help with the population. Really an obvious move

[-] gencha@lemm.ee 53 points 3 months ago

I feel like most people base their decision on license purely on anecdotes of a handful of cases where the outcome was not how they would have wanted it. Yet, most people will never be in that spot, because they don't have anything that anyone would want to consume.

If I had produced something of value I want to protect, I wouldn't make it open in the first place. Every piece of your code will be used to feed LLMs, regardless of your license.

It is perfectly fine to slap MIT on your JavaScript widget and let some junior in some shop use it to get their project done. Makes people's life easier, and you don't want to sue anyone anyway in case of license violations.

If you're building a kernel module for a TCP reimplementation which dramatically outperforms the current implementation, yeah, probably a different story

[-] gencha@lemm.ee 48 points 3 months ago

That is some next-level Minecraft you are playing over there

[-] gencha@lemm.ee 52 points 3 months ago

As others have already pointed out, you must rotate the key. I don't even put any restrictions on that. Once you have shared a secret in any way, it is no longer a secret. Don't try to avoid work, just because it is an inconvenience. Convenience is the enemy of security.

Rotating your key is not enough though. Verify that it wasn't used. API providers also often provide audit logs to show when credentials were used and from which location. If someone had your key only for a second, they could have used it to generate a new key you don't even know about. Audit!

[-] gencha@lemm.ee 49 points 4 months ago

Chrome is the backdoor and you already installed it

[-] gencha@lemm.ee 52 points 10 months ago
[-] gencha@lemm.ee 54 points 10 months ago

Says the guy who funnels his entire wealth through a foundation to avoid paying any taxes. Just like he told Epstein to do. Love you Bill

[-] gencha@lemm.ee 58 points 10 months ago

Samsung device telemetry

[-] gencha@lemm.ee 46 points 1 year ago

This is not unique to Lemmy. You can do the same on Slack, Discord, Teams, GitHub, ... Finding unused resources isn't trivial, and you're usually better off ignoring the noise.

If you upload illegal content somewhere, and then tell the FBI about it, being the only person knowing the URL, let me know how that turns out.

view more: ‹ prev next ›

gencha

joined 1 year ago