[-] muddybulldog@mylemmy.win 19 points 1 year ago* (last edited 1 year ago)

The manufacturer has acknowledged it’s an issue and has issued at least one patched firmware. This isn’t a “luck of the draw” or isolated issue.

[-] muddybulldog@mylemmy.win 20 points 1 year ago* (last edited 1 year ago)

And prevents people from doing stupid things, as well as prevents malware running under administrator permissions from doing malware things (see also; people doing stupid things).

[-] muddybulldog@mylemmy.win 19 points 1 year ago

Nearly 30 years of LINUX experience. I can definitely say on a regular basis that LINUX doesn’t do exactly what I want.

[-] muddybulldog@mylemmy.win 19 points 1 year ago

So, somebody may have just just SWATted the US Capitol. Going to be interesting to see how this plays out.

[-] muddybulldog@mylemmy.win 18 points 1 year ago

You should’ve read what 1956(7)(b) is… money laundering.

There was deemed enough evidence that the site was tied to money laundering to execute a forfeiture.

That’s it.

[-] muddybulldog@mylemmy.win 18 points 1 year ago* (last edited 1 year ago)

Least expensive is Virtualbox or UTM.

Simplest is Parallels.

[-] muddybulldog@mylemmy.win 18 points 1 year ago* (last edited 1 year ago)

A CDN isn’t a great comparison to DDOS mitigations. CDN spreads the load amongst multiple locations that are distinct entities. Any one can be down and the rest functions fine. They generally exist on separate domains and are not inherently codependent.

DDOS requires an inline solution. A layer acting as a man in the middle to deflect or absorb the traffic destined to Lemmy.world, for example. That’s not something that can be readily be decentralized while there’s only one ingress to Lemmy.world.

[-] muddybulldog@mylemmy.win 19 points 1 year ago

If Meta, Reddit, Twitter, etc. aren’t already harvesting all of the fediverse it’s only because they don’t see it big enough to be of value.

It’s a trivial task.

[-] muddybulldog@mylemmy.win 21 points 1 year ago

Yes.

Just muddling around I've built queries that: (a) list all of my post & comments, everybody who voted on them, and their votes (b) tally how many times specific users have upvoted or downvoted me. (c) identifies the most prolific voters across the Fediverse and the communities they are voting in (d) identifies users with the same username or display name across all instances and correlates the activities across those accounts.

These are all for the sake of learning and are innocuos the way I'm using them. It is plain to see that someone with skills and an agenda could make more out of it than I have.

[-] muddybulldog@mylemmy.win 21 points 1 year ago* (last edited 1 year ago)

While we can certainly debate, doubt and be suspicious of the efficacy of their controls I think we can all agree that there are some in place, even if they’re shit.

No such controls exist in the fediverse.

There are near-zero privacy protections in place. If someone shows up at my door tomorrow with a warrant for my instances database I’m not going to fight it. I don’t have the pockets for it and I’m not going to bankrupt my personal self on principle.

[-] muddybulldog@mylemmy.win 21 points 1 year ago* (last edited 1 year ago)

I had to run an experiment on this one.

It appears that changing you vote causes the old vote to be completely deleted from the database and a new vote cast and propagated.

Edit: The above description is what happens in the COMMENT_LIKE or POST_LIKE table HOWEVER the ACTIVITY table reflects both actions, which makes sense since it's a complete transaction log. So, it's a slightly more complex query but the history is maintained.

[-] muddybulldog@mylemmy.win 18 points 1 year ago

Lemmy may be niche but it’s extremely easy to monitor. There’s a fine line between discussion and facilitation. It’s all a matter of how risk adverse you are.

view more: ‹ prev next ›

muddybulldog

joined 1 year ago