![](https://lemmy.world/pictrs/image/20bddba5-ee1f-4d5d-9f20-a22125cdb362.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
Mint is a good recommendation. I’ve used it for most of a decade because I just want my system to work.
Mint is a good recommendation. I’ve used it for most of a decade because I just want my system to work.
Nobody is both that bored and that motivated. Unless paid.
deleted by creator
This is all I’ve run across on reverse engineering, so far but it is quite interesting.
https://bsky.app/profile/filippo.abyssdomain.expert/post/3kowjkx2njy2b
You sure made no bones about your opinion there.
Is there really anything they couldn’t collect?
Well maybe they aren’t experienced info security professionals :)
Idk what you’re into buddy
but I like it.
Inflation.
I think you win.
If you haven’t yet, give Lief Ove Andsnes’ rendition a try.
Everyone has their favorite interpretations, I guess. This is one of mine. From a pianist that impressed the hell out of me when I first heard him.
(The album Horizons if the link doesn’t work or you’re boycotting Spotify or whatever)
God I am getting crazy goosebumps just listening to this again. I love the 9th symphony so much.
Oh wow that is amazing. Thank you!
I forgot how much I love this kind of choral music.
I get where you’re coming from but is he managing his risk or not?
Does he understand the risk? If yes, good. No? Bad.
Is he ignoring the risk? If yes, bad. No? Good.
Is he weighing the risks against the benefits he receives of using these apps and taking appropriate steps to mitigate those risks? If yes, then good. No? Bad.
Cyber security isn’t “lock everything down at all costs”. Otherwise I would insist you throw your phone in an incinerator along with all your computers, live in a bunker reinforced against nuclear attack with a small army to guard you, never leave it, never talk to anyone… Etc.
It is enabling one to achieve their goals with a tolerable amount of risk. That level of tolerable risk is different for everyone.
What are you trying to achieve?
Indeed. The message: you’re helpless. Just sit around and wait to be rescued. Any minute now…
Perhaps that’s also why superhero movies were so popular for a time recently.
Physically, at the physical / link layers, an Ethernet transceiver integrated circuit is used that knows how to take data provided by the cpu and communicate it by sending signals along the RJ45 Ethernet physical layer to communicate with the switch. By looking at the datasheet and IEEE 802 specs one could figure out more detail.
It’s kind of horrifying nobody thought that through. What else did they fail to think about?
This doesn’t seem that much worse than American rules that have already been in place for a long, long time.
Do you really want to be like the US, though? I think maybe that’s not a great idea. (Source: am from US)
“When he reached the New World, Cortezh burned hish ships. Ash a reshult hish men were well motivated.” —Capt. Ramius, played by Sean Connery in The Hunt for Red October