Lemmy shouldn’t have avatars, banners, or bios

  • 0 Posts
  • 67 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle




    • 7 felt like it was mine

    I remember that marketing campaign. Windows Vista had a shaky launch, because the hardware manufacturers hadn’t polished the Vista-compatible drivers yet. 6 months later, they had caught up, but people still had a bad taste from it.

    So when service pack 1 came out, Microsoft made a reskinned version of it and started an ad campaign with “customers” claiming “Windows 7 was my idea!” and the public ate it up.


  • Aa!@lemmy.worldtoTechnology@lemmy.worldAny LinkedIn alternatives?
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    26 days ago

    I have such bad things to say about recruiters. They generally don’t have a clue about any of the skills related to the jobs I’m after, and they take a huge cut of the pay the entire time I’m working the job.

    On the other hand, the two best jobs (highest pay and best working environment) I’ve had in my career, I got through recruiters, so I acknowledge them as a useful business when it works out. The last one has led to the company buying my contract and hiring me directly for the past 12 years




  • Aa!@lemmy.worldtoFediverse@lemmy.worldHacker News feed
    link
    fedilink
    English
    arrow-up
    11
    ·
    2 months ago

    Yes, if you want to see Hackernews posts, get them from Hackernews yourself. Reposting to Lemmy just adds more posts with zero engagement that new users will see and be put off of the site for

    Several months ago we had three different instances with their own Hackernews communities and their own repost bots posting the exact same things, with zero discussion.

    Lemmy needs more actual discussion, and fewer bots adding noise to the feed.



  • Aa!@lemmy.worldtoFediverse@lemmy.worldIs Lemmy growing or shrinking?
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    1
    ·
    2 months ago

    A lot of people talk about the decentralization being a barrier of entry, but I don’t think it is.

    Generally speaking, your average social media user won’t care about that one way or the other. You tell them an instance to look at, they will check it out.

    Where I think it goes wrong is the general Lemmy attitude of curating your own feed. Your average Lemmy user will say the best part is that you just block the communities and instances that you don’t want to see.

    Your average social media user on the other hand, doesn’t want to spend an hour or a month blocking people and communities to make the site useable. Most folks will come in, see a feed full of tech bros, repost bots with zero discussion, 30 different fetish porn communities, Star Trek memes, and bottom of the barrel shitposts, and they’ll just leave.

    The only way I see Lemmy overcoming this is for instance admins to heavily curate the default experience so the feed is friendlier to new users. This would likely require some more tools in place to allow for this, possibly even a default block list that users can customize after they are already drawn in

    Also the sorting could be better.




  • I’m a programmer, which is in a pretty bad spot if you’re looking for work right now.

    I was laid off in January and had to start looking again. While it’s important to be able to demonstrate your skills, the only way I got an interview for my new job was by being referred by an old colleague. Turns out maintaining relationships with people who can vouch for your work is a very big part of the process.






  • Generally commercial drive encryption solutions, like Bitlocker, usually has a backup recovery key that can be used to access the encryption key if your TPM is reset, or if your device dies.

    So I guess the short answer is most of these solutions don’t fully protect it from being moved to another device, they just add another layer of security and hassle that makes it harder to do. And without the TPM as part of these solutions, you would be entering a 48-character passphrase every time you boot your device, which has several security flaws of its own.


  • Assuming you use bitlocker on your PC, how do you know the entire content of the TPM (your bitlocker encryption key, etc) cannot be fetched from the TPM by the manufacturer or any third parties they shared it tools and private keys with?

    The TPM specification is an open standard by the Trusted Computing Group, and there are certification organizations that will audit many of these products, so that’s a good place to begin.

    As with any of the hardware in your device, it does require some amount of trust in the manufacturers you have chosen. These same concerns would apply to anything from the onboard USB controllers to the CPU itself. There’s no way to be absolutely certain, but you can do your due diligence to get a reasonable level of confidence.

    And because it is hardware based, how do I as a user know that it does what it claims it does as I would with a software based encryption software that is open source (like truecrypt/veracrypt).

    This is a reasonable thing to think about, although very few individuals are qualified to understand and audit the source code of encryption software either, so in most cases you are still putting your faith in security organizations or the community to find issues.

    When it comes to security, it often comes with a trade-off. Hardware devices can achieve a level of security that software can’t completely reproduce, but they are a lot harder to audit and verify their integrity.

    In any case, the TPM is something that software solutions have to explicitly call in the first place, it isn’t something that activates itself and starts digging into your hard drive. Which means if you don’t want to use it in your security solution, then it will sit there and do nothing. You can keep using your encryption keys in clear memory, visible to any privileged software.

    I don’t know specifically about the XBox and how it uses it, but the TPM absolutely can be used as part of a DRM scheme. Since the TPM can be used to encrypt data with a key that can’t be exported, it could be part of a means to hinder copying of content. Of course this content still has to be decrypted into memory in order to be used, so people looking to defeat this DRM usually still can. DRM as a whole is often shown to be a pretty weak solution for copy protection, but companies won’t stop chasing it just the same.