deleted by creator
deleted by creator
“if you want to tell me what to do put me on the fucking payroll!”
Great clip.
This is all I’ve run across on reverse engineering, so far but it is quite interesting.
https://bsky.app/profile/filippo.abyssdomain.expert/post/3kowjkx2njy2b
You sure made no bones about your opinion there.
Some of the trust comes from eyes on the project thanks to it being open source. This thing got discovered, after all. Not right away, sure, but before it spread everywhere. Same question of trust applies to commercial software too.
Ideally, PR reviews help with this but smaller projects esp with few contributors may not do much of that. I doubt anyone has spent time understanding the software supply chain (SSC) attack surface of their product but that seems like a good next step. Someone needs to write a tool that scans the SSC repos and flags certain measures like the # of maintainers.
PS: I have the worst allergies I’ve had in ages today and my brain is in a histamine fog so maybe I shouldn’t be trying to think about this stuff right now lol cough uuugh blows nose
Well maybe they aren’t experienced info security professionals :)
I think you win.
If you haven’t yet, give Lief Ove Andsnes’ rendition a try.
Everyone has their favorite interpretations, I guess. This is one of mine. From a pianist that impressed the hell out of me when I first heard him.
(The album Horizons if the link doesn’t work or you’re boycotting Spotify or whatever)
God I am getting crazy goosebumps just listening to this again. I love the 9th symphony so much.
Oh wow that is amazing. Thank you!
I forgot how much I love this kind of choral music.
Yeah she does.
I get where you’re coming from but is he managing his risk or not?
Does he understand the risk? If yes, good. No? Bad.
Is he ignoring the risk? If yes, bad. No? Good.
Is he weighing the risks against the benefits he receives of using these apps and taking appropriate steps to mitigate those risks? If yes, then good. No? Bad.
Cyber security isn’t “lock everything down at all costs”. Otherwise I would insist you throw your phone in an incinerator along with all your computers, live in a bunker reinforced against nuclear attack with a small army to guard you, never leave it, never talk to anyone… Etc.
It is enabling one to achieve their goals with a tolerable amount of risk. That level of tolerable risk is different for everyone.
Right? I guess by saying the hard N word. I’m so fucking fed up with bigots, I tell ya.
Who cares. Let’s focus on what’s actually important here: racist shitbags.
Yup. Always. They can’t see that everyone doesn’t think and act like them.
I guess deflecting/projecting is a common manipulation technique that slimebags learn.
I am a big fan of Cherry myself. Seems to be food contact safe and I find it a joy to work with.
If the first one didn’t convince 'em, I am not sure anything will, including a 20 year dictatorship complete with death squads and final solutions.
It isn’t rude to examine religious texts, myths, and traditions from an academic viewpoint, however.
According to World History Encyclopedia, the story is adapted from non-Israelite, near eastern myths.
… the concept of a “garden” of a god(s) was a very common metaphor in the ancient Near East of where the god(s) resided. For the narrator of Genesis, the “Garden in Eden” was imaginatively constructed for an etiological (origin or cause of things) purpose, not as a divine residence, but of the first man and woman on earth – Adam and Eve. As generally accepted in modern scholarship, Genesis 1-11 is labeled as the “Primeval History,” which includes mythologies and legends that were very common not just in Israel, but throughout the ancient Near East. These myths and legends are not Israelite in origin but were adapted by the biblical writers for either polemical or rhetorical purposes.
Nobody is both that bored and that motivated. Unless paid.