

Setting up DoH, I already provide the expected name AND an IP. No need for plain DNS at any step. There’s no reason a corporate TV can’t do that either.


Setting up DoH, I already provide the expected name AND an IP. No need for plain DNS at any step. There’s no reason a corporate TV can’t do that either.


Depending on what you read, the “killing them” part was already in the books.
So, instead of burning your body working for miserable wages for a boss, you work yourself out taking pictures, and suddenly it’s bad?
Seriously. I know only a few people can actually get a decent living out of this, but that sounds smarter than what the majority of people struggle with in the long run.


How about no, for a change.


And everytime I get a document in a Microsoft format I send a reply asking if this or that is supposed to look that way or be that value. Yet it’s the open format and tools that’s an issue somehow.


Training brain-chip to Rip&Tear, I’m sure this can never go wrong.
Not only I consent, but I actually want it to happen. That’s the issue.


Yeah. I got a hunch of that a while ago, while trying some “old” scenarios of de-anonymization we used to do by hand. Just asking questions and posting pictures got surprisingly accurate results. A single picture with (to me) no significant landmark could lead to localizing a specific part of a city, and that was using a local LLM with a relatively small model, running on a 16GB VRAM 4060Ti.
It is now time to remember fondly the time where the younger people were warned by older people to not post all their stuff online, not over-share, be cautious about strangers, etc. I’m not sure when we lost that, but oh boy, it’s a festival.


No, I don’t think I wil.


Play Solitaire
Lose
Blame the cards
Oh the republicans will be insufferable. I mean, even more.


Microsoft-supported formats are badly documented, and regularly broken by updates of the software before changes are understood (if there’s even an update to the loose spec we used to have). That’s a problem.


That’s… not applicable here. Like, at all. To reproduce a printed document, you input it. To make a 3D print, you produce tailored list of operations depending on many, many settings. Usually, the file that reach the printer have little in the way of knowing what is printed, aside from expensive reconstruction that would only give the general shape, if even that. And even if you can send actual 3D model files to a printer that would do the slicing locally, there’s no “absolutely required” fingerprint there. A tube is a tube.
And, just so you know, there’s a slew of public printers and scanners that will just plain not recognize any of this, too. There’s also some “protection” pattern in some official document; large office printers would choke on them, where a home scanner was fine. This is, at best, only enforceable in the flimsiest of ways.


Let’s entertain the thought. How would one identify what is a gun part being printed, and what is a tube, a mechanical latch, or whatever else. Heck, I printed a plastic replica of a movie prop once. Would that be illegal?
I mean, I’m not in the US, and I know how to drive three steppers according to a list of extremely basic instructions that never ever represent anything “final part-y” looking, but the question remains. How do we go from “lots of gcode” to “yep, that’s definitely illegal” without saying that everything is illegal?


That’s basically what we used to do before big printer came in :D
Which one? The only thing mentioned by name here is gnome.


It’s already trickling down : from public government money to private business owners.
Doctors HATE this funny prank


If the entire supply chain up to the software you’re running to perform actual decryption is compromised, then the decrypted data is vulnerable. I mean, yeah? That’s why we use open-source clients and check builds/use builds from separate source, so that the compromission of one actor does not compromise the whole chain. Server (if any) is managed by one entity and only manage access control + encrypted data, client from separate trusted source manage decryption, and the general safety of your whole system remain your responsibility.
Security requires a modicum of awareness and implication from the users, always. The only news here is that people apparently never consider supply chain attacks up until now?


a novelty security feature for hubcaps that you don’t want to be removed too easily
If this picks up, the people you’d want to not be able to remove these too easily will be the first to have the adequate tools to remove them easily.
deleted by creator