Gonna bring the after-school satan club to the entire state :)
Gonna bring the after-school satan club to the entire state :)
But MS teams is very secure! It’s sandboxed in a web browser :) It’s effectively a single-tab display of an entire ram-eating chromium process :)
The only unfortunate side effect is that it can’t read your system default audio output, so it uses a cryptographically secure random number to decide which other audio output to use. That’s right - it very securely knows about all of your audio outputs, even though they aren’t the system default :)
Did you just try to send someone a file? Don’t worry, I’ve put the file in sharepoint for you, and have sent them a link instead. Actually, wait - you had already sent that to someone else, so I sent file (1).docx instead. Actually wait - that was taken too. Now it’s file (2).docx.
I would like to provide a friendly reminder that you will need to manage the file sharing permissions in sharepoint should anyone else join this 1-on-1 direct message chat :)
Use network namespaces :)
A brand new network namespace doesn’t have any network interfaces. When you start a process in a namespace, all its child processes will start there too. It’s like a little network jail, and the functionality is baked into the kernel / is kernel enforced.
I use this to keep certain processes on a vpn, with no need for interface-binding support from the process, or a vpn-killswitch.
Another fun fact, this is the functionality that enables containerization, like docker/podman
I strongly recommend the NAT loopback route over attempting split-horizon dns.
It really depends on the parameters of the thought experiment.
If everyone suddenly received a lot of money, there would be a wild period of adjustment before we figure out the pricing system again and life continues as normal. Even though there’s a lot more money, there is not magically more TVs to buy. Nor would we all start building tv factories - there’s not magically more copper or concrete to buy either.
If we all got more money and buried it in our yards and swore never to use it, then nothing has changed. For the sake of the thought experiment, someone would break the promise (I would - I want air conditioning), and then everyone else would break it too, and we end up in the previous situation.
If everyone were suddenly truly wealthy - as in stuff / things - some might think we would chill out and coast for a while. But having satisfied our big needs ( I am not being hunted by tigers) and our medium needs (Air conditioning, yay!), I imagine humanity would just keep working - there are always more problems to solve / there is always more work to do.
I think it’s a D-tier article. I wouldn’t be surprised if it was half gpt. It could have been summarized in a single paragraph, but was clearly being drawn out to make screen real-estate for the ads.
Get yourself a $5 vpn service and read up on the “Mainline DHT” :)
Between 2005 and 2010, the nation of Canada simply ceased to exist.
The threat model helps a lot.
I work for a small consulting firm. We do security assessments, but not the kind you’re looking for. I don’t want to sell you anything.
From your intro here, I would expect to book a resource on this project at 50% utilization (to avoid burnout) for about 3 weeks. One week of assessment, one week of report writing, and we’ll say a week of overhead / buffer (to get things rolling / ask questions / interviews / report readout). That’s a total of 60 hours.
My employer is expensive; we charge about $300/hr per resource. That comes out to about $18k. I would call this an upper limit (though in truth there is no upper limit. If you put multiple $700/hr resources on a project and let them bring in SMEs, things get expensive fast)
If you haven’t done a security review before, I wouldn’t worry - you aren’t ready for the $18k service, or the $1k service. You will need a 3rd-party certificate eventually, but right now all you need is trust from your userbase, and openness and transparency are a good initial strategy.
When it’s time, throw a hundred bucks at a local college student who’s into cryptography. Then fix / address all their findings. Then go for the next level, and fix their findings. There will always be findings; what you are buying is user trust. The more in-depth the review, the more trustworthy - but you don’t want the expensive service to be distracted by things a college student could have caught.
I am intoxicated and rambling - let me know what questions you have :)
Arch-packaging-haskell moment
Is it the little toe and the outside half of the second toe? That sounds like exactly what I have on my fingers - cubital tunnel syndrome, from keeping my elbow bent too often. Are you a side sleeper?
I have karhu fusions and I love them. I wouldn’t be able to hand elastic laces, they can’t get tight enough for me, and if they did they would stretch out within a week.
If youtube manages to stop fast forwarding, maybe at the very least we could auto-mute, and maybe overlay photos of puppies or something
Drink hella water, wear less clothes. That’s about all you can do :(
My apologies, allow me to elaborate - grayhatwarfare.com is a cybersecurity company that crawls and indexes publicly-available blob stores, like s3 buckets, azure storage accounts, digital ocean spaces, and google cloud object stores. They offer limited search capabilities for free, no account-wall.
They are a legitimate cybersecurity company, despite their name.
My employer is working on a sensitive data scanning service, to alert clients in case their information surfaces in these buckets (even if they do not own the bucket), leveraging the grayhatwarfare api. In short, allowing us to detect and remediate the problem, which I hope you will agree is a white-hat activity :)
I do not publicly condone breaking the law. I reserve the right to criticize the DMCA tho ;)
And if google dorks aren’t interesting enough, because google does not index enough public buckets for you, then we get to learn about gray hat warfare too :)
You are one of today’s lucky 10,000:
https://knowyourmeme.com/memes/i-crave-that-mineral
But that is a sick fact about the lichen, I did not know that.
They crave that mineral
That sounds like a blast! And a great way to explore. You’ve definitely earned some recovery
I want to see a 600MB image upload. I want to see the upvote federation stress test lemmy’s infrastructure. I want an image so wide that my app crashes. I want to see how far we can push this before admins need a database upgrade to handle it. I want to watch the system burn in the name of a wider en passant.
There is no such thing as easy or hard.
Give it a try, fuck it up, and give it a try again. Try not to fuck it up in the same way as the first time. Repeat until it works - it will work eventually.
It took me about 6 hours and 3 disk re-formats my first time. I was particularly bad at it. I barely knew what a disk was, nevermind a partition.
Actually I’m still not sure what a partition is.
You’ll do fine :)