You eat pieces of shit for breakfast, you piece of shit?
You eat pieces of shit for breakfast, you piece of shit?
Hanging on in quiet desperation is the English way
This is great and all, but what I really need is an alternative picture of shel silverstein to put on the back of the book.
Yes, I have no clue how she felt about the article from 2000, and obviously reading it with a 2024 lens is not fair to the original author. I am happy for her that the obituary didn’t deadname her like the original article did, and hope that she would have been ok with the pronouns used the way they did pre/post transition.
You’re right, very weird use of pronouns in the obituary. I can only imagine that most of it was lifted from the article from 2000. That doesn’t excuse misgendering someone, they could have updated it for 2024.
RIP SALLY RIDE!!! 😭
Does Microsoft’s GitHub offer any pre-receive hook configuration to reject commits pushed that contain private keys? Surely that would be a better feature to opt all users into rather than Windows Copilot.
How has it taken us 2024 years to realize this??
I’m definitely never logging in to a Google service while using Firefox.
Could you elaborate on this? Why not use Firefox for logging into Gmail, Youtube, etc
This argument implies there’s an easy way for you to perform the reproducible builds on iOS, but it’s quite involved and requires a jailbroken iPhone. Overall this is more a limitation of apple and not signal.
Even if you were able to perform a reproducible build of Signal on a jailbroken iPhone, there’s no way to confirm that the stock iOS Signal app will match, or has a backdoor that got added in a supply chain attack that only is delivered to non jailbroken phones. You could use a jailbroken iOS device, but then it could be lagging behind updates and be even more vulnerable from zero days.
The real pressure here should be on Apple to provide a way to verify a build of an open source app matches what is being installed via the app store, but for some reason this is being framed as a Signal issue, which is disingenuous.
Not having reproducible builds is definitely weird though. Does anybody have more information on that?
They boast this as a feature, but on the instructions for how to do this for iOS, even Telegram admits “As things stand now, you’ll need a jailbroken device, at least 1,5 hours and approximately 90GB of free space to properly set up a virtual machine for the verification process”. Browsing the steps, it’s extremely complex, and doesn’t seem like something that is very user friendly and that you’d do weekly or monthly when a new version is released.
On the GitHub issue linked to in the body, it’s disingenuous to claim they refused to implement this, and that the technical hurdles Apple has in place make this extremely difficult which halted progress. In the community forums where the conversation was moved to, someone pointed out that even if you were to reproduce it on a jailbroken iPhone, that there’s no way to confirm that non-jailbroken iPhones aren’t receiving a version with a backdoor.
And even if you are using a jailbroken device exclusively and can confirm the reproducibility of the iOS app, then the risk becomes the latest available jailbroken iOS could be outdated from the real versions, and you’d have other issues with not receiving timely security updates. This same issue applies to Telegram also.
I’ve been pretty happy with how Automattic has handled PocketCasts and the premium features feel like what you’d expect, while the main product is perfectly usable for 90% of people and use cases. I hope with their acquisition of Beeper, they continue this mindset and add premium features (extra themes, premium stickers, etc) without compromising the main app.
This is what I’ve read about where users in AD can be federated to FreeIPA: https://www.freeipa.org/page/V4/One-way_trust. Not sure if this covers your use case
It’s my understanding that FreeIPA can federate with Active Directory, but personally I haven’t tried that myself. As for Authentik, it looks interesting but it’s the first I’ve heard of it. I also rely on FreeIPA’s certmonger implementation, so I wonder if Authentik could replace that?
Just to understand your use case, you have users in Active Directory where you want to manage SSH keys and be able to login via SSH to linux machines?
Exactly, like how an ocean liner is a step up above a sailboat. That doesn’t mean you’re unsinkable and don’t need to worry about icebergs.
Windows is banned in my household, so l’m not worried about malware.
This is a false sense of security and just because you’re not running Windows doesn’t mean you’re immune to everything and can let your defenses down. For example, KDE recently had to announce that downloading themes will execute arbitrary code and cited someone who had personal information deleted because of downloading a theme.
Is the date a typo or are mars dates calculated differently than on earth?
I do the same thing, and one morning, I woke before my alarm and left my phone in the bedroom to take a shower. Learned that day that my wife doesn’t know PEMDAS.
Usually NYT sets a cookie to track how many free articles you read and once you exceed that, you get the paywall. The bots probably don’t set/send the cookies, so NYT doesn’t block them. Also, I’d imagine the bots are coming from various different IPs so even server side blocking based on IP wouldn’t block everything and eventually the bot would get to the article. User Agents can also be spoofed.