Hello thanks for visiting my profile.

For any picture posts I make with the [OC] tag, I provide a license for you to use my photo under the terms of CC-BY-SA-4.0. You may DM me for questions.

  • 1 Post
  • 32 Comments
Joined 2 years ago
cake
Cake day: March 14th, 2023

help-circle





  • Yeah I was trying to summarize in a word how the linked comment used it, the developer was not talking badly of trans people per se, but was critical of how their group and the cause to express their identity is being misused by the ruling class. I imply that it could be transphobia, but I’m not certain if it is, even if I understand why it would be an upsetting and hurtful take for some. If there’s a better way to describe this succinctly with a more respectful framing, I’m open to alternatives.




  • Precisely. And this is much in the same way coming from the CEO and Proton official accounts. Republicans use Proton, just as much as Democrats. Until I see evidence that Andy Yen’s misguided philosophy leaks into Proton’s offering itself (and not just their PR channels), I’m willing to give benefit of doubt. Part of it seems to be not wanting to get on the wrong side of their leaders. As a reminder, these are the leaders that have been given a blank cheque from both voters and the justice system to do whatever they please with dissidents.


  • I get you. It’s important to remember there is nuance on topics/people you agree and disagree with, rather than jumping to “is against transgenderism”, or “agrees with Republicans on everything”.

    Like you say, actions will speak louder than words. The further the Proton team can put their product and governance away from these opinions the better. The transition to non-profit structure is a positive step in that regard.

    edit: forgot an important word in my comment


  • Biden’s pick Lina Khan deserves all the credit for aggressively prosecuting anti-competitive practices. However, Gina Slater looks like someone capable of continuing that work and a legitimate admirer of Lina Khan. Yes there are ties to Vance and the FTC office is likely to end up beholden to the egomaniac in chief. So the whole “little man” thing aside (that’s baloney), that’s one person that’s not a shit stain out of all the shit stains in the incoming cabinet.

    Look Lemmy, you’re welcome to choose what you want in your life and what you don’t. But being too rigid with letting stupid opinions of a project’s founder cause you to reject everything, would have you miss the big-picture benefits of having such a project exist. If you look at this Lemmy development co-leader’s opinions on transgenderism, are you going to stop using this software that lets you converse on an LGBTQ+ safe-space instance with no involvement on a social level from said developer/founder?



  • Rentlar@lemmy.catomemes@lemmy.worldA normal American company
    link
    fedilink
    arrow-up
    90
    arrow-down
    1
    ·
    2 months ago

    They are a company that makes thinky-sand.

    First they realized that if they forced everyone to use their thinky sand at school, they could charge a massively inflated price.

    Then they realized that if they made the thinky-sand go boom, they could charge whatever they wanted.



  • Hence I put that part of the comment with my tinfoil hat on, the world is out to get me specifically, trying to masquerade a well-publicized “security feature” as a backdoor to spy on whoever they please, when they could just as easily put unpublicized vulnerabilities elsewhere.

    Yeah, if you can’t trust any of the CPU vendors, then you can’t trust desktop computers at all. Or you’d put a Faraday cage around your home or something to keep the internet out.

    Also, cybercriminals simply can hide in countries where enforcement is lax to non-existent. Even if you break American or European rules, all American or European officers can do is their best to block them from their own countries’ services or tap the shoulder of the apparent source countries’ leaders, or in rare cases, dispatch a covert unit to intervene directly.


  • If you’re paranoid, install a new drive, reflash/update the motherboard bios, clear the boot picture (a proof of concept rootkit storage vector was there), factory reset the motherboard, clean install an OS, install software from trusted sources only, don’t let any stranger use your PC without you watching, take extra steps to encrypt your drive, and finally securely limiting privelege escalation to what you explicitly authorize. You’d be in the clear against 9999/10000 of attacks (I have no citation for this figure). You’d have to be super important, like a diplomat, tax chief, Microsoft IT director or small country royalty or something if you are to be targeted through an old ThinkPad.

    (Tinfoil hat time)

    Are you trying to evade info-stealing hackers, or the feds? From feds you’re somewhat out of luck, Intel ME and AMD PSP, in conspiracy-speak are kinda like government backdoors, closed source, undocumented, with huge control over a processor. AMD example intel example. Apple hardware is no better, you had better hope they haven’t conveniently slipped up and left an arbitrary read write endpoint in the software.

    (Tinfoil hat off)

    Assess your risk and threat level and take appropriate mitigation measures. The vast majority of exploited vulnerabilities will be through social engineering rather than software, and then software rather than hardware. The lowest hanging fruit is when there are open, easily accessible connections from the internet, software that can be exploited to freely escalate privilege, a user unwittingly leaking a secure credential, or physical access to a device by someone knowledgeable.