• 0 Posts
  • 38 Comments
Joined 2 years ago
cake
Cake day: June 22nd, 2023

help-circle





  • The roles I’ve hired for require formal presentation of work/studies with a certain level of attention to detail, and more internal politics than I care to admit.

    So while its never the sole deciding factor in a resume I do put weight on spelling, formatting, and general professionalism. If your email is firekitten22@aol.com, or jon@sirfapsalot.net I’m not immediately binning it, but you are starting from a disadvantage. stephanie@harmlessdomain.com is always gonna be just fine though.



    1. People don’t like the idea of paying for stuff they’re used to getting for free

    2. Privacy Guides does not include Kagi in their recommendations because an account is required in order to search, despite it being against their privacy policy to log, and despite the fact that they allow “no-log” VPNs, messaging apps, etc. which all require accounts. They’re starting to soften to Kagi with their new Privacy Pass feature, however they seem hung up on the fact you need an account to generate private tokens. Accounts can be made with burner emails and paid with crypto.

    3. Kagi leadership has had some controversial opinions on search censorship (they’re fairly blanket opposed to it) and other social issue in the past

    4. In addition to search, Kagi offers AI tools, which is a turn-off for a lot of people

    To me, none of these things are deal breakers, but some folks are eager for an excuse to complain.


  • I mean sure, if you ignore the first 20 or so relevant links before that, you’re right, that one does show up when searching for monkey (proof)

    You can add literally any other word to the search and that one result disappears. Even bear monkey. Regardless of the fact that no one searches for just the word monkey, I find Kagi’s rankings consistently prioritize more quality and informative content.

    Comparing to other search engines, Google is obsessed with the movie The Monkey, Bing really wants you to watch Monkey Baby Bon Bon live what looks like a nightmare life, Brave gives an OK mix of content, still with a The Monkey focus, and Kagi gives you a really solid mix of results across the monkey spectrum for such a vague query (plus one whole link to an article about polar bears).

    If the polar bear result specifically bothers you, you can report it to Kagi and I’m sure they’ll fix it. I’m still happy with my choice though.

    Edit: decided to check DDG as well - I’d written it off in my head as just Bing, but the results were slightly different - the Monkey Bon Bon nightmare fuel was pretty significantly demoted, and for better or worse, DDG was blissfully unaware of the movie The Monkey. Not a bad result overall.


  • I know it’s a controversial take around these parts, but I’ve fallen in love with Kagi.

    If I had to rank search engines by results, in my opinion/experience:

    Kagi > Brave > Startpage/Google > DDG/Ecosia/Bing

    Kagi/Brave/Startpage/DDG all offer privacy to some degree. I haven’t really fucked with SearXNG though I’m sure its awesome.



  • Cool story bro. There was (and likely still is, because you clearly haven’t found it) a keylogger on your system when you logged into Steam at some point.

    You can continue in denial if you want, it literally makes no difference to me - I’m not the one getting HIBP Stealer Log emails. Just trying to warn you, I wouldn’t log into anything you care about getting hacked until you find out what caused the breach.


  • Man, the denial runs deep.

    HIBP works by finding big databases of stolen information on the dark web. Usually these databases are attributed to websites that have been breached.

    In the case of “stealer logs” though, the databases are full of logins to a bunch of different websites, instead indicating it comes from hacked computers.

    They, and I, can’t truly say for certain that your computer was hacked, so instead they have to make vague statements like “someone attempted to log into your account on a compromised computer”. That information went to the hackers who developed the virus, and they posted it online. They don’t know your computer is infected, just that your information ended up in a pile with a bunch of other people’s whose computers were infected.

    The person logging in could be you, could be anyone, they may not have even gotten in, but the #1 most likely scenario is you logged into your account on your computer while a virus was running in the background capturing information.

    Your computer being the one with the virus is made 1000x more likely because you mention in previous posts that you use pirated software.

    If you pirate software, and you get a HIBP stealer log notice, I’d wager there’s a 99.7% chance someone snuck a keylogger into one of the programs you downloaded.



  • Nasty stuff, stealer logs. I’ve written about them and loaded them into Have I Been Pwned (HIBP) before but just as a recap, we’re talking about the logs created by malware running on infected machines. You know that game cheat you downloaded? Or that crack for the pirated software product? Or the video of your colleague doing something that sounded crazy but you thought you’d better download and run that executable program showing it just to be sure? That’s just a few different ways you end up with malware on your machine that then watches what you’re doing and logs it, just like this:

    These logs all came from the same person and each time the poor bloke visited a website and logged in, the malware snared the URL, his email address and his password. It’s akin to a criminal looking over his shoulder and writing down the credentials for every service he’s using, except rather than it being one shoulder-surfing bad guy, it’s somewhat larger than that.

    Seriously, read the article you posted. YOU probably attempted to log in and the virus on YOUR computer you seem to be in HEAVY denial about captured your info. You’re lucky the 2FA probably prevented the people who are are logging activity from your PC from accessing your Steam account.

    The article you posted clearly defines stealer logs, and the email you screenshot clearly says your info is in a stealer log breach - I don’t know what more to say. You clearly have all the information you need, you just don’t want to process it.

    YOU LOGGED INTO STEAM ON AN INFECTED COMPUTER AND ARE PROBABLY STILL USING THAT SYSTEM. YOUR COMPUTER HAS A VIRUS.


  • Good and relatively mass produced? Good start searching for terms like “solid wood dresser”. You still have to do some vetting but it cuts down on the absolute junk.

    Good and cheap? Check your local Goodwill and Habitat for Humanity ReStore regularly - their stock is highly variable, but they will have some of the best items for the best price out there.

    Money is no object? Make friends with the folks at your local hardwood store and pry them for recommendations for local woodworkers, and attend local craft fairs.