Wrong. This is a definition of a [pizza] + [the extra peperoni from the other slices that got stuck to that slice because the cutting was imperfect]
- 3 Posts
- 92 Comments
Clone myself.
Send clone through teleporter to pull lever.
360 no scope snipe the imposter clone motherfucker.
Claim credit for saving people.
throwawayacc0430@sh.itjust.worksOPto Privacy@lemmy.ml•What is the future of Google Play Intergrity APIs (and similar concepts)? Do you think we can find a way to bypass these, or is the future of the digital world just authoritarian and dystopian?English0·3 days agoI personally don’t know how a non-smartphone is better is terms of privacy. Can you explain?
AFAIK, they have the same level of spying, just more restrictions and less features.
Spherical Housing When?
I live in the “hood” and I have no HOA.
Fuck them “whites only” redlining neighborhoods where you don’t even have freedom.
Btw it isn’t even that bad as depicted on TV, they over-exaggerate everything. I still alive after a decade, haven’t personally known anyone that died to homicide. The upside is that there aint any nazis around here at least, so for me as a non-white its actually safer than those racist-ass neighborhoods. As long as I don’t go near drugs or gangs and I’m fine. And also remember to stay away from pigs.
Do they resolve thepiratebay[dot]org?
throwawayacc0430@sh.itjust.worksto memes@lemmy.world•What they don't want you to knowEnglish4·5 days agoIn a Chinese mythology story, there was a story about one upon a time, there being 10 suns (as in dieties), which each taking turns to be in the sky. One day, all 10 just decided to hang out in the sky simultsneously. So they send someone with a bow and arrows to shoot down 9 of the suns.
What if Japan is just one of the 9 suns that were shot with an arrow, and survived and transformed into land? 🤔
throwawayacc0430@sh.itjust.worksOPto Privacy@lemmy.ml•Are there any use-case for those SSDs with hardware-based encryption? Is it a good idea to use one of those over software-based encryption?English0·5 days agoI mean with physical access.
People living with you.
Or when you want to travel (domestically).
Someone who doesn’t need much experience can access the hard drive / SSD and replace the bootloader.
I know it probably doesn’t happen often, but this is more of a personal fear thing, I have trust issues with people.
Living alone is too expensive and thus I either have to stick with family, or split rent with random strangers as roommates, not to mention, some landlords can be creepy and do weird things. I don’t have trusted friends who can like live with me as a roomate and split the rent.
So anyways, I’m with parents, and I want evil-maid protections for peace of mind, since I can’t afford to live alone. (I mean like they are not dangerous criminals or anything like that, they’re just fucking nosey and I don’t like to find out how much do they want to spy on my online activities).
For phones, its already too locked-down and hard to modify so I’ll just trust the verified boot to do it’s job.
For computers, its too easy to edit the bootloader on the disk. So I think putting the botloader on such an encrypted USB and put it in read-only mode would protect against tampering with the bootloader.
I probably sound paranoid af right?
Basically, my threat model prioritizes preventing weirdos fucking with my electronics more than anyone else.
throwawayacc0430@sh.itjust.worksOPto Privacy@lemmy.ml•Are there any use-case for those SSDs with hardware-based encryption? Is it a good idea to use one of those over software-based encryption?English0·6 days agoI was thinking more of like a Tamper-Resistant Boot Drive with a computer being Full Disk Encrypted, And I basically phisically carve my signature into the Hardware-Encrypted drive and always check to make sure its mine and that it hasn’t been replaced, then I unlock it in Read-Only mode, then I plug into a computer to select the bootloader on the USB drive to turn on the computer.
Basically its a Evil-Maid-Resistant setup.
Of course, someone with actual NSA or FSB skills are gonna get in, but its just so the average script-kiddie can’t just download some tampered bootloader online and easily replace the bootloader.
And also I can store like a Linux Distro and Windows installation media on there and know its its much more difficult to tamper with.
Does this work against the threat?
throwawayacc0430@sh.itjust.worksto Privacy@lemmy.ml•Which AI model to run locally on androidEnglish0·6 days agoNot sure if a mobile device have that type of processing power lol
Not really “diabolic”, its common in my highschool when class is in the afternoon and the teachers want to make it sort of like those paper homework where its due at class time, so you could technically finish it in other classes or lunch time before that class actually begins.
You’ve heard of landlords, but have you heard of NFT-Land landlords? 🤭
If you see how depressed and pathetic I look, you’d cringe to death. Life was already terrible, then 2024 11 05 happened (USA), now I have zero hope.
Oh wait I just said USA. Goddamn, welp you wanna try finding me and then cringing to death upon finding out how fucked my life is? Be my guest 🫠
Lol this is why I’m too paranoid to post cat photos.
If someone ever find one of my relative’s social media and the photos of my cat that they took and compare it, they’ll find this lemmy account.
Nobody ever sits on the sofas in my house. Its just a glorified wardrobe.
Submits
It says: “Late”
Utter Confusion
Glances at deadline
“Due at 11:59 AM”
(Reason why 24 hour format is superior)
Eh maybe I’ll give it a try
The !lemmyshitpost@lemmy.world community fits great for this post.