"...a would-be hacker would need to gain physical access to your device, unlock it and sign in before they could access saved screenshots."
I've got some news for Microsoft about how domestic abuse works.
"...a would-be hacker would need to gain physical access to your device, unlock it and sign in before they could access saved screenshots." I've got some news for Microsoft about how domestic abuse works. hackers, in fiction: trying to take control of other people’s devices and steal their data hackers, in reality: trying to take control over their own devices and prevent others from getting their own data
Show previous comments
@skye Lol i was collecting these hackers in fiction vs reality snippets for a writing research and boy oh boy is this gonna be a great addition!! Talked to a very smart person this afternoon who reminded me: climate fatalism ("it's too late") is a soft form of denialism.
Everything we do from here is worthwhile. It counts, it makes a difference. No matter what damage has been done, we can still make things better than if we had done nothing. We can still look after the world, look after our friends and family. Action has results. "average british person earns enough money to be alive" actually just statistical error. taxcuts georg, who lives in belize and makes £10,000,000 per second is an outlier and should not have been counted So…there is a concerted campaign, with Musk as its mouthpiece, to discredit Signal and get people to switch to Telegram. It’s disinformation, but there’s also useful information in it. The useful information is that a hideous, powerful, right-wing crank — or whoever’s yanking his chain — really, really wants people to use Telegram. We’ve long known Telegram’s security is weak. But now, in light of this new information, we should move forward assuming that Telegram is actively compromised.
Show previous comments
@inthehands@hachyderm.io could also just be the fact that telegram has nazis in the devteam @inthehands@hachyderm.io Can we just do an open source Telegram server that has all the features the official ones have, and modify the clients a bit to allow self hosted servers? Cause telegram still has some good user experience. @inthehands@hachyderm.io telegram is used by facists who think that signal is too "woke" Moving all my web content into "robots.txt" files on the presumption that they'll be ignored by crawlers
Show previous comments
@phooky oh so that's why web developers invented the Single Page App, so it fits into that one file!
Show previous comments
2008, me: I love the idea of cryptocurrency BITCOIN: The word "cryptocurrency" now means "financial scams based on inefficient write-only ledgers" 2018, me: I love the idea of the metaverse FACEBOOK: The word "metaverse" now means "proprietary 3D chat programs with no soul" 2022, me: I love the idea of procedurally generated content OPENAI: From now on people will associate that only with big corporations plagiarizing small artists and turning their work into ugly content slurry
Show previous comments
@mcc honestly ai is the most popular and fastest selling snake oil yet. @mcc And then the companies and people who cynically exploit our belief in the future to promote these scams have the audacity to tell us that we’re pessimistic about technology. We’re not! We love tech! We hate the bullshit, the scams. @mcc USSR: From now on people will associate that only with murderous totalitarian regimes Memory errors in consumer devices such as PCs and phones are not something you hear much about, yet they are probably one of the most common ways these machines fail. I'll use this thread to explain how this happens, how it affects you and what you can do about it. But I'll also talk about how the industry failed to address it and how we must force them to, for the sake of sustainability. 🧵 1/17 First of all let's talk briefly about how memory works. What you have in your PC or phone is what we call dynamic random access memory. That is memory that stores bits by putting a minuscule amount of charge into vanishingly small capacitors (or not putting it in if we're storing a zero). These capacitors continuously leak this charge, so it needs to be refreshed periodically - every few milliseconds - which is why it's called "dynamic". 2/17 @gabrielesvelto TY for this 🧵 . Very interesting and aligns with my experience with much older hardware. All the best to you.
Show previous comments
@benhamill How clear can anyone’s eyes be when they are being subjected daily to massive multinational propaganda assaults, ongoing since at least 2015? The object isn’t to encourage protests. We all protest because this complex situation is heartbreaking. Look at the push to Demonize Biden & dissuade people from voting when it’s clear that a vote for tRump will result in a multitude more deaths & suffering & not just in Gaza. #USPol #farL
Show previous comments
#OtD 30 Apr 1963 a boycott was launched of buses in Bristol, England, by a group of West Indian workers in protest at the bar on Black and Asian workers working on buses in the city by bosses and the union. Months later they won https://t.co/VEqdbLVLxs https://stories.workingclasshistory.com/article/10260/bristol-bus-boycott?utm_source=dlvr.it&utm_medium=mastodon 5️⃣ Here's the 5th installment of my series of posts highlighting key new features of the upcoming v256 release of systemd. I am pretty sure all of you are well aware of the venerable "sudo" tool that is a key component of most Linux distributions since a long time. At the surface it's a tool that allows an unprivileged user to acquire privileges temporarily, from within their existing login sessions, for just one command, or maybe for a subshell. "sudo" is very very useful, as it…
Show previous comments
@pid_eins suid programs executing in the environment of the parent process means that I might become root in a user namespace and get the filesystem view of the current mount ns. This won't work with your approach, will it? @pid_eins This is very nice - especially having it provide a clean context, that saves a ton of headaches and sanitization I need to do when using "sudo" in other programs! (not like that's an amazing thing anyway, but occasionally it's useful and justified)
Show previous comments
I've fixed the horrible near plane clipping issues, added *very* basic collision resolution (literally 'snap to the top of the highest floor') and given him a drop shadow. @jsbarretto Even the DS didn't have hardware floats, which seems like a crazy decision given that 3D was a big thing on that system. But I guess it worked out in the end of them... |
@evacide@hachyderm.io thinking about that time I watched emails disappear in real time (and later learned this was how certain email addresses were scraped)
or the time my spotify started playing a different song ("fuck you" by Lily Allen)
yep, no potential for abuse here at all.
@evacide
This can only have nefarious purposes. I cant imagine any practical use for the device owner at all. I have been reading the comments and thinking about all the ways these devices would still access my image or details even if I dont use a microsoft PC (I'm downloading linux TODAY - this is too far). Other microsoft devices at my bank if I call customer services, facebook friends, mastadon users reading my posts, insurance company, local council, all using microsoft devices that could potentially have access to my data and countless others.
This will make our devices the perfect spy network, and I dont believe for one second that the screenshots will not be accessed by micrsoft down the line. This is just the first step to get us comfortable with their existence.
I work from home and hope to gawd my employers dont blindly go along with this.
@evacide
This can only have nefarious purposes. I cant imagine any practical use for the device owner at all. I have been reading the comments and thinking about all the ways these devices would still access my image or details even if I dont use a microsoft PC (I'm downloading linux TODAY - this is too far). Other microsoft devices at my bank if I call customer services, facebook friends, mastadon users reading my posts, insurance company, local council, all using microsoft devices that could potentially...
@evacide Oh they need to get physical access to the device and input passwords?
Or, and stay with me on this journey, microsoft is not a godlike being that never rolls out code with bugs. And any, ANY exploit here is going to be such a ridiculously awful fail state.