![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
Metadata tags mean they can try, idk how easy it is tho
Metadata tags mean they can try, idk how easy it is tho
DDG chatbot uses chatgpt protocol, so how much privacy is there in this app?
WhatsApp uses Signal protocol, might try getting your friends/groups to switch over to the better app?
The even bigger issue, imo, is how many other researchers have done the same thing and it goes unnoticed?
This is the biggest retraction so far.
It is not just Ikea that is using Roblox to expand its reach. Netflix is also coming to Roblox, with the streaming giant recently revealing its “digital theme park” on the gaming platform, known as Nextworld. This will essentially acts as a hub where players can access areas, characters and games based on Netflix properties, such as Stranger Things and One Piece.
Seems like a way to get branding imprinted on young people. Plus IKEA is a budget brand, so makes sense to target future college dorm folks.
Im a fan of both, but glad I could help 😃
Ill add Regex Golf to the list
Absolutely disgusting. Privacy is a right!
Telegram isnt really e2ee so he wants to champion the less secure option. Gee, I wonder why???
It was the first result when i searched for “musk signal”
Anyone with actual knowledge of the law care to chime in? The people in the article used words like “should” a lot, but im interested in what the law actually says
The 3rd emoji is just bs. Then again, most of his post is bs
While true, in most cases the username is simply “git” and not a specific username tied to the pub/priv keypair
When authenticating with git over SSH, the private key should be considered secret and well protected.
That means the corresponding public key that was uploaded to the git server is enough to authenticate and no username is required. However, a password protected privare key is possible and extra layers of security can be added to the authentication mechanism.
As far as resource based attacks based on public key searching, I doubt many servers have significant enough public keys on a single host to even notice. Most repos are siloed and have specific teams/individuals assigned to them, so only a small number of public keys even gets loaded.
I dont know enough about the server side mechanics to be sure, but imo the attack surface is pretty small.
Thanks for the quick reference links!
Do you have any links at hand for all that?
If not, I will try to add find and them to this chain for future reference.
The line must go up, whatever the cost!
Including lying, controlling narratives, committing outright fraud, controlling the fate of companies through “consultants”, changing the definition of Recession, killing of whistleblowers, killing of journalists who help whistleblowers, to name just a very short few.
This system blows, how many millenia does it fucking take to figure that out?
Its astounding how little we still understand about the brain in 2024.
Interesting breakdown, thank you.
Do you happen to know if the containerization is similar to docker containers? Or more like android apps?