They have a poor history of incidents that leaves many people not trust them.
Max-P
- 1 Post
- 578 Comments
Max-P@lemmy.max-p.meto
Fediverse@lemmy.world•So admins, hows your instances looking today?English
181·2 months agoPerks of still running bare metal in colo, no issues for any of my stuff. Not seeing anyone say anything in the Lemmy chat on Matrix either.
Max-P@lemmy.max-p.meto
Technology@lemmy.world•Why are AI companies suddenly opening up coffee shops?English
1141·2 months agoI bet they’ll eventually get caught using coffee shop cameras and conversations for AI training, say it’s for training a security product or something.
It really depends, most people end up specializing into specific things they work on as software has generally become too big for single developers. We have people that only do frontend stuff so things look nice on the website, some only deal with the database and making sure we return results as efficiently as possible.
I started off doing the typical full stack but I’ve since branched off into DevOps so now I’m responsible for a few hundred servers across the globe that I keep updated and running smoothly.
Sometimes I work on new tools, sometimes I spend days tracking down weird problems, sometimes I’m rushing hotfixes because something is repeatedly crashing in production.
It’s worth noting that because you can click through UIs these days doesn’t mean that scales as you go. You can go spin up your app in a container in the cloud mostly through UI, but soon enough the defaults aren’t enough. I manage several hundreds of instances across a few clouds, I’ll well, well past clicking next next next finish. It’s just an easy and visual way to ease you into things, especially for beginners, as all the options available to you are there to see along with little help tooltips explaining what a setting does.
It also depends on what you do: if you work at a startup, clicking through Cloudflare’s dashboard is more than enough. When you have thousands of customers, you’re not managing the tens of thousands of settings you have to configure, you automate.
Code can describe things (HTML, CSS, HCL), code can configure things (YAML, JSON, Ansible), code can program things (PHP, JavaScript, Python, Ruby, etc), code can query things (SQL), programming as a whole is very wide.
Max-P@lemmy.max-p.meto
Linux@programming.dev•BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices - Eclypsium | Supply Chain Security for the Modern Enterprise
9·2 months agoIt’s meant to protect the software, not the hardware. Of course you can still put a hardware keylogger on it.
You’re also only considering the use case of the owner and user being the same person. In a business context, the user and the owner are two different persons. It can be used to ensure the company’s MDM and security software aren’t tampered with, for example if you try to exfiltrate company data. In that situation, even if you have a keylogger, it doesn’t help you much, it still won’t allow you root access on the machine, because the user of the machine doesn’t have root access either.
Same with servers: you don’t even care if the hardware is keylogged, nobody’s ever using the local console anyway. But it’ll tell you if a tech at the datacentre opened the case, and they can’t backdoor the OS during a planned hardware maintenance.
Same with kiosk machines: you can deface the hardware all you want, the machine’s still not gonna let you order a free sandwich. If you buy one off eBay you can bypass secure boot and wipe it and use it, but it won’t let you sneak a USB on it while nobody’s watching and attack the network or anything like that.
But yes, for most consumers it’s a bit less useful and often exploited in anti-consumer ways.
Max-P@lemmy.max-p.meto
Linux@programming.dev•BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices - Eclypsium | Supply Chain Security for the Modern Enterprise
10·2 months agoIt’s mostly for use cases where you can lose physical access to the computer like overnight at the office, at a hotel while travelling, in a shared server room, etc. It’s extra assurance that the computer runs the software you expect it to run and nothing else without at least being somewhat noisy about it.
This can in turn be used to use the TPM to get a disk encryption key, so you can do full disk encryption but still boot to a normal login screen without entering a password. It will only hand out the key with the correct signed boot chain.
If you have a desktop PC at home that nobody untrusted touches, then yeah there isn’t that much value to it for you.
Max-P@lemmy.max-p.meto
Linux@programming.dev•Framework flame war erupts over support of politically polarizing Linux projects
3044·2 months agoIf we deleted everything written by insufficiently pure developers, we wouldn’t have a Linux desktop. Especially if we count the ones that were smart enough to not bring up anything political in public.
Not a fan of DHH, but then you delete Rails then there’s no GitHub, GitLab, Mastodon, and many many other things given how popular Rails is, and that’s just that one guy.
If you include all the sketchy stuff that happens in the supply chain mining the minerals, processing, assembly all the way up to the final computer product, you just can’t morally justify supporting any manufacturer either.
This really doesn’t do anything useful other than feeling good to not support one of those guys. If anything it just adds extra political drama that feeds into a much bigger worldwide division problem.
Max-P@lemmy.max-p.meto
Technology@lemmy.world•Microsoft is plugging more holes that let you use Windows 11 without an online accountEnglish
71·2 months agoAt this point I just
net user /addit, which just creates the user manually and then you can reboot and just log into it.It’s not like you need anything from the OOBE at all, so might as well just skip it entirely.
Max-P@lemmy.max-p.meto
Technology@lemmy.world•ICEBlock Owner After Apple Removes App: ‘We Are Determined to Fight This’English
82·3 months agoArguably, if it was normal to sideload apps it wouldn’t be as much of a barrier to users, but they’ve been conditionned to think they need an app and the only place you can ever get them is the store.
It’s a technical hurdle only because Apple decided they want to control everything, and same on Android because of Google’s ever increasing war on sideloading. You used to download an APK from the browser and it would go like “This is an app! Install?”, but now you have to go enable third party installation and all that, and now the whole Play Protect forcing developer validation coming up.
Max-P@lemmy.max-p.meto
Technology@beehaw.org•Trump Makes It Very Clear They’re Going To Turn TikTok Into A Right Wing Propaganda Machine
221·3 months agoAt this point China doesn’t need propaganda, they just let the chinese users look at the US user’s misery by themselves and sit back.
When Rednote was first flooded by the first wave of TikTok refugees, the chinese users were baffled just how much worse it was than their propaganda said. Which is probably why they just let it go and didn’t immediately shut it down.
Max-P@lemmy.max-p.meto
Technology@beehaw.org•Trump Makes It Very Clear They’re Going To Turn TikTok Into A Right Wing Propaganda Machine
5·3 months agoRednote is pretty different vibes, I’m on it but not nearly as much as TikTok. It’s pretty interesting for what it is but it’s not a replacement and it’s not competing to be a replacement either.
I would guess they’ll probably move to Bytedance’s other app, Lemon8, or probably Skylight Social as Bluesky is generally pretty popular with the particular part of TikTok I’m on, so everyone already have ATproto accounts and follows.
At least a title would have been nice, at this point that’s just lazy to just paste the link of a repo and click post. Ok cool, but why are you sharing it, what’s cool about it, why should I click on this and spend time reading on it.
PieFed seems to have taken the spot as well, mostly delivering on what Sublinks wanted to be but faster and better. Python is more attractive than Java even for the Rust haters.
Max-P@lemmy.max-p.meto
Ask Lemmy@lemmy.world•What size of a PC game you are comfortable with?
13·3 months agoIt’s not the size, it’s a size to content/quality ratio. I’ll happily download a 500GB game if it’s got the content to match.
Uncompressed assets doesn’t bring higher quality visuals or content, it’s merely pure laziness or a scam to make people feel like they’re getting more for the outrageous price games have gotten.
Max-P@lemmy.max-p.meto
Linux@lemmy.world•LinusTechTips, might do a cool video with Linus Torvalds (starts at 1:55)English
93·3 months agoMaybe Torvalds will make Sebastian understand that Linux is not a product, it’s an ecosystem, and maybe finally make him review Linux properly without the “as an average tech consumer” approach he’s been doing. It’ll never be “ready” through that lens if always approached with a FOMO attitude.
One can’t be free when sucking it up to big tech all the time because “you need the latest fancy half baked proprietary features”.
Max-P@lemmy.max-p.meto
Ask Lemmy@lemmy.world•Does blocking javascript make web browsing safer?
101·4 months agoYes, a lot safer. Even bugs in the renderer or media player would typically be triggered by JavaScript by say, moving elements around really fast or whatever.
Without JavaScript, the browser renders that page and that’s it, there’s no JS to modify it or open popups, nothing to dynamically load/refresh content. The most you can do without JS is animations and responding to simple events like changing the color of a button when the mouse is over it. So your only shot to attack this is the renderer during initial page load, once.
Max-P@lemmy.max-p.meto
Technology@beehaw.org•Meta might be secretly scanning your phone's camera roll - how to check and turn it off
15·4 months agoThis is why when an app pops up that permission dialog, you always say no. The number of permissions Meta apps ask immediately upon startup is a red flag on its own.
Can’t collect and upload what it doesn’t have.
Max-P@lemmy.max-p.meto
Ask Lemmy@lemmy.world•is there any legitimate use of blockchains?
25·4 months agoAlso worth noting that the computations don’t have to be expensive either, it’s only there in cryptocurrencies to artificially limit the number of blocks generated on a public system and tie it into the reward system.
So for a bank, that could be a plain single iteration of a sha256 hash, and once share everyone agrees those were the transactions and you can’t go back and change one without having to change the whole chain.
Make it sha1 and you basically have git.
A blockchain is more or less just an append-only database. Or even an append-only replication log with built-in checksums.
Max-P@lemmy.max-p.meto
Ask Lemmy@lemmy.world•Do you try to protect your onsite backup from fire?
2·4 months agoThat’s what the off-site backups are for.
Especially given how easy it is to bypass Bitlocker anyway: https://youtu.be/Cc6vrQSVMII