• 6 Posts
  • 1.68K Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle
  • I think you attribute far more cleverness to them than they have. I don’t think they care if we’re concerned about their lack of morals or ideas. Why would they? All the information needed to know about that was publicly available before the election and it didn’t matter. The people who would care already know, and the people who wouldn’t… There’s no reason to distract them. Not that it matters, since they won and we can’t exactly change that.
    I can assure you my snark here doesn’t reduce the amount of other conversations I’m having elsewhere. I can hold opinions on multiple topics at once. ;)

    I wouldn’t put it past them to actually want this insanity. People said the same things about how talk of overturning Roe was just a distraction because it’s a “settled matter” and doing it would be insanity.

    Imagine if they’re not actually playing 5 dimensional chess. Imagine if their platform is exactly what they say it is, and their dumb ideas are real. If they respond to claims they don’t have any ideas by saying they have the best ideas, and to claims of immorality by calling them lies and calling the accuser a pedophile.

    I think people want them to be more clever than they are, because it means that people got duped, rather than their surface level idiocy being super appealing to a lot of people.



  • I would lean towards no. I’m me. I don’t consider the things that people seem to associate with their “inner child” to be exclusive to children, so I don’t feel a tension between my desire to act responsibly and my sense of wonder, joy, and playfulness.

    Age isn’t a mask hiding the inner child, it’s a toolkit that helps them appreciate and engage with those things. My childish delight at birds flitting about the bird feeder is only enhanced by being able to buy my own, keep them filled, and the ability to understand more about everything that goes on with them. I have the experience and faculties to answer questions I have, which only deepens my appreciation for the “common” wonders we see everywhere. Experiencing more of life and it’s lows only makes the highs sweeter.

    A child plus age and experience is an adult. You don’t need to lose the happiness to get there.


  • You need to think about what a backdoor looks like for different devices, and different functions of that device. “Backdoor” generally means a way to bypass security measures, but that entails can vary wildly in different contexts. For some things you can know because you can check to see if the hardware is doing what’s expected because the only meaningful backdoor would be local to the hardware.
    For example, hardware based encryption systems can have their outputs compared against a trusted implementation of the same algorithm.

    For cases where there isn’t an objective source of truth for “proper functioning”, or where complex inputs are accepted and either produce a simple answer (access granted/denied), or a complex behavior (logging login attempts and network calls are always expected) it can be harder to the point of impossibility to know that what’s being done is correct.
    This is also the case for bugs, so it can actually be unclear if something is a backdoor or an error.
    “Any sufficiently hair brained programming error is indistinguishable from an attack by a nation state threat actor”. (the goto fail bug is a great example of this. extremely dumb error every programmer has made, or a very well executed and sophisticated attack.

    Ultimately, any system can be compromised by a sufficiently determined attacker. Security cannot be perfect, because at some point you need to trust someone.
    The key is to decide how much you trust each system to handle whatever you need it to handle.
    I trust my phone’s manufacturer as much or more than I trust the network provider. If I’m doing something naughty the person I’m communicating with getting snagged leads to me via the network and their device without needing to compromise my hardware. I choose to focus on the weak link: the people I talk with who might be unable to properly conduct a criminal conspiracy, and getting them up to speed.


  • Oh God, do people do that? Shouldn’t do that with any pan.

    Toss a cup of water in the pan to deglaze it and scrape any crap up with your cooking tool. Dump the water in the sink and use some paper towels to wipe out any loose stuff.

    This might be enough to clean it, but if not once it’s cool clean as appropriate. If it’s carbon or cast iron, reheat to cook off any water and wipe with a drop of oil you bring to smoking.

    Inevitably leave on the stove until you need to use it next instead of putting it away properly.





  • Carbon steel > cast iron. Lighter, basically the same heat properties, and you don’t get peer pressured into unnecessarily babying a lump of solid metal.

    Seriously no reason to dote on either of them so much. Only real care you need to take is that they can rust, so don’t leave them wet. And don’t needlessly scrub them with chain mail or angle grinders, or you might need to take a few minutes fixing them with cooking oil and the oven.







  • ricecaketoGreentextAnon has marital problems
    link
    fedilink
    arrow-up
    11
    ·
    4 days ago

    I believe filling out the divorce paperwork doesn’t actually make it happen, it’s just an application for divorce.
    It has to be filed with the court and a hearing held to make sure it’s all good and then the judge does the thing and you’re divorced.
    Mostly this is a rubber-stamping type situation, and the judge mostly makes sure that asset division is done fairly and any children are cared for.
    If no one has objections, the money is simple and everyone agrees, and there’s no children the whole thing is relatively simple.

    So filling out or destroying the paperwork doesn’t actually do anything.



  • I mean, you’re not wrong, just a hair off. It’s the most universally possible to implement.

    Every version of every phone can support SMS, and no one worries that someone is spying on them when they get one.

    SMS is a terrible solution, but it’s extremely easy to implement, and very accepted by people at large. That makes it all those things you mentioned, but it’s backed by a very legitimate motivation.

    In other contexts this explains part of the popularity of federated signin systems, since users may not trust you, but they probably trust their email provider, and if you can piggyback off their MFA, you don’t have to hope the user will find you special enough to do the extra work.

    Dedicated phone apps have a similar advantage, since you can leverage the phones built-in identity management.

    Passkeys are currently being pushed very hard by security folks because, if done right, you can make the user more secure while making their sign-in process simpler, and letting them need to remember less and not install or manage anything.

    You still have the ultimate issue of the atypical user who is valid and can authenticate, but for whatever reason has decided to only posess the dumbest of dumb phones, and can only accept SMS or phone calls.