ramjambamalam

joined 2 years ago
[–] ramjambamalam@lemmy.ca 5 points 1 week ago (1 children)

A highly respected school teacher of mine was known to say, "Say what you mean; mean what you say."

[–] ramjambamalam@lemmy.ca 7 points 2 weeks ago (2 children)

I haven't tried it yet, but I've seen massive lists of trackers floating around that you can add to your torrents, in case the same torrent is indexed on other trackers, but the torrent file you downloaded doesn't know to search them.

[–] ramjambamalam@lemmy.ca 3 points 2 weeks ago (1 children)

It appears on my instance, FWIW.

[–] ramjambamalam@lemmy.ca 1 points 1 month ago (1 children)

Serious question: what is a US multinational?

[–] ramjambamalam@lemmy.ca 13 points 1 month ago

Have you considered joining the reserves? I've been a pacifist my entire life but am wondering about it now.

[–] ramjambamalam@lemmy.ca 1 points 1 month ago (2 children)

Devil's advocate: the better question is what percentage of Canadians will eventually max out their TFSA?

I don't think it's a good policy anyway, as the administrative overhead of managing yet another registered investing account (or making TFSA reporting more complicated) is more hassle than it's worth.

[–] ramjambamalam@lemmy.ca 6 points 1 month ago* (last edited 1 month ago) (1 children)

Gibby's Electronics Supermarket in St Catharines has more home theater equipment than computer parts, but they have a great selection and you generally won't beat their prices anywhere else, and they ship.

[–] ramjambamalam@lemmy.ca 19 points 1 month ago* (last edited 1 month ago)

I can think of easier ways of compromising the data besides brute forcing the keys, off the top of my head, and I'm just some schmuck. Relevant XKCD: https://xkcd.com/538/

  1. Compromise their endpoint with a malicious app on the app store.

  2. Gain physical access to the device and compromise it. Use your imagination – pickpocket, traffic stop or customs inspection by a compromised agent, seduce them with a honeypot, etc.

  3. Socially engineer them to mistakingly add you to their group chats.

  4. SIM swap

Signal might be fine for journalists, criminals, cheating spouses, and general privacy when used properly with good OpSec but nation state adversaries have significantly greater resources than your average attacker, and thus require more significant security.

[–] ramjambamalam@lemmy.ca 7 points 1 month ago* (last edited 1 month ago)
[–] ramjambamalam@lemmy.ca 1 points 1 month ago (1 children)

'cause it's delicious.

[–] ramjambamalam@lemmy.ca 4 points 2 months ago

Me too! And the bowl, and the whisk, and ...

view more: next ›