[-] riskable@programming.dev 1 points 3 days ago

There's animes worse than Isekai Smartphone (e.g. Isekai Cheat Magician) but they didn't get a second season ๐Ÿ™„

[-] riskable@programming.dev 32 points 6 days ago

Correction: 3/5ths of certain embryos.

[-] riskable@programming.dev 85 points 1 week ago* (last edited 1 week ago)

This is a, "it's turtles all the way down!" problem. An application has to be able to store its encryption keys somewhere. You can encrypt your encryption keys but then where do you store that key? Ultimately any application will need access to the plaintext key in order to function.

On servers the best practice is to store the encryption keys somewhere that isn't on the server itself. Such as a networked Hardware Security Module (HSM) but literally any location that isn't physically on/in the server itself is good enough. Some Raspberry Pi attached to the network in the corner of the data center would be nearly as good because the attack you're protecting against with this kind of encryption is someone walking out of the data center with your server (and then decrypting the data).

With a device like a phone you can't use a networked HSM since your phone will be carried around with you everywhere. You could store your encryption keys out on the Internet somewhere but that actually increases the attack surface. As such, the encryption keys get stored on the phone itself.

Phone OSes include tools like encrypted storage locations for things like encryption keys but realistically they're no more secure than storing the keys as plaintext in the application's app-specific store (which is encrypted on Android by default; not sure about iOS). Only that app and the OS itself have access to that storage location so it's basically exactly the same as the special "secure" storage features... Except easier to use and less likely to be targeted, exploited, and ultimately compromised because again, it's a smaller attack surface.

If an attacker gets physical access to your device you must assume they'll have access to everything on it unless the data is encrypted and the key for that isn't on the phone itself (e.g. it uses a hash generated from your thumbprint or your PIN). In that case your effective encryption key is your thumb(s) and/or PIN. Because the Signal app's encryption keys are already encrypted on the filesystem.

Going full circle: You can always further encrypt something or add an extra step to accessing encrypted data but that just adds inconvenience and doesn't really buy you any more security (realistically). It's turtles all the way down.

[-] riskable@programming.dev 79 points 2 weeks ago

This achievement belongs to the tail end of GENX... The folks that brought us grunge.

[-] riskable@programming.dev 84 points 2 weeks ago

The base assumption is that you can tell anything reliable at all about a person from their body language, speech patterns, or appearance. So many people think they have an intuition for such things but pretty much every study of such things comes to the same conclusion: You can't.

The reason why it doesn't work is because the world is full of a diverse set of cultures, genetics, and subtle medical conditions. You may be able to attain something like 60% accuracy for certain personality traits from an interview if the person being interviewed was born and raised in the same type of environment/culture (and is the same sex) as you. Anything else is pretty much a guarantee that you're going to get it wrong.

That's why you should only ask interviewees empirical questions that can identify whether or not they have the requisite knowledge to do the job. For example, if you're hiring an electrical engineer ask them how they would lay out a circuit board. Or if hiring a sales person ask them questions about how they would try to sell your specific product. Or if you're hiring a union-busting expert person ask them how they sleep at night.

[-] riskable@programming.dev 75 points 1 month ago

Men shouldn't be allowed near children that aren't their own. It's rarely stated but regularly assumed.

[-] riskable@programming.dev 73 points 1 month ago

Unless it runs Linux it doesn't stand a chance. The moment you decide to sell a handheld gaming console running Windows you doom it to failure. It's the worst OS possible for that purpose.

[-] riskable@programming.dev 101 points 3 months ago

The tower on the left is home to the Tea Wizard who uses parts of the lower floors for the nation's biscuit reserves. The one on the right is host to a princess that's been waiting for rescue by a prince for a very long time now.

[-] riskable@programming.dev 80 points 4 months ago

Docker containers aren't running in a virtual machine. They're running what amounts to a fancy chroot jail... It's just an isolated environment that takes advantage of several kernel security features to make software running inside the environment think everything is normal despite being locked down.

This is a very important distinction because it means that docker containers are very light weight compared to a VM. They use but a fraction of the resources a VM would and can be brought up and down in milliseconds since there's no hardware to emulate.

[-] riskable@programming.dev 98 points 4 months ago* (last edited 4 months ago)

Linux never ran on the Commodore 64 (1984). That was way before Linux was released by Linus Torvalds (1991).

I'd also like to point out that we do all rely on non-proprietary protocols. Examples you used today: TCP and HTTP.

If we didn't have free and open source protocols we'd all still be using Prodigy and AOL. "Smart" devices couldn't talk to each other, and the world of software would be 100-10,000x more expensive and we'd probably have about 1/1,000,000th of what we have available today.

Every little thing we rely on every day from computers to the Internet to cars to planes only works because they're not relying on exclusive, proprietary protocols. Weird shit like HDMI is the exception, not the rule.

History demonstrates that proprietary protocols and connectors like HDMI only stick around as long as they're convenient, easy, and cheap. As soon as they lose one of those properties a competitor will spring up and eventually it will replace the proprietary nonsense. It's only a matter of time. This news about HDMI being rejected is just another shove, moving the world away from that protocol.

There actually is a way for proprietary bullshit to persist even when it's the worst: When it's mandated by government.

[-] riskable@programming.dev 85 points 7 months ago* (last edited 7 months ago)

This article is misleading: The cards are already "AI accelerators" they just come in monstrous sizes and coolers that aren't suitable for cramming more than one into a computer (server) case.

What the Chinese chop shops are doing is removing the components and resoldering them on to smaller PCBs and putting on smaller (but more powerful and jet-engine loud) exhaust-style coolers.

Basically it's just old fashioned harvesting and re-using of PCB components. A common thing during the shortages of the COVID-19 pandemic.

186

Manufacturer wanted $25 (+shipping) for a replacement garage door opener wall switch. 13 minutes of printing + 5 minutes of soldering + two leftover Cherry MX Blue switches (that I'll be use) and the problem is solved ๐Ÿ‘

Note: The wiring was slightly more involved than I thought... needed a resistor for the light (there's only two wires but it's got two functions: Light on/off and garage open/close.

If folks are interested I could make a much fancier PCB-based version with screw terminals and whatnot. It's a very trivial schematic.

269
submitted 11 months ago by riskable@programming.dev to c/linux@lemmy.ml

Happy 30th Birthday "New Technology" File System! Thanks for 30 years of demonstrating Linux superiority with a gap that widens with every new kernel release ๐Ÿ‘

50

As a full time desktop Linux user since 1999 (the actual year of the Linux desktop) I wish all you Windows folks the best of luck on the next clean install ๐Ÿ‘

...and Happy 30th Birthday "New Technology" File System!

456

As a full time desktop Linux user since 1999 (the actual year of the Linux desktop, I swear) I wish all you Windows folks the best of luck on the next clean install ๐Ÿ‘

...and Happy 30th Birthday "New Technology" File System!

[-] riskable@programming.dev 165 points 1 year ago

LGBTQ people and drag queens.

6
submitted 1 year ago by riskable@programming.dev to c/memes@lemmy.ml
111
submitted 1 year ago by riskable@programming.dev to c/memes@lemmy.ml
95
submitted 1 year ago by riskable@programming.dev to c/memes@lemmy.ml
122

I wasn't expecting to be joining a LotR meme community when I started this journey but I must say it does feel like you are my people. Maybe some day we will draw swords together.

287
Reality sets in (programming.dev)
submitted 1 year ago by riskable@programming.dev to c/memes@lemmy.ml
view more: โ€น prev next โ€บ

riskable

joined 1 year ago