[-] bort@sopuli.xyz 11 points 2 days ago

sorry for the snark, but

big companies are often incompetent and inefficient in a lot of ways

[-] bort@sopuli.xyz 16 points 6 days ago

iirc his VP want to summon jesus via armageddon

[-] bort@sopuli.xyz 10 points 6 days ago

ich hab ein paar mal versucht instagram zu benutzen, weil da coole leute unterwegs sind, die ich auf reisen oder cons getroffen habe ,aber jedes mal hat die app mir haufenweise schrott vorgeschlagen, der mich nicht interessiert, und wenn dann doch mal was interessantes kam, war es zu schnell weg, oder ich ich habe versehentlich weitergeklickt und bin nicht wieder zurückgekommen, oder ich könnte es nirgends abspeichern, oder es war am ende nur clickbait.

keine ahnung. bin vielleicht zu alt für sowas. und vielleicht ist das auch gut so.

[-] bort@sopuli.xyz 116 points 4 months ago

Here are the steps:

  • The attacker creates a standard Git repository.
  • They commit a single symbolic link pointing to a sensitive target.
  • Using the PutContents API, they write data to the symlink. The system follows the link and overwrites the target file outside the repository.
  • By overwriting .git/config (specifically the sshCommand), the attacker can force the system to execute arbitrary commands--

amazing.

13
submitted 8 months ago by bort@sopuli.xyz to c/animemes@ani.social
[-] bort@sopuli.xyz 69 points 2 years ago

. But it is trained well enough to correlate left and right together

eliza could do that 60 years ago

425
165
[-] bort@sopuli.xyz 94 points 2 years ago

Our societies have not previously tolerated spaces that are beyond the reach of law enforcement, where criminals can communicate safely and child abuse can flourish.

I am pretty sure, churches were "tolerated spaces" bevor e2ee was a thing.

[-] bort@sopuli.xyz 54 points 2 years ago

its zero-trust architecture is programmed in a memory-safe language with no supply chain to monitor!

this is good.

[-] bort@sopuli.xyz 99 points 2 years ago
  1. Users are finally figuring out that some Linux distros are easy to use

so recommending arch linux to newbies was counter productive all along?

suprised_pikachu.bmp

[-] bort@sopuli.xyz 68 points 2 years ago

As usual, the US is already one step ahead: they cut out the middleman by skiping a step.

[-] bort@sopuli.xyz 94 points 2 years ago

the linux-file-deletion is used as a example for good software design. It has a very simple interface with little room for error while doing exactly what the caller intended.

In John Ousterhout's "software design philosophy" a chapter is called "define errors out of existence". In windows "delete" is defined as "the file is gone from the HDD". So it must wait for all processes to release that file. In Linux "unlink" is defined as "the file can't be accessed anymore". So the file is gone from the filesystem immediately and existing file-handles from other processes will life on.

The trade-off here is: "more errors for the caller of delete" vs "more errors due to filehandles to dead files". And as it turns out, the former creates issues for both developers and for users, while the later creates virtually no errors in practice.

[-] bort@sopuli.xyz 112 points 2 years ago* (last edited 2 years ago)

Latex: Problem --> \def\please@#1#2#3#4{\e@kill#2#3{\me#1}#4@now} -->

view more: next ›

bort

joined 2 years ago