SpacePirate

@SpacePirate@lemmy.ml
0 Post – 82 Comments
Joined 1 years ago

TL;DR: Cofounder of open source project says super popular platform using their project needs to pay up for inane reasons. Chaos ensues.

In summary:

WP Engine is one of the most popular third party platforms built on top of WordPress.

They have a link and images on their webpage referencing that they are built on top of Wordpress (this is legal).

The former cofounder of Wordpress said that they are illegally using the Wordpress trademark.

WP Engine sends Cease and Desist.

WordPress Cofounder doubles down, blocks WP Engine and demanded WP Engine pay licensing fees for using their branding.

This pissed off a lot of people.

WP Engine sues. For a lot, including extortion, abuse of power, and asserts the cofounder of WordPress has criminally made false statements to the IRS.

The Executive Director for Wordpress resigns, presumably in solidarity with WP Engine and the community.

3 more...

We need to have capitalism. We need to have economic freedom.

Freedom to do what, Nikki?

freedom to do or be anything they want to be without government getting in the way.”

Freedom to exploit anything for profit, got it.

So if it’s not illegal, it’s fair game. And guess what wasn’t illegal until the Thirteenth Amendment? And guess what we had to do in order to pass that amendment?

Fight a civil war, right.

12 more...

It hasn’t even been in existence for 15 years, literally any adult with an income can imagine what life without Airbnb is like.

3 more...

I can understand Teams in Office, particularly O365 for organizations… what I don’t get is Teams being mandatory in Windows 11…

30 more...

Why would you send authentication to a known good identity while on TOR? This literally defeats the purpose of anonymity.

4 more...

The best description I have seen for single store franchisees is, you’ve paid a lot to give yourself a job. They are not lucrative, and in fact, are capital intensive, and often predatory.

There is a very high up front cost, and you generally do not own the real estate. This means you are locked into 30 year leases, often with complicated terms that are solely beneficial to the land owner.

Next, with regards to liquidity, if you don’t own the real estate, you often can’t get multiple business loans with a single franchise, so you must secure the loan with your personal assets, which means you will go personally bankrupt if you hit a rough patch.

Then, after dealing with the complicated business to business transactions and legal work, you still have to deal with the corporate bullshit, taxes, and supervisory duties, particularly if you do not already have a strong business partner to do this for you.

Pretty much, unless you are independently wealthy, own the real estate in a high traffic location, or already have multiple other franchises, it’s a losing venture that will kill your soul and eat every dollar you have.

8 more...

Only issue with the technology is that the waves were not dynamic; they were deterministic/the same every race.

5 more...

Release date, 06/30/2024. Cease and desist date, 01/01/2024.

3 more...

It’s not like these billionaires are spending this money, so it’s just been invested for 7 years. What’s the old adage, Rule of 72? Given a 10% rate of return, they would be expected to double their money in…

…seven years.

While the tax policies certainly aren’t helping the majority of the population, let’s not pretend compound interest isn’t a thing.

7 more...

But don’t worry, the judge hearing the appeal also has close personal ties to the Romanian Olympic program (whose athlete came in fourth, and stands to benefit from the committee not hearing the appeal), which were disclosed to everyone except the Americans. Nothing weird about that.

2 more...

From my understanding, the impetus was that F5 submitted a CVE for a vulnerability, for an optional, “beta” feature that can be enabled. Dounin did not think a CVE should be submitted, since he did not considered it to be “production” feature.

That said, the vulnerability is in shipping code, regardless of whether it is optional or not, so per industry coding practices, it should either be patched or removed entirely in order to resolve the issue.

21 more...

Saying “Integrates with OpenAI” in 2023 is exactly equivalent to saying “uses Web 2.0” from 20 years ago. Buzzword trash that says absolutely about how the product uses said technology.

Could you? Yes. But there really is no point— biometrics alone are only a single factor for authentication.

You should have at least two of the three— something you are (fingerprint, facial, or retinal recognition), something you have (badge, token, secure device), and something you know (passphrase).

7 more...

Fetterman shows the integrity of John Fetterman; the democratic leadership in the Senate was more concerned with dress codes. Why does the rest of party get to claim benefit from his actions?

1 more...

In any sane world, a member of congress would be immediately expelled for presenting literal nudes, without permission and in bad faith, of a sitting POTUS' family member, who is not, nor has ever been a member of the administration or government employee. of anyone.

FTFY

According to the Bureau Of Labor Statistics, the median salary for airline captains, first-officers, second-officers, and flight engineers in the United States is $203,010 as of 2021.

The big problem is actually in certifying people qualified to take those jobs, which takes additional time and money, mostly to pay for flight time for training. It can take a few grand for just a personal pilot license, but to fly an airline, you need instrument, commercial, and Airline Transport Pilot License (ATPL) certifications, plus increasingly expensive type ratings for the various aircraft you will be flying, a minimum of 1500 hours of flight time, and multiple years at the bottom working your way through smaller regional airlines and courier services.

You can get through the commercial licensing in 12-18 months and about $40k in flight time and insurance, but that is barely enough to get your foot in the door making $50k a year, and even then, you’re still not allowed to fly parcels or passengers for money. Getting those licenses will take another 18 months and another $40-80k, again, mostly in flight time.

That said, once you have ATPL, the company will start paying for your flight time, and you will be earning a 6 figure salary. After 5 years or so and about $100k investing in your training, you should be making over $200k, and can begin to recoup those costs.

2 more...

Yeah, no shit, you’re the fucking CEO

Sales slowing is only one variable in the “growth” equation. Specifically, are sales of gas vehicles slowing more than sales of electric cars? Yes.

People are replacing vehicles at some standard rate, but growth of EVs is dependent on what percentage of new vehicle sales are gas versus electric. As long as people aren’t moving back to gas cars en masse, the growth of the segment can continue to rise, even if sales overall are slowing.

3 more...

Most phones are locked with a four digit numerical PIN. The current technique is taking an image of the flash memory, and reflashing the memory after every few attempts.

It still takes a bit longer than straight brute force without a temporal lockout, but it’s still pretty trivial.

6 more...

So to correct one thing:

Poor posture is a symptom of poor core strength, particularly, your rhomboids and lower back. If your muscles are both stronger and more flexible, they will literally pull your bones into the correct alignment, without any conscious thought towards sitting straighter.

Start by taking a short walk once a day (free). A 100 day pushup challenge (free) or starting Yoga classes (can be free on YouTube, but in-person has several benefits, including having someone correcting your form, and some social structures to help provide extra motivation) would be a great next step. Longer term, maybe light weights and rows alongside using a treadmill or stationary bike.

If you choose to look into weight training, “Starting strength” is a decent program by Mark Rippetoe that I would recommend.

6 more...

Keep in mind that in real life, there are two types of energy radiation, reflection and emission.

First, photos are static records of light at a point in time, and don’t naturally emit light as radiation (in significant enough quantities for consideration). As such, they are only reflective, which is dependent on the light that is already in your environment (e.g., the LEDs in your home are missing huge bands of the spectrum), and as such, these wavelengths may not exist to be reflected by the photo.

Secondly, photos are generated by either film, or based on a cmos/ccd sensor, which are calibrated to capture a subset of em radiation in the human visible spectrum. As such, they have filtered the light that may be usable to other organisms.

So based on both of these, depending on similarity to human eyes, no, most animals (non mammals, in particular) would not see photos in the same way as real life.

It does when you have physical access to the RAM and storage, and a disassembly lab expressly configured for this purpose.

This is the backbone for a number of forensic services offered to law enforcement, and an entire cottage industry. I know with certainty it was still feasible as of the iPhone 12, which is well inside of 15 years. I don’t believe the architecture in the 13 or 14 has changed significantly to make this impossible.

With slightly earlier phones, tethered jailbreaks are often good enough, though law enforcement would more likely outsource to a firm leveraging Cellebrite or Axiom as the first step.

3 more...

What is your degree program? Or, what is your career path?

In general, when people say “Cisco” certs, they almost always mean CCNA, which is the associate level Cisco certification, and gives foundational network knowledge that is highly valuable and transferable to other IT and cyber fields.

Cisco CBROPS probably won’t get you in the door at a SOC without other work experience or certifications, unless the place is super aggressive about churning through SOC I analysts.

You can always reflash it with your own if you hold that concern.

2 more...

Actively encouraging people to toss perfectly good hardware to fuel their subscription bullshit… and these guys weren’t even recently bought by a VC firm or anything?

Tens of thousands of children, killed or injured. And people wonder how the Palestinians become radicalized against Israel, the West, and the United States, or why there can’t be peace in the Middle East?

Forgiveness is probably the furthest thing from being on their minds.

  1. From the title of your article and your executive summary, the premise of your paper is that CVSS is flawed, and CITE is your solution.
  2. From the title of your article, and choice of name, “QHE CVSS Alternative; CITE”. CVSS is a VULNERABILITY Scoring System. CITE, as your propose, is a THREAT evaluation tool. You can see how one could have the impression that they were incorrectly being used interchangeably.

As you yourself stated, CVSS does exactly what it says on the box. It provides a singular rating for a software vulnerability, in a vacuum. It does not prescribe to do anything more, and it does a good job doing what it sets out to do (including specifically as an input to other quantitative risk calculations).

Compare what with attack?

Your methodology heavily relies on “the analysis of cybersecurity experts”, and in particular, frequently references “exploit chains”, mappings which are not clearly defined, and appears to rely on the knowledge of the individual practitioner, rather than existing open frameworks. MITRE ATT&CK and CAPEC already provide such a mapping, as well as a list of threat actor groups leveraging tactics, techniques, and procedures (e.g., exploitation of a given CVE). Here’s a good articlewhich maps similarly to how we operate our cybersecurity program.

I think there is a lot on the mark in your article about the issues with cybersecurity today, but again, I believe that your premise that CVSS needs replacing is flawed, and I don’t think you provided a compelling case to demonstrate how/why it is flawed. If anything, I think you would agree that if organizations are exclusively using CVSS scores to prioritize remediation, they’re doing it wrong, and fighting an impossible battle. But this means the organization’s approach is wrong, not CVSS itself.

Your article stands better alone as a proposal for a methodology for quantifying risk and threat to an organization (or society?), rather than as a takedown of CVSS.

Glancing through your article, while you have correctly assessed the need for risk based prioritization of vulnerability remediation and mitigation, your central premise is flawed.

Vulnerability is not threat— CVSS is a scoring system for individual vulnerabilities, not exploit chains. For that, you’ll want to compare with ATT&CK or the legacy cyber kill chain.

2 more...

That’s a gauss gun, not a railgun. Still cool, though.

4 more...

To be pedantic, they have a navy, just no large ships in said navy.

While I appreciate this, there were far too many questions, which were pretty technical for a layperson. And even after picking the most basic options, I was still presented with like six variants of Ubuntu, including Mint and Elementary.

How about something like:

  • Do you use your computer more for games, or for work?
  • How much do you care about open source?
  • Do you know what a makefile is?
2 more...

Either they’re scared of competing with new intel NUC SOCs built on their 18A process, or this confirms their buyout of Intel is happening, and they’re preparing to exit from the laptop/SFF space.

3 more...

This is what they are banking on.

You overestimate the worth of your inconvenience.

The generalized approach in industry is to use API calls, and create classes to structure the data you receive as JSON or XML. At that point, it is entirely up to you how to format and display the data from your classes. Take a look at some of the Lemmy client code like Mlem, Memmy, or Voyager as examples. Though they have gotten more complicated, they all follow this client-server model for front end development.

However, due to recent shenanigans around API and RSS by companies, mostly those looking to prevent AI companies from using their data for free, the alternative, much worse method is to take the HTML output from a standard web request, and try to reverse engineer the page information into a class structure. This sucks, breaks frequently, and requires you to code around ads and other junk on pages in order to get at the content.

That ”sparkling water” is still carbonic acid.

Just drink water.

MMORPGs are an easy example, where people form recognizable identities and communities in game. An extension of this would be Second Life, and somewhat more recently, VRChat.

This seems like the best possible use case, presuming both the actor’s estate and the new voice actor will get paid. You have the benefit of a human actor driving the cadence and emotion, then overlay with the transformation so unknowing players aren’t taken out of immersion by a sudden switch in a character’s tone and demeanor.

They stay on the street in front of your building

You mean like every other municipality in the United States?

9 more...

Even as a power user… You can’t.

And, in the 21st century, nothing on your computer is safe and private, least of all, browser extensions.

Even if an extension is safe today, with a tiny handful of notable exceptions, it will be”monetized”, or bought and sold to someone that will use it to install adware on your system, train their AI model, or steal your personal information.

There is no feasible defense to this for a layperson, other than absolute transparency in FOSS, and even that is under attack via flaws in the software supply chain.

The best a layperson can hope for is that major vendors care more about exclusivity and locking others out of their ecosystem, such that they are the only ones who have full control of your data (Apple, Google, Microsoft).