• 0 Posts
  • 22 Comments
Joined 2 years ago
cake
Cake day: June 21st, 2023

help-circle
  • I agree mostly but whats really funny about this episode is the meta around it.

    They actually attacked a lot of things in the episode and every joke is actually pretty good

    spoiler

    Cartman’s whole B-Plot is outlining exactly where they are creatively. If it’s not controversial to say mean things, then whats the point of Cartman? Making fun of and pissing off Trump is their best chance at comedy right now.

    Saddam voice is a great attack because they didn’t waste time trying to parody a wannabe middle eastern dictator

    Likewise, because South Park Trump IS just Saddam. It is unlikely he will become a liked character like Mr Garrison’s Trump parody was

    They haven’t used the F slur I think since season 13. They took two slurs that you can see people trying to mainstream again and directed them at Trump specifically numerous times.

    For the record, I credit SouthPark for removing that word from the Zeitgeist for my friends and me. For a couple of months in 2009 thats what we called Harley riders, and then the joke got stale and with that the word just quit being said by us.

    The main punchline of AI Trump naked in the desert is a direct challenge to use the “Take it Down Act”

    I like to think that the episode wasn’t for fans as much as it was for Trump and team

    I think the pay off (whether in real life or in the show itself) will be amusing in the end











  • I have been on the other side of the equation professionally speaking.

    I think we mostly agree.

    The auditors were certainly not malicious, they can simply only see what they can observe.

    Appealing to authority without explaining the caveats is risky to do and disingenuous to people who need to take security very seriously right now.

    A potential vector or matter of concern does not mean there is a compromise. Without evidence of a hack or compromise you just have the idea that something could happen.

    The app model in general has meant that we have given up tremendous amounts of privacy and security in general for the sake of connivence.

    If I were the developer of this app I would’ve approached things from the inception with the question of “How do I get people to trust me who absolutely should not trust me?”

    That said, it is always easier to tear down than it is to build.

    If I were an at risk individual I would likely opt to use the app myself assuming I could share general location instead of specific location. In areas like LA there is likely a lot of data flowing in that would not help a malicious actor if the location is not specific.


  • When you do business with companies in certain industries not only is your software audited but your entire development process, business processes and staff are audited.

    It’s not unreasonable to question a closed source application for something like this as one version was audited, but what about the next?

    How do we know their dev process hasn’t been compromised? Or the person building app wasn’t compromised? Or that the entire thing was not compromised from the start?

    Likewise, an audit without full access to code isn’t useless, but hiding behavior from an audit and for a certain period of time would be straight forward. How do you know there is not a dormant command and control system in the app that will cause it to behave in a malicious manner after a set amount of time or after a specific push notification is received?

    I am not saying this is present, just that Audits like this are only able to catch what they can observe and the existence of an audit does not mean to blindly trust something

    Having the App be open source would be a big step towards providing the transparency needed to address these concerns users would not have to trust anyone and can confirm the builds on the app stores match what is on their Git.

    I am not pointing this out to jump on the “Don’t use this app” bandwagon. I am pointing it out to say that there are reasons to be skeptical of these sorts of things in our current political climate.

    Remember Sabu and LulzSec


  • cubism_pitta@lemmy.worldtoTechnology@lemmy.worldI want to know!
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    13 days ago

    All a matter of preference.

    I would say the most important thing to do is to pick a switch you think would be fun and then just pick the coolest looking keyboard that matches it.

    The Keychron keyboards are a great starting point; They are pretty cheap so if you are unsure you won’t be too upset if you want to later try a bigger or smaller layout.

    I can’t tell you my favorite layout unfortunately, I like 40%, 60%, full keyboards and even have a Kinesis (It helped me a lot with hand pain when I typed QWERTY. I recommend switching to DVORAK or another layout before spending so much money on a Kinesis these days)


  • DON’T IGNORE US MOTHER FUCKER!!

    Courts are slow, but they are just.

    Courts are frustrating. Hang in there, your daughter needs you and the courts will recognize that.

    Your wife didn’t report payments to her own detriment, the courts won’t move swift on that but the records will show you did your part and she did not.

    Courts are a war and not a battle. Don’t surrender due to one dishonorable win to the enemy side.




  • Defcon 25 appears to be the first year of the voting village.

    That said the late 2000s were full of discussion on voting machine security prior to the addition of the voting village. This was all old news by the time voting village was added.

    This documentary explains where security was in 2006

    https://www.imdb.com/title/tt0808532/

    I haven’t watched this in a very long time but the hackers managed to procure source code from a public sever run by the company making the machines (Diebold I think) and faced some legal issues as a result.

    They also illustrated a proof of concept attack where a counting machine was made to miscount votes to favor one person over another.

    For people not in the know its very important to know that it is ILLEGAL for an independent 3rd party to perform penetration tests on voting machines without the manufacturer’s consent and the code that runs these machines is not public in any way that would allow for a proper audit of the systems to ensure that even the manufacturer has not tampered with the machine.