[-] 0x0@programming.dev 10 points 6 hours ago

This is called manufacturing consent.

Lives on my shelf.

[-] 0x0@programming.dev 3 points 6 hours ago

That new passport of yours most likely has a chip in it already so you can just swipe it a a border on one of those big machines with cameras... most new passports do... yay.

[-] 0x0@programming.dev 6 points 7 hours ago

You should consider your threat model first before using something without being unsure of the benefits.

[-] 0x0@programming.dev 2 points 10 hours ago

Well, i mean, the logo has a rodent in it, so... mammal? But i was asking about the term.

[-] 0x0@programming.dev 2 points 14 hours ago

What constitutes a "rice"?

[-] 0x0@programming.dev 10 points 15 hours ago

Other ROMs like Lineage.

[-] 0x0@programming.dev 4 points 1 day ago

Ah yes, my daily driv... prayer.

[-] 0x0@programming.dev 6 points 4 days ago

Goku fusion!

[-] 0x0@programming.dev 1 points 4 days ago

Companies just say they are headquartered in Dublin with a token officw

That's incorrect, they have offices and staff there. Maybe not as much as in the US, sure, obviously, but there's staff and not token.

[-] 0x0@programming.dev 3 points 4 days ago

Liking the work you do? Are you deranged?! What's next, fair compensation?!

[-] 0x0@programming.dev 6 points 4 days ago

For context, I’m not convinced any living person has read the entirety of Google’s privacy policies.

Their own lawyers, maybe.

[-] 0x0@programming.dev 12 points 4 days ago* (last edited 4 days ago)

The results of this research have been applied to SQLite already and were released in v3.38.0.

tl;dr: Bloom filters were great because: minimal memory overhead, goes well with SQLite’s simple implementation, and worked within existing query engine.

188

Yet another case of just because you can...

11
submitted 1 week ago* (last edited 1 week ago) by 0x0@programming.dev to c/technology@lemmy.world

The Missing Nukes/Dirty Bomb Sweep Theory
The PSY-OP/Government Conspiracy Theory
The ET Theory
The Mass Hysteria Theory
The Copycats/Hoaxers Theory
The Iranian Mothership/Foreign Spy Theory
The Angels Theory

170

I like the clarification:

Let me also touch this subject while talking security problems. This bug, the oldest so far in curl history, was a plain logic error and would not have been avoided had we used another language than C.

Otherwise, about 40% of all security problems in curl can be blamed on us using C instead of a memory-safe language. 50% of the high/critical severity ones.

Almost all of those C mistakes were done before there even existed a viable alternative language – if that even exists now.

22

Apple has become aware of a security flaw that could let hackers take control of a user’s iPhone or iPad if they visit a harmful website.

Maybe i'm reading this wrong but it doesn't seem to be cryptocurrency-specific:

Jeremiah O’Connor, CTO and co-founder of crypto cybersecurity firm Trugard, told Decrypt that “attackers could access sensitive data like private keys or passwords” stored in their browser, enabling crypto theft if the user’s device remained unpatched.

-20

Mirror is an entirely new concept in programming — just supply function signatures and some input-output examples, and AI does the rest.

79

Exactly eighteen years ago today, on October 30 2006, we shipped curl 7.16.0 that among a whole slew of new features and set of bugfixes bumped the libcurl SONAME number from 3 to 4.

59
submitted 1 month ago by 0x0@programming.dev to c/privacy@lemmy.ml

The German police have successfully deanonymized at least four Tor users. It appears they watch known Tor relays and known suspects, and use timing analysis to figure out who is using what relay.
Tor has written about this.
Hacker News thread.

67
78
submitted 2 months ago by 0x0@programming.dev to c/technology@lemmy.world
113
submitted 2 months ago by 0x0@programming.dev to c/technology@lemmy.world
8

So they were from Sudan...

316
submitted 2 months ago by 0x0@programming.dev to c/technology@lemmy.world
view more: next ›

0x0

joined 2 years ago