Septimaeus

joined 2 years ago
[–] Septimaeus@infosec.pub 5 points 11 hours ago

Yeah I thought the same, since my city did away with the 3-month rule two years ago (there’s still a partner-limit/monogamy requirement last I checked).

Apparently what makes it a “world first” is not that they allow gay donors but that they lifted all sexual activity-based rules (for plasma specifically) which used to reject sex workers, women who slept with bi men recently, and others. The title is just a bit misleading.

[–] Septimaeus@infosec.pub 4 points 1 day ago

Oh yeah, I just finished editing to add that part to be more clear of my opinion on the subject. There will never again be a nuclear “win” in human history, and in truth I wouldn’t even count the first.

[–] Septimaeus@infosec.pub 11 points 1 day ago* (last edited 1 day ago) (2 children)

I believe they are referring to a far blunter instrument of death which would only purvey loss on a scale that is unprecedented and difficult to imagine.

[–] Septimaeus@infosec.pub 3 points 1 day ago

Cruel* people. One is a transient condition. The other, a choice.

Also be sure to stop once they stop, otherwise you become the bully yourself. Don’t ask me how I know.

[–] Septimaeus@infosec.pub 6 points 1 day ago (2 children)

I see. Have you considered moving?

[–] Septimaeus@infosec.pub 8 points 2 days ago (4 children)

Half your comments feature the word “stupid.” Are you OK?

[–] Septimaeus@infosec.pub 13 points 3 days ago (1 children)

I’ve been checking out the localhost tracking vulnerability and there’s something I can’t work out: it’s not even a terribly obscure or convoluted exploit, especially Yandex’s implementation that’s been chugging for more than 8 years over basic HTTP. It’s just a glaring sandboxing workaround that’s been exclusive to this OS for more than a decade.

No matter how many ways I look at it, I haven’t come up with a reasonable explanation for how it was ignored, by demonstrably capable engineers, unless Google itself had use for it in the first place. And that fits a pattern of selective competence in information security that they just can’t seem to quit.

In short it’s the data collection backdoors they leave themselves that defeat the otherwise top-tier security of their consumer offerings, and it’s why I’ll probably never trust anything they’ve touched until I’ve taken it apart and put it back together again.

So no, you probably shouldn’t use it. Trusting the privacy or security claims of any adtech company will always be a mistake.

[–] Septimaeus@infosec.pub 3 points 3 days ago

The turnout Saturday was encouraging, at least, though I haven’t yet seen the over-under on flippable seats that will be up for reelection.

[–] Septimaeus@infosec.pub 1 points 3 days ago

Important caveats:

(1) Measure expectationsTo know oneself is a personal journey one must travel themselves. You can accompany them to a nearby milestone and/or encourage them to find the next, but ultimately you can’t fight their intellectual battles on their behalf. Expecting to will lead only to frustration.

(2) Be forewarnedNote that even in the best case, proceeding will almost certainly alter the dynamics of your relationship, and perhaps end it altogether.

(3) Consider the safest approachIf you’re interested in maintaining the relationship, it would be far better if they were supported in this long journey by a professional (a cognitive behavioral therapist / social worker) rather than a friend/peer. This is especially true for anything so extensive as what you’re describing.

With these caveats carefully considered…I have found that most people are receptive to a method of periodic open-ended questioning, a common technique of active listening.

I don’t mean confrontational interrogation or leading questions (to which there are “correct” answers). I mean precisely the kinds of unassuming questions someone with more developed introspection might ask themselves internally. Questions of clarification or contemplation, for example, and general curiosity regarding others’ motivations, as well as one’s own.

This method, used carefully, seems to work by temporarily donating perspective to someone, via simple demonstration, which aids them in cultivating their own.

Over time, you may find that they begin to anticipate your questions (perhaps with friendly exasperation) which is the first sign that it’s working.

Best of luck.

[–] Septimaeus@infosec.pub 5 points 4 days ago

Oh, and in case you’re looking for recommendations, my current daily driver is Blair’s “Ultra Death.”

To set expectations, Tobasco (a common North American vinegar-based chili sauce) has a heat rating of 7,000 scovilles, whereas Ultra Death generally measures over 1 million.

If you like heat, extracts are a cost-effective step up, since each bottle lasts longer. At first anyway.

[–] Septimaeus@infosec.pub 2 points 4 days ago

IME this sort of error is often related to the aggregation of traffic through a single IP address. (Commonly: VPNs, public WiFi hotspots, large commercial networks, and so forth.)

The safest workaround is to temporarily change your server location (if using a VPN, which is advisable).

Another easy solution is a different connection, such as switching to mobile data (less safe due to ISP fingerprinting).

Also, since this error is often generated by simple time-based access quotas (throttling), you can confirm the root cause by refreshing once the next hour or day ticks over. (If due to throttling, the error will suddenly disappear.)

view more: next ›