ramjambamalam

joined 2 years ago
[–] [email protected] 5 points 1 month ago (1 children)

A highly respected school teacher of mine was known to say, "Say what you mean; mean what you say."

[–] [email protected] 8 points 1 month ago (2 children)

I haven't tried it yet, but I've seen massive lists of trackers floating around that you can add to your torrents, in case the same torrent is indexed on other trackers, but the torrent file you downloaded doesn't know to search them.

[–] [email protected] 3 points 1 month ago (1 children)

It appears on my instance, FWIW.

[–] [email protected] 1 points 2 months ago (1 children)

Serious question: what is a US multinational?

[–] [email protected] 13 points 2 months ago (1 children)

Have you considered joining the reserves? I've been a pacifist my entire life but am wondering about it now.

[–] [email protected] 1 points 2 months ago (2 children)

Devil's advocate: the better question is what percentage of Canadians will eventually max out their TFSA?

I don't think it's a good policy anyway, as the administrative overhead of managing yet another registered investing account (or making TFSA reporting more complicated) is more hassle than it's worth.

[–] [email protected] 6 points 2 months ago* (last edited 2 months ago) (1 children)

Gibby's Electronics Supermarket in St Catharines has more home theater equipment than computer parts, but they have a great selection and you generally won't beat their prices anywhere else, and they ship.

[–] [email protected] 19 points 2 months ago* (last edited 2 months ago)

I can think of easier ways of compromising the data besides brute forcing the keys, off the top of my head, and I'm just some schmuck. Relevant XKCD: https://xkcd.com/538/

  1. Compromise their endpoint with a malicious app on the app store.

  2. Gain physical access to the device and compromise it. Use your imagination – pickpocket, traffic stop or customs inspection by a compromised agent, seduce them with a honeypot, etc.

  3. Socially engineer them to mistakingly add you to their group chats.

  4. SIM swap

Signal might be fine for journalists, criminals, cheating spouses, and general privacy when used properly with good OpSec but nation state adversaries have significantly greater resources than your average attacker, and thus require more significant security.

[–] [email protected] 1 points 2 months ago (1 children)

'cause it's delicious.

[–] [email protected] 4 points 3 months ago

Me too! And the bowl, and the whisk, and ...

[–] [email protected] 4 points 3 months ago

It tastes better to me. 🙃

 

I've timestamped the best part but there are lots of good moments in this video.

view more: next ›