![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
Right, because fuck paying for proper journalism. Everything must be free!
Remind me again, how does that work?
Right, because fuck paying for proper journalism. Everything must be free!
Remind me again, how does that work?
Yeah, go read a book or something.You have no idea what you are talking about.
That’s not an unpopular opinion, it’s an outrageously stupid and uninformed one and you should keep it to yourself.
So?
With Gemini you can let it show you search results for (some) of its statements. It’s useful for cross-checking: I was, for example, researching plastics recycling and there was a claim that seemed untrue and corporate. The automagic search/source function for that statement led me to a blog post of some consortium/lobbying group of manufacturers. After telling that to Gemini it apologized and compiled a list of different view points for that specific statement.
I was pretty impressed with that, and I find it very useful for researching topics I know basically nothing about. Of course it’s not the sole source of truth.
That’s not how this works. Maybe if you get some business consultants, but this ain’t it. Just because you hire them yourself, doesn’t mean that they’ll fall in line with your wishes.
deleted by creator
It’s not as vulnerable but it still is.
Interestingly, Android is the only operating system that fully immunizes VPN apps from the attack because it doesn’t implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks.
You need to check out public key cryptography and digital signatures. Those are the basics of Fido.
When the private key is bound to a device it is not possible to fake or steal it through conventional methods. Passwords are the weakest link and an easy target for attackers - passkeys basically solve that.
User adoption depends on implementation, but everything is easier than remembering a secure password or using a password manager for most people. There needs to be an easy and secure way to distribute passkeys across devices, and any backup mechanisms may be a weak point. In any case: still better than passwords.
I never cared about discord so I don’t know, but I’d assume so, yes.
Oh yeah, the fallacious slippery slope again. How creative and intellectual!
The Windows API is the direct access to OS functions. If you’re using the API it’s your responsibility to do it securely and protect your users.
Because good journalism isn’t free and the expectation that it is leads to societal downfall ;)
Banning software is not the same as banning books, lol. Books are passive ideas, software is active and can be used for espionage. You’re creating a false equivalence here.
If you forget everything else, it’s basically an unencrypted chat where the company behind it can read all your messages.
To force elaboration while staying on point. Details are just as important to writing as conciseness.
I’m convinced a lot of it is astroturfing. It’s just too perfect and consistent, with the perfect answers for everything and just the right amount of fear mongering.
Sure they can, it just isn’t as simple as “just” ;) How do you, for example, determine who picked which item if two people are standing next to each other? Or if something is put back?
Sure, a proof of concept will always work. Building it for the real world is a completely and utterly different beast.
Lemmy’s development is to a large part subsidized by some kind of OSS fund.
Meatbags gonna meatbag.