![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://beehaw.org/pictrs/image/23b10d50-5c1f-45da-be43-07f234fc229b.png)
never been proven
Don’t worry we can check the library of babel for the answer.
I exist or something probably
never been proven
Don’t worry we can check the library of babel for the answer.
Or, it could be the periodicity of the lifecycle of a cool bug they like, or it could be just a random period from any huge number of celestial objects we have yet to categorize. I have a guess for which of these options it is, personally.
they’d all have been working somewhere else
… Somewhere else possibly innovating even moreso than where they are…
Because of the flat and nonprofit nature of Lemmy “users pooling money together” is the platform allocating budget.
I’d argue corporations should strive to represent their employees. Corporations don’t deserve to maintain anything, they aren’t people and have no ethical status either.
Nonetheless you’re working double time to make sure the use of ‘reasonable’ with all its connotations is seen as acceptable here. Making sure everyone knows that you think this is normative.
We will not reach a common ground.
Lets be clear, there’s a difference between “reasonable” and “expected behavior” and it’s an important one.
Social engineering is to gain access circumventing downcode, not really “get a head start”…
Most attacks are entirely social engineering. You’re not breaking into secure databases by pulling ridiculous zero day backdoors when it’s much easier to convince an intern to download a file or give you access directly. These super involved attacks are state actors, and no amount of trying to hide what Linux version is being modified will do anything for you there.
State actors of course also use social engineering
Ultimately the point is hacking really doesn’t involve the kind of subterfuge you’re describing here in a way where " what Linux is it " matters at all. I mean, windows is used for secure systems across the world, it’s hardly secretive.
I don’t think it really matters whether a potential adversary has a ‘head start’ all that much, security through obscurity doesn’t work super well when it’s going to be deployed to thousands of easily accessible devices anyway. It’d only just be a defense in depth, but even then meh. But it’s neither here nor there, they’ll do it whatever way they feel is best.
It won’t be a security risk once it’s in use, IT across Germany will know within days of deployment. It will almost definitely be a modified version of some probably well known Linux.
I mean anything anyone does on the internet is tech given they do it on the internet.
Musk is largely just being a shitty ceo doing ceo things, kinda notably for cultural reasons, sure, but musk news probably better serves as more business news than tech.
This is remarkably aggressive and assumptive. It also addresses none of my beliefs substantively so not much to really chew on there.
You let me know if you ever want to chat about the issue, but right now it looks like you just want to vent. Feel free to do that but I’m not going to just be an object of your anger.
But this is literally people trying to strengthen copyright and its scope. The corporation is, out of pure convenience, using copyright as it exists currently with the current freedoms applied to artists.
In the context of this discussion, switching to trains isn’t really going to address the idea of people raiding the cargo haulers, in whatever shape they’re in.
I don’t think this is likely to happen regardless. Occasionally trucks are raided, though it’s rare in the us. More often in some places where there’s a lot more instability. But I don’t think the reason it’s rare in general is ‘because there’s a human at the wheel’, especially not the concern that they may be armed.
There’s nothing really stopping people from doing that to human driven trucks either. Besides, if it’s ‘capacity to make the choice of running someone over’ you’re after, just have a dude at a control center watching ten different trucks with remote control overrides. Something arguably they would do regardless for many reasons.
Nah plenty of encryption services switched to quantum resistant encryption half a decade ago.
I’ve had a phone with a USBC charger for years. Previous to that it was micro USB. I know several people who have done the same.
Nothing you have described has really ever been an issue for any of us. Your critiques are true, I suppose, but it’s important to think about how often they are practical issues and not just theoretical.
And at that, USBC ports are in general repairable. The only time they aren’t is when they are impossible to gain access to without damaging anything else.
My take away from your comment, personally, is that lightning cables burn out, are more expensive than USBC, are proprietary and not an open standard, but might be easier to clean. Though you can clean USBC ports using a needle, so not even crazy easier, just a bit.
I can understand being hesitant about change, but these feel like exaggerated critiques.
Because why solve trivial coding problem when experimental bad technology that won’t even work after a many fold increase in implementation time do trick?
As we all know, ai are the best and only solution to complex tasks such as rudimentary file management.