0x0

joined 2 years ago
[–] 0x0@programming.dev 2 points 1 month ago

I use Tor to get magnet links and feed them to my clearnet torrenting client, no issues so far and the ISP would have to breach my privacy to provide my IP.

[–] 0x0@programming.dev 44 points 1 month ago (5 children)

They call it “click fraud”,

No, click fraud is using botnets to click ads in your site to increase your revenue.

[–] 0x0@programming.dev 4 points 1 month ago (1 children)

This video proposes that theory.

[–] 0x0@programming.dev 51 points 1 month ago* (last edited 1 month ago) (9 children)

This is news? Fortnine talked about it two years ago.
TL;DR Tesla removed LIDAR to save a buck and the cameras see two red dots that the 'puter thinks it's a far away car at night when indeed it's a close motorcycle.

[–] 0x0@programming.dev 3 points 1 month ago (9 children)

As long as they're hired for their skills and not to tick a checkbox i don't care.

[–] 0x0@programming.dev 6 points 1 month ago

Hosting for yourself so you can access your content outside your home is usually the use-case, use WireGuard for that though (checkout headscale) along with virtualization, VLANs, etc.
Hosting for a group of friends and/or family can usually be ok, assuming that is a well known and restrict group.

Hosting for the general public from home is usually not recommended, use a VPS for that. Bear in mind you'll likely be liable for what you host, one way or the other, depending on your jurisdiction.
If you store content (files others may upload like movies and photos) you may be responsible for that (i.e. is that content legal in your jurisdiction?).
There may be a legal distinction between the server's geographic location and the entity responsible for it - but in your case it's the same, so, again, beware.
Just linking to content deemed illegal may get you into trouble.
Putting the site behind a login-only page and vetting account creation could mitigate (or exponentiate) this.
Anyway IANAL.

What do you want to host and for whom?

[–] 0x0@programming.dev 1 points 1 month ago (1 children)

Only 1 GiB of RAM? Moooom!
Shut up Johnny, Voyager's still out there with way less.

[–] 0x0@programming.dev 2 points 1 month ago

you no longer have a moral obligation to transition anything over to your coworkers.

My coworkers didn't let me go, my boss did. If i knew a shit coworker of mine would inherit the project then sure, otherwise i don't see the point of burning bridges.

[–] 0x0@programming.dev 4 points 1 month ago (1 children)

the public has a right to know who a plane belongs to.

Why? This "right to know" is pitchfork mentality, really. If something happens the authorities can handle it and only they should have that kind of access, not John Doe. Not all who own planes are millionaires (those probably do register to an LLC).

 

Yet another case of just because you can...

 

cross-posted from: https://programming.dev/post/22983650

I know that Android 14 requires targetSdkVersion >= 23 (or higher on the Play Store), but are there other minimums for this and minSdkVersion?

 

I know that Android 14 requires targetSdkVersion >= 23 (or higher on the Play Store), but are there other minimums for this and minSdkVersion?

 

The Missing Nukes/Dirty Bomb Sweep Theory
The PSY-OP/Government Conspiracy Theory
The ET Theory
The Mass Hysteria Theory
The Copycats/Hoaxers Theory
The Iranian Mothership/Foreign Spy Theory
The Angels Theory

 

I like the clarification:

Let me also touch this subject while talking security problems. This bug, the oldest so far in curl history, was a plain logic error and would not have been avoided had we used another language than C.

Otherwise, about 40% of all security problems in curl can be blamed on us using C instead of a memory-safe language. 50% of the high/critical severity ones.

Almost all of those C mistakes were done before there even existed a viable alternative language – if that even exists now.

 

...claro q já retiraram os bancos...

 

A Agência para a Modernização Administrativa I.P. (AMA) irá promover, no próximo dia 27 de novembro, às 16h00, o webinar "Os Dados Abertos Como Catalisador para a Inteligência Territorial".

 

Apple has become aware of a security flaw that could let hackers take control of a user’s iPhone or iPad if they visit a harmful website.

Maybe i'm reading this wrong but it doesn't seem to be cryptocurrency-specific:

Jeremiah O’Connor, CTO and co-founder of crypto cybersecurity firm Trugard, told Decrypt that “attackers could access sensitive data like private keys or passwords” stored in their browser, enabling crypto theft if the user’s device remained unpatched.

 

Mirror is an entirely new concept in programming — just supply function signatures and some input-output examples, and AI does the rest.

 

Exactly eighteen years ago today, on October 30 2006, we shipped curl 7.16.0 that among a whole slew of new features and set of bugfixes bumped the libcurl SONAME number from 3 to 4.

 

The German police have successfully deanonymized at least four Tor users. It appears they watch known Tor relays and known suspects, and use timing analysis to figure out who is using what relay.
Tor has written about this.
Hacker News thread.

view more: ‹ prev next ›