ramjambamalam

joined 2 years ago
[–] ramjambamalam@lemmy.ca 5 points 3 weeks ago (1 children)

A highly respected school teacher of mine was known to say, "Say what you mean; mean what you say."

[–] ramjambamalam@lemmy.ca 8 points 1 month ago (2 children)

I haven't tried it yet, but I've seen massive lists of trackers floating around that you can add to your torrents, in case the same torrent is indexed on other trackers, but the torrent file you downloaded doesn't know to search them.

[–] ramjambamalam@lemmy.ca 3 points 1 month ago (1 children)

It appears on my instance, FWIW.

[–] ramjambamalam@lemmy.ca 1 points 1 month ago (1 children)

Serious question: what is a US multinational?

[–] ramjambamalam@lemmy.ca 12 points 2 months ago (1 children)

Have you considered joining the reserves? I've been a pacifist my entire life but am wondering about it now.

[–] ramjambamalam@lemmy.ca 1 points 2 months ago (2 children)

Devil's advocate: the better question is what percentage of Canadians will eventually max out their TFSA?

I don't think it's a good policy anyway, as the administrative overhead of managing yet another registered investing account (or making TFSA reporting more complicated) is more hassle than it's worth.

[–] ramjambamalam@lemmy.ca 6 points 2 months ago* (last edited 2 months ago) (1 children)

Gibby's Electronics Supermarket in St Catharines has more home theater equipment than computer parts, but they have a great selection and you generally won't beat their prices anywhere else, and they ship.

[–] ramjambamalam@lemmy.ca 17 points 2 months ago* (last edited 2 months ago)

I can think of easier ways of compromising the data besides brute forcing the keys, off the top of my head, and I'm just some schmuck. Relevant XKCD: https://xkcd.com/538/

  1. Compromise their endpoint with a malicious app on the app store.

  2. Gain physical access to the device and compromise it. Use your imagination – pickpocket, traffic stop or customs inspection by a compromised agent, seduce them with a honeypot, etc.

  3. Socially engineer them to mistakingly add you to their group chats.

  4. SIM swap

Signal might be fine for journalists, criminals, cheating spouses, and general privacy when used properly with good OpSec but nation state adversaries have significantly greater resources than your average attacker, and thus require more significant security.

[–] ramjambamalam@lemmy.ca 7 points 2 months ago* (last edited 2 months ago)
[–] ramjambamalam@lemmy.ca 1 points 2 months ago (1 children)

'cause it's delicious.

[–] ramjambamalam@lemmy.ca 4 points 2 months ago

Me too! And the bowl, and the whisk, and ...

view more: next ›