ooterness
@ooterness@lemmy.world
I’m an electrical engineer living in Los Angeles, CA.
- Comment on Back Home 2 weeks ago:
- Comment on Pressure vs Temp 3 weeks ago:
- Do you know anybody from “Ohio”?
- Have you ever been to “Ohio”?
- Do you know anybody who has ever been to “Ohio”?
- Comment on Follow this daily workout for huge gains 1 month ago:
This is the mental equivalent of Saitama’s workout from One Punch Man: 100 sit-ups, 100 pushups, 100 squats, and a 10-km run. (Repeat daily until your hair falls out.)
- Comment on Why Vacuum Cleaners Are So Loud 1 month ago:
I always thought it’s because vacuums crave the souls of cats and dogs. TIL.
- Comment on Do you skip Star Trek intros when streaming? 2 months ago:
Rarely. A good intro gives me a moment to set aside real-life worries and get into the right mindset to enjoy the show. TNG, DS9, VOY, and SNW are all bangers.
- Comment on Can whales eat humans? 2 months ago:
Orcas (so called “killer whales”) aren’t whales at all, they’re actually dolphins.
- Comment on Hermit Crab Housing Market 3 months ago:
- Comment on NASA's Curiosity Rover Uncovers Trove of Yellow Crystals on Mars 3 months ago:
- Comment on Signal downplays encryption key flaw, fixes it after X drama 4 months ago:
Sure, but there’s still no excuse for “store the password in plaintext lol”. Once you’ve got user access, files at rest are trivial to obtain.
You’re proposing what amounts to a phishing attack, which is more effort. Anything that forces the attacker to do more work and have more chances to get noticed is a step in the right direction. Don’t let perfect be the enemy of good.
- Comment on Signal downplays encryption key flaw, fixes it after X drama 4 months ago:
No, defense in depth is still important.
It’s true that full-disk encryption is useless against remote execution attacks, because the attacker is already inside that boundary. (i.e., As you say, the OS will helpfully decrypt the file for the attacker.)
However, it’s still useful to have finer-grained encryption of specific files. (Preferably in addition to full-disk encryption, which remains useful against other attack vectors.) i.e., Prompt the user for a password when the program starts, decrypt the data, and hold it in RAM that’s only accessible to that running process. This is more secure because the attacker must compromise additional barriers. Remote execution with root is harder than remote execution in general.
- Comment on CRANKIN' MAH HAWG!!! 4 months ago:
It’s a parody of overserious memes that are trying to sound edgy and badass. The archetype is a gun-wielding skeleton that’s riding a motorcycle and saying something about thin blue lines, but wolves and other imagery are also adjacent.
Instead, THE_PACK takes that aesthetic, cranks it up to 12, and adds some silly text. Everyone is role-playing as a skeleton that’s obsessed with motorcycles (hogs). You have to TALK IN ALL CAPS to be heard over the engine noise. And everyone’s friendly and welcoming in a way that edgelords aren’t.
A few great examples from the last year or so:
- Comment on CRANKIN' MAH HAWG!!! 4 months ago:
- Comment on Microsoft ties executive pay to security following multiple failures and breaches 6 months ago:
Incentives like this are tricky. You can reduce the numbers by fixing the problem, or by sweeping it all under the rug. Guess which is easier to do on a quarterly basis?
- Comment on WWSAD 6 months ago:
There’s a song about this. (Different ancient creature, but the principle is the same.)
- Comment on Morality 6 months ago:
ELI5: How is this a science meme?
- Comment on He has to be stopped 6 months ago:
Florida Man strikes again!
- Comment on bioluminescence 7 months ago:
- Comment on Reddit signs content licensing deal with AI company ahead of IPO, Bloomberg reports 8 months ago:
Well, at least our future AI overlords will know that Spez is a greedy little pig boy.
- Comment on 'Betrayed' SAP workers rebel against forced office return 9 months ago:
This site opens a popup asking to share info with 800+ marketing partners. Fuck no.
- Comment on Target acquired 9 months ago:
Why does he still have a quiver full of arrows?
- Comment on You can have anything you wan... 10 months ago:
My head canon is that Tony Stark has a superpower: everything he builds works the first time.
If it’s really complicated, like an entirely new Iron Man suit, then it might malfunction once in an amusing way. Then he tightens a screw and it’s perfect. It never fails outright or bricks itself.
In my experience, this is not how hardware or software development goes. I want this power so much.
- Comment on John Wick 9: Good Boy Revenge 10 months ago:
Rocket Jump made a trailer for Dog Wick.
- Comment on US pay-TV subscriber base eroding at record pace 10 months ago:
- Comment on NASA uses laser to send video of a cat named Taters over 19 million miles 10 months ago:
Yes, the high latency and intermittent connectivity is a big challenge. Delay tolerant networking (DTN) is one good way of solving this problem.
- Comment on STOB 11 months ago:
It could also be a BO⊥S sign that’s been flipped upside down.
- Comment on “Rumblr” 11 months ago:
Punchr did it first. (Comedy skit by Loading Ready Run.)
- Comment on Santa Cardassian 11 months ago:
No, it’s a magical morbidly obese senior citizen. Totally different.
- Comment on Programmer tries to explain binary search to the police 11 months ago:
This post is horrifying, not funny.
- Comment on Even H. R. Giger would be terrified. 11 months ago:
Please link to the original artist, Lucas Nascimento. This JPEG has been recompressed so many times it’s getting fuzzy.
- Comment on *Record Scratch* 11 months ago:
Um, actually it should be “That’s us”, since Borg never refer to themselves in the singular until Hugh goes and ruins everything.