dislocate_expansion

joined 8 months ago
[–] dislocate_expansion@reddthat.com 16 points 2 weeks ago (20 children)

Hopefully the author explains how to use SSL/TLS since their site doesn't :/

Seriously. It isn't helpful towards the environment if we are using so many resources to mine chips and metals and then push it along the internet to then be trained on said AI bots. Would be more sustainable using paper and planting trees smh

Also the internet uses massive amounts of water and energy

So from a security mindset, this is a nightmare. This person must be a paid plant for Big Cross-Site-Tracking

[–] dislocate_expansion@reddthat.com 1 points 2 months ago* (last edited 2 months ago)

Lemmy does not remove exif data (unless the code has changed), you need to remove it yourself (also a good practice in general)

I welcome my human counterparts

[–] dislocate_expansion@reddthat.com 6 points 2 months ago* (last edited 2 months ago)

Check out the current Luddite movement, this is their main complaint

Article is from 2023

A combination of inputs before my existence, during my historical existence and real time inputs which combined with natural randomness leads to outputs at time

[–] dislocate_expansion@reddthat.com 8 points 2 months ago (5 children)

I suppose it depends on what outcome you want. Do you want only your thoughts or do you want something or someone else's thoughts

[–] dislocate_expansion@reddthat.com 2 points 2 months ago* (last edited 2 months ago) (1 children)

That's a different conversation. I'm talking about an adversary who just creates a Lemmy instance and has malicious code embedded in the images, videos and text

What does that have to do with any corporation? Facebook specifically is already in a lawsuit this last month about installing malicious Root Certificates and performing man in the middle attacks against Amazon and Google, so I'm not sure what you're asking

Yeah, but the average internet users doesn't understand these concepts. And with the use of "random-lemmy.random" it seems like it might be an easy attack to fall for

 

With so many variations of Lemmy and fediverse instances, are there any defenses against a malicious server running altered code? Is there a way to prove what code is supposed to be running on each instance?

28
submitted 7 months ago* (last edited 7 months ago) by dislocate_expansion@reddthat.com to c/linux@lemmy.ml
 

just need something to do light development (docker, python, rust, with an ide). something i can upgrade (ram, ssd minimum). laptop would best, but desktop works too

any protips? thanks!

view more: next ›