

Bottom rocker is territory.
Nomads naturally are not claiming anything but MCs will go to war over that bottom rocker as well.
I think the Hells Angels war with the Mongols started over this sort of conflict


Bottom rocker is territory.
Nomads naturally are not claiming anything but MCs will go to war over that bottom rocker as well.
I think the Hells Angels war with the Mongols started over this sort of conflict


Damn, I am sad now… kids don’t get the joy of a properly defaced text book anymore :(


And use proper passwords. IDEALLY just use a password manage… not LastPass… but LastPass is better than nothing


Local models are actually pretty great! They are not great at everything… but for what most people are using LLMs for they do a fine job.

Thats from llama3.1:8b and the answer is decent, it took about 20seconds to generate my answer and used no more power than if I were to play a video game for the same amount of time.
Most of these things are pretty secure out of the box.
Even without fail2ban disabling root login and only allowing SSH key authentication makes those scripts just a waste of time for the attacker. That game is a low effort attempt to just get the low hanging fruit for botnets though.
Yes, My home network setup is a bit complicated but I am using Pfsense so I have things on separate vlans with internal firewall rules to reduce risks.
All traffic in on port 443 is routed from Cloudflare to an NginX reverse proxy which decides how to connect back into my network for things
Years ago I would just run a server on the network with 443, 80 and 22 exposed directly to the world and never had any major issues. (Other than the normal automated attacks trying to gain shell access over SSH)
I got 1gbps internet (symmetrical) and a raspberry pi cluster… running my own Wordpress never made more sense… AND that botch should scale!


https://nintendopowerindex.lulufamilia.com/
It’s not pretty and it’s rife with issues.
BUT this will let you search any game from the first issue to around 1996 and will tell you which issues it appears in


It boots right up. No loading screens!


All I hear is NFTs


Neocities is it’s own vibe all together.
There wasn’t much JS used on Geocities pages typically
That said, Neocities is the shit


I have been on the other side of the equation professionally speaking.
I think we mostly agree.
The auditors were certainly not malicious, they can simply only see what they can observe.
Appealing to authority without explaining the caveats is risky to do and disingenuous to people who need to take security very seriously right now.
A potential vector or matter of concern does not mean there is a compromise. Without evidence of a hack or compromise you just have the idea that something could happen.
The app model in general has meant that we have given up tremendous amounts of privacy and security in general for the sake of connivence.
If I were the developer of this app I would’ve approached things from the inception with the question of “How do I get people to trust me who absolutely should not trust me?”
That said, it is always easier to tear down than it is to build.
If I were an at risk individual I would likely opt to use the app myself assuming I could share general location instead of specific location. In areas like LA there is likely a lot of data flowing in that would not help a malicious actor if the location is not specific.


When you do business with companies in certain industries not only is your software audited but your entire development process, business processes and staff are audited.
It’s not unreasonable to question a closed source application for something like this as one version was audited, but what about the next?
How do we know their dev process hasn’t been compromised? Or the person building app wasn’t compromised? Or that the entire thing was not compromised from the start?
Likewise, an audit without full access to code isn’t useless, but hiding behavior from an audit and for a certain period of time would be straight forward. How do you know there is not a dormant command and control system in the app that will cause it to behave in a malicious manner after a set amount of time or after a specific push notification is received?
I am not saying this is present, just that Audits like this are only able to catch what they can observe and the existence of an audit does not mean to blindly trust something
Having the App be open source would be a big step towards providing the transparency needed to address these concerns users would not have to trust anyone and can confirm the builds on the app stores match what is on their Git.
I am not pointing this out to jump on the “Don’t use this app” bandwagon. I am pointing it out to say that there are reasons to be skeptical of these sorts of things in our current political climate.
Remember Sabu and LulzSec
All a matter of preference.
I would say the most important thing to do is to pick a switch you think would be fun and then just pick the coolest looking keyboard that matches it.
The Keychron keyboards are a great starting point; They are pretty cheap so if you are unsure you won’t be too upset if you want to later try a bigger or smaller layout.
I can’t tell you my favorite layout unfortunately, I like 40%, 60%, full keyboards and even have a Kinesis (It helped me a lot with hand pain when I typed QWERTY. I recommend switching to DVORAK or another layout before spending so much money on a Kinesis these days)


https://en.wikipedia.org/wiki/Commuter_Cars_Tango
Not sure, but this is an example of an incredibly narrow car that had a pretty reasonable top speed
Some of the claims seem… un reasonable but it would have to be relatively stable to hit highway speeds


People who don’t understand and read these articles and think Skynet. People who know their buzz words think AGI
Fortune isn’t exactly renowned for its Technology journalism
Just worth pointing out, changing water source in Flint Michigan and not adding corrosion inhibitors seemed to do an excellent job for a short period.


At least in my state they can only really confirm or deny that you worked for them.
That’s only in an official capacity. People can say whatever they want if it is a backdoor reference.


At this point In N Out is cheaper now.
Modern fridges last less than 7 years.
I like smart devices and IoT but I hate that for normal people this has been diluted down to cameras and screens on everything with no consideration about privacy or boundaries.