

Xcom?
Cmdr: Jenkins shoot that thinman standing in front of you with your shotgun.
Jenkins: I missed the shot.
Cmdr: what? How? You had a 98% chance to hit.


Xcom?
Cmdr: Jenkins shoot that thinman standing in front of you with your shotgun.
Jenkins: I missed the shot.
Cmdr: what? How? You had a 98% chance to hit.


There is absolutely nothing wrong with tor/i2p having their own fediverse. Just it becomes as fresh as dreaddit (pretty sure I spelt that wrong).


Yes, the problem is how does a clearnet instance send you content to your equivalent of an onion address?


the phone works even when it’s turned off
That is completely false, if you power down the phone then the phone is doing nothing as there is no power. If this is a genuine concern of yours mitigate it with a phone that has a removable battery.
records all the time you’re talking, and with neural networks you can find out what you said
Storing the audio is inefficient, if this were true it would likely transcribe the voice call to text. Think of the scale of phone networks how much data that would use.
even if you were ten meters away from the phone and in another room.
10 m away maybe, but not another room unless you are shouting.
the phone can see through objects,
Unless you specifically have a camera with a heat sensor then no. any amount of home insulation will diminish the effectiveness. A phone camera does not see through walls.
We do, its just you you don’t.
[email protected] is that way mate.


We will be starting a new working group to explore the feasibility of commissioning a new tool chain to assist in aligning our supply chain with our social responsibilities while maintaining stakeholder values.
None of those speak to the reliability of iptables. They all sound like skill issues.
In 15 years of network engineering iptables has been the simplest part.
A layered approach with hardware firewalls is valid but when those firewalls get popped, looking at you Cisco, Fortinet, and PA you still want host level restrictions.
Your firewall or switch should never be used as a jump host to servers
iptables and firewalld are not reliable
Can you give examples of that?


Yep, has been for a few weeks.


You are absolutely missing something.
Think about how the foot is positioned in the red shoe. The ankle is that high.


Damn. 9 min after posting and they deleted it.


Inb4 op deletes their account.


From something i read a while ago when you enable passwordless entra resets your password to something that stupidly long I don’t actively make them that long even in my password manager.
I’d never heard of bypassing a corporate phishing test using an email filter.
https://github.com/postmodern/phishing-training-sigs
Add a rule in outlook/thunderbird if any of those are in the email header toss it to a folder specially for phishing emails. Doing it org wide makes no sense as you say but if you know enough about emails to read the email header you likely aren’t the target for the phishing training.
I am well aware of evilnginx :D


We are all running password less with passkeys so our Entra passwords are all 128 length randomised that even we don’t know because why should we?
Corporate phishing tests are a joke, you can bypass them by filtering for Phishme or kb4 in the email header.


Eureka and Warehouse 13.


Those of us running home labs will have a field day upgrading our own servers.


So where is that line?
Winter is setting in and people are getting corny because outside sucks right now.