[-] DokPsy@infosec.pub 19 points 2 weeks ago

I will accept him in one of two roles: the Schwartz Ghost of Dark Helmet or Crayola Wren, the plucky and colorful yet angsty child of Lone Star and Princess Vespa who idolizes Dark Helmet.

Crayola Wren draws pictures of Dark Helmet in whatever the current equivalent to a Lisa Frank notebook is.

[-] DokPsy@infosec.pub 21 points 5 months ago

Funny enough, it's not the engineers that are doing it. Left to their own devices without ridiculous constraints like "someone else is doing it this way so we need you to do something that sets us apart" or "you can't look at what everyone else is doing", engineers will do it the laziest way they can..... By copying what others are doing and essentially making it standard.

[-] DokPsy@infosec.pub 22 points 6 months ago

That's messed up. Where?

[-] DokPsy@infosec.pub 9 points 7 months ago

I'm not one to actively encourage increases in military spending but if it's to outfit the orcas, I'm all for it

[-] DokPsy@infosec.pub 33 points 7 months ago

The S in IoT stands for security

[-] DokPsy@infosec.pub 12 points 7 months ago

That's what's so sneaky about it. It's genius, honestly

[-] DokPsy@infosec.pub 24 points 7 months ago

It's either a very dedicated imposter or the real deal which would mean Margot Robbie is a giant nerd. I choose the latter option but would not be surprised by the former.

[-] DokPsy@infosec.pub 13 points 8 months ago

I was under the impression the folding technique of Japanese blades was due to the low carbon content and the process of folding included adding carbon to the iron as well as incorporating it throughout the metal.

European iron ore already had larger amounts of carbon which meant the folding and adding carbon process wasn't required to create a serviceable edge.

[-] DokPsy@infosec.pub 15 points 8 months ago

The dead man switch at one of my last places was the companies incompetence and lack of forethought.

When I left, I told them that the files for their system that I designed, built, and maintained was on the laptop I was returning to them.

They wiped it.

They also had zero clue how to use the programs I had nor any other aspect of that system so they really shot themselves in the foot then shot their other one to test of the first one hurt

[-] DokPsy@infosec.pub 14 points 9 months ago

Sometimes it's less about the person that you're targeting and more about what that access gives you.

Low level accountant? Office worker with an excel file full of passwords or has correspondence with your actual target at a different company that you can pose as to gain access into?

They're just a step in the process.

[-] DokPsy@infosec.pub 28 points 9 months ago

I don't mind the tool itself if you use it as such. I do mind when people use its output as the final product. See: the lawyer who used chatgpt for a legal brief

[-] DokPsy@infosec.pub 14 points 9 months ago

During the Klingon civil war, he was temporarily made Captain of the USS Sutherland

This is also where Data shows serious BDE to his racist(?) first officer.

view more: next ›

DokPsy

joined 10 months ago