[-] dannym@lemmy.escapebigtech.info 18 points 5 months ago* (last edited 5 months ago)

Actually other search engines do much better with Lemmy. Kagi's search works wonders if you select the filter for Fediverse Forums. And you can assign that filter to a bang, such as !lemmy, so that when you search "!lemmy query here" it'll search only on the fediverse A few examples:

[-] dannym@lemmy.escapebigtech.info 16 points 5 months ago* (last edited 5 months ago)

And this ladies and gentlemen is another reason why we should try to escape big tech's grasp.

[-] dannym@lemmy.escapebigtech.info 20 points 6 months ago* (last edited 6 months ago)

The specs are literally the reason why people would buy this. It's basically the best device we have available that can be used as a base for devices handling secure computation, or software handling secure computation. Think of a FIDO2 key, or a gpg smartcard, all secure and verifiable

[-] dannym@lemmy.escapebigtech.info 25 points 6 months ago

The kid was an idiot and a dickhead. He extorted companies and sim swapped people for his private gain, and was stupid enough to continue his hacking spree while he was on bail for another hack.

Yeah I don't think anyone here disagrees with that; his actions are objectively wrong and as I said, he definitely needs to learn morals and ethics.

Samsung Dex over Miracast (which the news liked to present as some kind of amazing hacking feat)

I mean, duh, the media can't tell the difference between a computer and a toaster, but that's besides the point

He’s violent, damaging property and injuring staff.

I didn't know about this, thanks for sharing. Can I get a source?

I don’t get what this “he deserves a stellar salary” mentality comes from

I'm a firm believer in meritocracy and the importance of rewarding skills. He should still pay a hefty price for his crimes, including jail time, where he will hopefully learn to change his ways, but once he gets out, if he's truly remorseful for his actions and he's willing to have others monitor his device usage activities, I don't see why he shouldn't be hired by a red team

[-] dannym@lemmy.escapebigtech.info 15 points 6 months ago

Absolutely, didn't mean to imply otherwise

[-] dannym@lemmy.escapebigtech.info 17 points 6 months ago* (last edited 6 months ago)

MIT is a terrible license that only got popular because of the popularity of the anti-open source movement in the last decade.

one could write books about what's wrong with the MIT license.

It could even theoretically be argued that MIT has in some ways allowed big tech companies to proliferate, by effectively allowing them to take open-source code, modify it, and then close it off in their proprietary software. What does this mean? It means that the work of countless dedicated open-source developers can be co-opted by companies that have done almost none of the work, reaping several billions of dollars, while the developers who actually did the work make no money. It's like opening your doors wide only to have someone come in, take your stuff, and sell it back to you.

In contrast, in licenses like the GPL, there's a requirement that if you use GPL-licensed code and modify it, your new code also has to be open-source under the GPL.

[-] dannym@lemmy.escapebigtech.info 23 points 6 months ago* (last edited 6 months ago)

Bonus tip:

ci" means change inside "" ca" means change around ""

the " can be replaced with any of: ({[wspbt

For changing inside or around parentheses, curky brackets, square brackets, words, sentences, paragraphs, code blocks and HTML tags respectively.

So for example if you want to replace all parameters in a function call you just do ci(

But that's not all, the c is one of the possible operators, but not the only one.

di{ deletes the content of a block ya[ copies the content of something inside square brackets g~iw swaps the case of a word guis makes a sentence lower case gUip makes a paragraph upper case

And the most useless one: g?at replaces the content of an HTML tag with its rot13

[-] dannym@lemmy.escapebigtech.info 19 points 7 months ago

Yeah, there is one way to make it better, but it won't happen until they're forced to change: force them to integrate with the matrix protocol

yes, I know that it's possible to use a bridge, and I do it, but it still requires a discord account, it would be great if discord rooms were just accessible with the matrix protocol

[-] dannym@lemmy.escapebigtech.info 21 points 7 months ago* (last edited 7 months ago)

It's truly a shame that in this advanced age of technology, encryption remains a distant, unattainable dream! In this archaic age of ours, safeguarding customer data is just not possible yet because nobody has ever invented the concept of public private key pairs yet, and hackers are having a field day with our data. Clearly, we're still stuck in the digital dark ages where safeguarding sensitive information is just a pipe dream. 🙄

Seriously, how is it possible that they're still not using key pairs for encrypting this data? It would be so simple, you just include a flash drive, or a qr code, in the box with the key and accessing the website to view the data would require that key, how is that still not something they're doing?

#EncryptionPlease

[-] dannym@lemmy.escapebigtech.info 15 points 7 months ago* (last edited 7 months ago)

Then use alternative youtube clients, like piped or freetube.

Or even better: spend money (if you can afford it) to host a peertube instance that automatically rips the videos off of youtube.

That's an even stronger message that you'd rather spend money than use their crappy free services.

[-] dannym@lemmy.escapebigtech.info 19 points 8 months ago

can you imagine the audacity of a company to not only collect your data and sell it, but also charge you for that?

[-] dannym@lemmy.escapebigtech.info 26 points 9 months ago

you're posing an unfalsifiable statement as a question

"prove to me that you don't have an invisible purple unicorn friend that's only visible to you"

view more: ‹ prev next ›

dannym

joined 1 year ago