Scipitie

joined 2 years ago
[–] Scipitie@lemmy.dbzer0.com 10 points 2 weeks ago (3 children)

There's a xkcd for that of course! Linking directly to the explain as it has more info but the important thing is: password guidelines tricked humans into thinking in a machine way about safe passwords but long pass phrases are more secure from an entropy point of view and way easier to remember!

https://www.explainxkcd.com/wiki/index.php/936:_Password_Strength

[–] Scipitie@lemmy.dbzer0.com 1 points 2 weeks ago

Just to herd a warning then from a Dev perspective: you want to remove them before interacting, not just opening.

I can send files without ever opening them and the sharing would keep the meta data if you'd not open the files manually with the cleanup tool.

Personally I've had a camera app a while back that I could configure which meta data it saved but I simply stopped sharing photos on social media and so this become s non issue for me :)

[–] Scipitie@lemmy.dbzer0.com 4 points 2 weeks ago

Honestly I find myself in your text a bit so perhaps I'm projecting:

If it's purely for specs than the other poster is right. You won't get bottlenecked with RAM even at 32GB. So if you're being capped now and short on cash just upgr to 32GB and future proof when the future is closer around the corner.

But to me it sounds like you might just want s complete upgrade and are now looking for a reason (that's the potential projection part :p). If that's the case then check your budget and go for it - but don't try to sugar coat it: the reasonable path is to do the smallest upgrade step possible that fullfils your needs!

[–] Scipitie@lemmy.dbzer0.com 3 points 3 weeks ago (1 children)

DHL. Fucking DHL. Not sure if it fits your question but I got triggered badly here.

They removed all forms of contact except WhatsApp and their shitty z broken chat bot. If there is ever a use case for LLM than this is it. But they use s system that can either sell you stamps or breaks.

Oh but you can call them. Do you can talk to there chat bot. Once you've broken it enough for it to grant an audience with a human being the connection drops.

I very rarely get worked up by broken systems but someone else chose to use this shit shoe and I'm now imprisoned in their web of bullshit.

[–] Scipitie@lemmy.dbzer0.com 5 points 3 weeks ago

Oh yeah I see...

As some old philosopher once said: "shit's fucked, yo".

Seems to be appropriate here.

[–] Scipitie@lemmy.dbzer0.com 16 points 3 weeks ago (2 children)

Because a security engineer focused on cloud would rightfully say "pod security is not my issue, I'm focused on protecting the rest of our world from each pod itself.". With AWS as example: If they then analyze the IAM role structures and to deep into where the pod runs (e.g. shared ec2 vs eks) etc. then it would just be a matter of different focus.

Cloud security is focused on the infrastructure - looks like you're looking for a security engineer focused on the dev side.

If they bring neither to the table then I'm with you - but I don't see how "the cloud" is at fault here... especially for security the world as full of "following the script" people long before cloud was a thing.

[–] Scipitie@lemmy.dbzer0.com 5 points 3 weeks ago

Spannend!

Wenn ich das richtig lese zahlen Selbstständige allerdings hier mit zu den atypischen ("einer der Bedingungen nicht erfüllt" und "muss in einem unbefristeten Angestelltenverhältnis sein").

Wäre schöner, Unternehmer und Selbständige raus zu nehmen, denn diese Gruppe hat nicht die Problematik, der "atypischen" Gruppe wir im Artikel beschrieben.

Bitte korrigiert mich,falls ich da einen Denkfehler habe.

[–] Scipitie@lemmy.dbzer0.com 2 points 3 weeks ago (1 children)

Not stupid, friend, careful about unknowns :) and it's normal that a project wants to receive tested and validated pull requests - finding good testers is nearly as tough as finding devs I think.

And you're right: your situation is what docker usually excells at.

To address your concerns I suggest a three stage approach:

Pull/build from your repo in parallel with new volumes own port(s) etc. create some dummy data in there and rebuild with the test data, check that reconstruction works.

Then shut it down and remove it again. copy the volumes of your existing container and use that for the second instance.

If everything works fine there as well then shut down the old version, create a backup of the volumes and update it with your version.

This way you're safe and have an easy time seeing where and when something breaks at the same time.

You could also start with the last step and the backups only - but this way you can take w conscious step after the other. Your choice!

[–] Scipitie@lemmy.dbzer0.com 11 points 3 weeks ago (1 children)

I see two ways forward: either you're risk averse and assume internal damages that will highly influence heat transfer or you trust in the automatic protection mechanisms or your CPU.

Personally I'd toss it but I'm old and I've burned more than one CPU back in the days with faulty or wrongly installed coolers.

I don't think that the risk is high nowadays but I'm (literally) burned in that regard.

I'm not even sure it would survive bending back so perhaps try that first and if it breaks completely you don't even have a decision on your hand :)

[–] Scipitie@lemmy.dbzer0.com 2 points 4 weeks ago

Oh I think I see the misunderstanding, thanks for your answer!

I had no specific technology or even "social media in my mind at all when writing my first post. Instead I tried to convey my personal preference on the scale "absolute transparency" to "absolute privacy" for the specific case of "seeing who votes in which direction from user about users".

I completely agree with your statement "don't treat it differently because of underlying tech decisions".

For me the answer to the privacy question depends on the specific use case (and who provides/ controls it).

And to answer your question: I only try to describe "my" wishes, not how I think fedi developers see the situation.

[–] Scipitie@lemmy.dbzer0.com 9 points 4 weeks ago (2 children)

I have to be very clear: That's simply wrong and I have no idea how you come to the conclusion that my statement was Lemmy /Fedi specific in any way...

All other social media do have this information and just don't provide it to their end users.

My take for how I read this specific case (public communication/information platform) is: Either full anonymity or pseudonymous transparency.

For other cases I'd even argue for personal linked transparency. For others I'd be against having behavioral transparency and would prioritize privacy even higher.

"Social media" as umbrella term is btw too broad for me personally to say "they should do X"

[–] Scipitie@lemmy.dbzer0.com 7 points 4 weeks ago (4 children)

That's the balance though: privacy is the antagonist of transparency in its nature.

And that's w good thing in my opinion because this discussion is depending on the subject and not an ultimate right or wrong.

For the specific topic I actually value the transparency more than my personal privacy because it makes manipulation of opinion more transparent.

view more: ‹ prev next ›