![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
Yep, This is taken straight from Facebooks advertisements circa 2018, maybe still today.
Yep, This is taken straight from Facebooks advertisements circa 2018, maybe still today.
Super Thunder Blade did this, same era too.
Put each character in a spans with random classes, intersperse other random characters all over the place also with random classes, then make the unwanted characters hidden.
Bonus points if you use css to shuffle the order of letters too.
Accessibility? Pffffft.
Could a hypothetical attacker not just get you to visit a webpage, or an image embedded in another, or even a speculatively loaded URL by your browser. Then from the v6 address of the connection, directly attack that address hoping for a misconfiguration of your router (which is probable, as most of them are in the dumbest ways)
Vs v4, where the attacker just sees either your routers IP address (and then has to hope the router has a vulnerability or a port forward) or increasingly gets the IP address of the CGNAT block which might have another 1000 routers behind it.
Unless you’re aggressively rotating through your v6 address space, you’ve now given advertisers and data brokers a pretty accurate unique identifier of you. A much more prevalent “attack” vector.
I would like TVs to offer a custom scale. Where the minimum and maximum values are reasonable, but the numbers are proportionate.
Legally mandated support for:
1,2,3,5,7,11,13,17,19 are the only volumes.
I was maybe a little inebriated, and he was very rude.
He had to wait for the next train, and I had a sore jaw for a week. Mild inconveniences al round. I think everyone got what they deserved.
Threw a man’s belongings off a train because he was listening to music without headphones.
Worth it.
Nah we want you to start all your fucking about, get any beverage or condiments you might want, wash your hands, and have everyone at the table ready to eat when the food is ready.
And subsequently, not get any criticism while we’ve finished our meal and you’ve just sat down because you had to go to the garage to get a new bottle of OJ, pee that became a poop, wash your hands, and find the sauce you’ve suddenly decided to dig out from the back of the pantry.
I bought Minecraft when it was first purchaseable. Only converted my account last month as my new-school-entrant kid has asked what it is.
And honestly, I wish I didn’t. The MS launcher is an absolute shit show in usability for adults, let alone kids. Next time it forces me to log back in I’m just pirating it.
I bought two copies, I’ll fucking run them how I please.
CGNAT is good. One more layer of obfuscation between me and the internet.
Sucks for those wanting to run services from home I guess.
If you still do the sizing (it’s not entirely wasted as it’s a reasonably effective tool to gauge understanding across the team), This can still be done without the artificial time boxing.
“How much work have we done in the last two weeks?” Just look at all the stories closed in the last two weeks. Easy.
“When will X be delivered?” Look at X and all its dependencies, add up all the points, and guesstimate the time equivalence.
Kanban isn’t a free for all, you still need structure and some planning. But you take most of that away from the do-ers and let them do what they do best… do.
They were first to market with a decent GPGPU toolkit (CUDA) which built them a pretty sizeable userbase.
Then when competitors caught up, they made it as hard as possible to transition away from their ecosystem.
Like Apple, but worse.
I guess they learned from their Gaming heyday that not controlling the abstraction layer (eg OpenGL, DirectX, etc) means they can’t do lock in.
While suing everyone else that makes shovel handles that work with your shovel heads.
Problem then is, You Still gotta buy a truck to buy and haul your 2nd motorcycle, your 3rd motorcycle, your dirt bike, and your track bike.
Yes, this link has been disabled as per (dumb) organisation policy.
Ok. Did a quick read. And I think I mixed my words a little.
Yes, Active Directory supports TOTP fine.
But my understanding is rollouts can disable TOTP, and instead force the use of the proprietary scheme requiring the MS Authenticator app (which also supports TOTP) that uses push notifications to the device.
As is the case with my employer. They didn’t enable TOTP, and I am unable to use the provided MFA QR code with 1Password.
Afaik, Microsoft’s OTP implementation is proprietary and not TOTP.
But also, my understanding is you can select which MFA schemes you can use, and allow SMS, MS MFA, and TOTP.
Source: employer used to allow sms, locked it down, and totp apps can’t parse the MS authenticator QR codes.
Alternate headline:
Companies accept money for a thing that will happen anyway, and will be unable to prove if they say no.
GenAi is unfortunately here, and the technocracy wants you to want it so they can farm you for more and more intimate data to leverage and enforce their technocracy. And the only way they’re going to do it is by keeping the press positive, and feed it more and more data in the hopes it fixes things.
Because you’re only ‘exposing’ the port on the peer to peer network.
You “publish” a port to holesail, then clients have to create a local proxy via holesail before they can access it.
I agree, It’s a dumb pointless claim. But I don’t think it’s misleading.
It looks like holesail is just tailscale, but on a much smaller scale. It’s not networks, it’s just ports.