• 1 Post
  • 240 Comments
Joined 2 years ago
cake
Cake day: December 25th, 2023

help-circle
  • You don’t! At least not in the sense that I’m aware of the JADE thing:

    JADE is nothing that is a strong work proven topic but came from social media to handle narcissistic people as a peer group.

    Your reactions are hostility and rejection based and how I understand you it’s your nerves that you want to preserve.

    For this in a professional work place there are multiple ways to deal with and even all of them at the same time, just from the top of my head:

    • Always go over your manager, make it his problem. “Dispatcher causes work for me by raising false claims/redundant questions - please resolve with their manager”
    • I’d call it business ghosting: answer and questions raised but but don’t go into any depth. “Correct, phone was not working due to no wifi.”
    • Work on yourself to detach your emotional connection: this is the toughest but also the most valuable one. It’s a fucking dispatcher who has his own problems and no other way to handle them then to try to use his environment as catalyst. My personal route is the framing “poor fucker, needs his routine and world to accept himself”. But also “this seems to be the only way he can feel important in front of himself” would work for me. Usually when I take pity with people I can’t get angry anymore about their behaviors.
    • Figure out what the true impact on your work performance is and handle that separately from the emotional connection. It’s absolutely normal to be annoyed and angry by the behavior you’ve described - detachment of impact and emotion can be a way forward.

    Hope this helps a bit!


  • If I understand you correctly: You want to be able to record one computer with another one on a system level (the BIOS-party that comes before any operating system is loaded).

    Although this is not Linux specific: your best bet is a video capture card as you’ve suggested already. Anything else would depend on your bios supporting remote access which is not exactly the same (my server bios for example can expose a website where I then can configure it from within a browser.

    The problem with video capture is that you’d still have two controls: one for the client and one for the host.

    Depending on what your final result should be it could be actually easier and cheaper to just get a stand for a smartphone and record it from there and then crop it precisely.

    You then have to only worry about light reflecting.



  • As I don’t know your parents I can just project from myself: Whoever would be the physically closer one at that precise moment.

    I can’t imagine a situation where this could be a rational decision unless one of you fucked them over in a way I can’t even begin to fathom.

    This is so deep monked brain territory that it really comes down to pure instinct and that is driven by perceived higher chance.

    If the situation is in a way there it’s impossible (for example would have to carry both of you but you’re too heavy) chances would be high that we’d all die together - not because of some heroism bullshit but simply because I know my inner monkey quite well and it’s self preservation instinct vs kin preservation are … Let’s say not in my favor ad an individual :D



  • Oh yeah I - at least in part I wanted to go over the top as reply to the “so boomer” phrasing :)

    But honestly, I think I see where you’re coming from. My concern is that it’s not a change in language but a shift from information to emotion: And there is genuinely something to keep an eye on: Do my news inform me or engage me?

    No matter if Epstein, AI, Ukraine, etc - it’s becoming harder and harder for me to create an opinion on my own because more and more of my information channels tell me how I should feel instead of what’s going on. I’d rather find that out on my own though.

    It’s an interesting thought for me though because I can easily rationalize my opposition against this shift - but it’s also rooted in my emotional reaction to emotion-bait which is … ironic I feel!








  • Sorry if I use the wrong English terms! I think you are right :) With system I refered to the literal computer system the file is saved on. I’m not a dev of one of those tools but I know several maintainers and developers that’s why I’m a bit sensitive there! Thats why I (baldy apparently, apologies!) tried to focus on the developer point of view and ignored the whole cost/benefit aspect which you described very well - thank you for that!

    Back to my point re/ local security because I feel this is the only one where I see a fundamentally different assessment between us: (Fontext: access an unencrypted file on my machine): I’m not aware of a mechanism to read (unencrypted or not) files on a host without a preceding incident. How else could your files be acessed? I don’t understand how I might have this backwards.

    You’re completely right if course that there are a lot of tools out there one could use - but it would be on the developer to implement support for those. If you support one you can be damn sure users shout for “I want to use Y”. And then you would still need a Fallback for anyone not willing to install a supported third party tools.


  • I have my issues with proton because of its CEO and some weird decisions for their product lone and don’t use them at all. I.e. I won’t defend this company.

    Such a claim without source and explanation or interpretation of assumed implications are pure fear mongering.

    Because of this: my advice is to decouple your privacy concerns and thoughts from politics in the first degree (rhetoric and hearsay). Base it ok policies, observable behavior, audits, laws and so on…your example: exit nodes for VPNs don’t have an impact on security at all in neither direction. Hosting infrastructure there would (i.e. it would increase potential access and put the infrastructure under additional legal requirements).




  • Cybersecurity works inherently with risk scenarios. Your comparison is flawed because you state that there is an absolute security hygiene standard.

    That said: I highly appreciate your approach to the subject, i.e. looking at the code and raising a discussion about something that looks wrong. Thank you for that!

    On the subject itself:

    There are two common ways to implement token management. The most common one I am aware of is actually the text based one. Even a lot of cloud services save passwords as environment variables after a vault got unlocked via IAM. That’s because the risk assessment is: If a perpetrator has access to these files the whole system is already corrupted - any encryption that gets decrypted locally is therefore also compromised.

    The second approach is to implement the OS level secret manager and what you’re implicitly asking for from my understanding.

    While I agree that this would be the “cleaner” solution it’s also destroying cross platform compatibility or increasing maintenance load linear to the amount of platforms used, with a huge jump for the second one: I now need a test pipeline with an OS different than what I’m using.




  • Wall of Text disclaimer: ich liebe die kernel Entwickler und will einfach ein bisschen Kontext rein werfen - keine Ahnung ob das Mehrwert für dich, lieber Lesender, drin ist.


    Linux ist der kernel in diesem Kontext.

    Hier wird Mal wieder news um nichts gemacht. Die offizielle Begründung von Linus ist aber lesenswert:

    https://lore.kernel.org/lkml/CAHk-=wh0Fj7yE7iuW8awFCFt53s9T186qNbZX673E+oNCeQSFg@mail.gmail.com/T/#u

    Kurz und frei übersetzt: “ich bin alt und mir gehen die Finger und Zehen aus, deshalb gehen wir Mal besser auf 7 statt auf 6.20”

    Die ganz ganz alten erinnern sich vielleicht dass der Witz immer wieder von ihm kommt. 5.19 wurde übrigens auch von 6.0 abgelöst und auch dort gab es solche Artikel schon.

    Ich kann die Assoziation zu Windows 7 verstehen, fürchte aber, Du wirst enttäuscht werden: außerhalb von solchen Nachrichten werden das die wenigsten mitkriegen. Die Menschen benutzen Mint 22 oder Ubuntu 24 oder Debian 9 (diss intended) oder so :). Selten wird jemand seine Kernel Version referenzieren - bin bereit zu wetten, dass viele sie nicht Mal kennen. Was ich persönlich sogar für finde. Daran erkennt man, wie reif das Ökosystem ist: man muss sich nicht mehr Gedanken machen, was genau unter der Motorhaube ist und wie es funktioniert.