• 0 Posts
  • 1.17K Comments
Joined 3 years ago
cake
Cake day: June 10th, 2023

help-circle

  • underisk@lemmy.mltoMicroblog Memes@lemmy.worldseriously
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    9 hours ago

    you’re right dude, the snowflake has all the agency here. not the storm that created it, nor the wind that blows it around. if only it would melt itself then the energy consumed by phase transition would cool the earth in an imperceptibly small way, bringing us that much further away from global warming catastrophe. really, it’s the snowflakes’ fault for selfishly getting frozen in the first place.


  • underisk@lemmy.mltoMicroblog Memes@lemmy.worldseriously
    link
    fedilink
    English
    arrow-up
    2
    ·
    12 hours ago

    If you think paper straws and electric cars are going to save the environment you’re part of the fucking problem. It’s not enough, and it was never going to be. They knew it wouldn’t be when they came up with these things which is why these are the measures that are allowed to be taken. Laws and subsidies that would actually help are instead lobbied out of viability. So we’re left with electric car subsidies making Elon Musk the richest asshole in history and paper straws making everyone hate environmentalism while we still hurtle toward annihilation.


  • underisk@lemmy.mltoMicroblog Memes@lemmy.worldseriously
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    3
    ·
    18 hours ago

    They literally conspired to make the entire country not only dependent on their products, but did so knowing the harm those products caused to both the people and environment. The majority of the blame rests there and pretending that any amount of “personal responsibility” needs to be addressed is just so fucking stupid and self-defeating that it practically borders on sabotage. Let’s get mired in blaming each other for our own minuscule, largely involuntary contribution while they keep filling their pockets with our blood.





  • underisk@lemmy.mltoMicroblog Memes@lemmy.worldeveryone hates AI
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    2
    ·
    2 days ago

    AI to a layman just means “LLMs and Generative AI that rich assholes keep trying to force me to use or consume the output of”. i dont think its worthwhile to split semantic hairs over this. call the “good” stuff CNNs or machine learning if you really feel the need to draw a distinction.












  • BW06: Icon URL Item Decryption. Items can include a URL field, which is used to autofill the credentials and display an icon on the client. The client decrypts the URL and fetches the icon from the server, including in its request the domain and top-level domain of the URL. For instance, if the URL is “https://host.tld/path”, the client request includes “host.tld”. This means that the adversary can learn (part of) the con- tents of URL fields. Using Attack BW05, an adversary can place the ciphertext of sensitive item fields, such as a user- name or a password, in the encrypted URL field. After fetch- ing the item, the client will then decrypt the ciphertext, confus- ing it for a URL. If the plaintext satisfies some conditions (i.e. containing a ‘.’ and no !), it will be leaked to the adversary. A URL checksum feature was deployed in July 2024, mak- ing the clients store a hash of the URL in another encrypted item field, therefore providing a rudimentary integrity check and preventing this attack. Note that old items are never up- dated to add such a checksum: this feature only protects items created after its introduction. Furthermore, URL checksums are only checked if a per-item key is present for the item. As we will see, an adversary can prevent per-item keys from being enabled with Attack BW10.

    IMPACT. The adversary can recover selected target ciphertexts in the item, such as the username or the password.

    REQUIREMENTS. The user opens a vault containing items that do not use per-item keys (i.e., items created before July 2024, or after Attack BW10 is run). The target plaintext must satisfy some additional conditions, detailed in Appendix

    from the paper the article is discussing

    So you could potentially expose your passwords to a compromised server or some kind of MITM. If they meet the conditions for the validation check, anyway.