you’re right dude, the snowflake has all the agency here. not the storm that created it, nor the wind that blows it around. if only it would melt itself then the energy consumed by phase transition would cool the earth in an imperceptibly small way, bringing us that much further away from global warming catastrophe. really, it’s the snowflakes’ fault for selfishly getting frozen in the first place.
- 0 Posts
- 1.17K Comments
If you think paper straws and electric cars are going to save the environment you’re part of the fucking problem. It’s not enough, and it was never going to be. They knew it wouldn’t be when they came up with these things which is why these are the measures that are allowed to be taken. Laws and subsidies that would actually help are instead lobbied out of viability. So we’re left with electric car subsidies making Elon Musk the richest asshole in history and paper straws making everyone hate environmentalism while we still hurtle toward annihilation.
They literally conspired to make the entire country not only dependent on their products, but did so knowing the harm those products caused to both the people and environment. The majority of the blame rests there and pretending that any amount of “personal responsibility” needs to be addressed is just so fucking stupid and self-defeating that it practically borders on sabotage. Let’s get mired in blaming each other for our own minuscule, largely involuntary contribution while they keep filling their pockets with our blood.
underisk@lemmy.mlto
Dank Memes@lemmy.world•The shopping cart is the ultimate test of a good person
21·19 hours agoWell now we have to discuss what harm we consider “necessary”, and that’s where things get pretty tricky.
Lick those oil exec boots just a little harder and I’m sure they’ll send you an invite to the pedo party.
AI to a layman just means “LLMs and Generative AI that rich assholes keep trying to force me to use or consume the output of”. i dont think its worthwhile to split semantic hairs over this. call the “good” stuff CNNs or machine learning if you really feel the need to draw a distinction.
underisk@lemmy.mlto
Technology@lemmy.world•Predator spyware uses stealthy trick to disable iOS recording alerts(without triggering the green or orange status bar dots)English
272·3 days agoPretty on the nose that the Israeli spyware company named their spyware after what we call people who sexually assault children.
It’s true I saw a video of it online and it was horrific. They’re so numb to this they treat it like a tourist attraction.
underisk@lemmy.mlto
politics @lemmy.world•Turns Out There Was Voter Fraud in Georgia—by Elon Musk
47·3 days agoDidn’t he very publicly advertise he would pay people to vote republican? I seem to remember this happening during the campaigning and nobody did shit about it then. Why would the result be any different now when the only politicians who nominally oppose the “destruction of democracy” didn’t do shit about that either and no longer have any power?
I don’t really care if they’re just interns when their job is to launder the reputation of a murderous immoral multinational corporation. If they had done PR for Nazis that would have made them Nazis.
“Just don’t let my ex know where I am I owe her tons in child support”
Unless you’re based in or have some kind of presence in those countries there’s no reason to even ban them. Banning by geolocation isn’t exactly trivial or reliable. Let them figure out a way to ban you instead.
underisk@lemmy.mlto
A Boring Dystopia@lemmy.world•Borrowing money against their stuff to get more stuff to borrow money...
1·7 days agoCarrier pigeons aren’t trained to establish a safe society for humanity. So if they get destroyed they haven’t failed at their primary objective. Governments, though…
underisk@lemmy.mlto
Technology@lemmy.world•You probably can't trust your password manager if it's compromisedEnglish
5·8 days agoI didn’t think you were making the post to defend Bitwarden or something. I was just adding the details of one of the exploits the paper found that directly contradicted their claim.
underisk@lemmy.mlto
A Boring Dystopia@lemmy.world•Borrowing money against their stuff to get more stuff to borrow money...
42·8 days agoWell, permanent because if it gets destroyed it you can’t call it successful, and utopia because you need an ideal to measure success against even if its not realistically achievable.
underisk@lemmy.mlto
Technology@lemmy.world•You probably can't trust your password manager if it's compromisedEnglish
28·8 days agoBW06: Icon URL Item Decryption. Items can include a URL field, which is used to autofill the credentials and display an icon on the client. The client decrypts the URL and fetches the icon from the server, including in its request the domain and top-level domain of the URL. For instance, if the URL is “https://host.tld/path”, the client request includes “host.tld”. This means that the adversary can learn (part of) the con- tents of URL fields. Using Attack BW05, an adversary can place the ciphertext of sensitive item fields, such as a user- name or a password, in the encrypted URL field. After fetch- ing the item, the client will then decrypt the ciphertext, confus- ing it for a URL. If the plaintext satisfies some conditions (i.e. containing a ‘.’ and no !), it will be leaked to the adversary. A URL checksum feature was deployed in July 2024, mak- ing the clients store a hash of the URL in another encrypted item field, therefore providing a rudimentary integrity check and preventing this attack. Note that old items are never up- dated to add such a checksum: this feature only protects items created after its introduction. Furthermore, URL checksums are only checked if a per-item key is present for the item. As we will see, an adversary can prevent per-item keys from being enabled with Attack BW10.
IMPACT. The adversary can recover selected target ciphertexts in the item, such as the username or the password.
REQUIREMENTS. The user opens a vault containing items that do not use per-item keys (i.e., items created before July 2024, or after Attack BW10 is run). The target plaintext must satisfy some additional conditions, detailed in Appendix
– from the paper the article is discussing
So you could potentially expose your passwords to a compromised server or some kind of MITM. If they meet the conditions for the validation check, anyway.
underisk@lemmy.mlto
A Boring Dystopia@lemmy.world•Borrowing money against their stuff to get more stuff to borrow money...
101·8 days agoA permanent utopia free from geopolitical influence has yet to be established under any system of government, therefore no system of government has ever worked.





We’re just going to see the head of state do a propaganda speech. Why is everyone being so political about it?