• 0 Posts
  • 782 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle
  • The chances of a true philanthropist beating out the psychopaths currently at the top of the chain, is basically nil. They will always fight dirtier.

    You need to ensure a government can exert power over the largest organisations in its country. If that ever becomes an issue, the organisation might start behaving as a de facto government of its own and start treating the actual government as a vassal.

    Basically we need to kick corporatist politicians out of our governments before they finish rolling out the red carpet for the end of democracy, and start chopping up and/or nationalising these proto-megacorps. If only a few control the tools that put us all out of work, we’re not getting anything close to utopia.


  • I’m not recommending it, I’m describing why saying it adds no security is silly.

    The keys being compromised on some motherboards doesn’t mean the whole concept is suddenly inert for every single user

    If everyone has a copy of my passwords and authenticator keys, that wouldn’t suddenly make 2 factor auth a compromised idea.

    Hell, even if you are one of those people running a machine with the compromised keys, it’s still going to block malware that was written before the keys were leaked unless malware authors have also figured out time travel.


  • 9point6@lemmy.worldtoLinux@lemmy.mlGrub and the Microsoft Ransomware
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    edit-2
    13 hours ago

    Well boot sector viruses used to be all the rage in the 90s, they’re entirely impossible under secure boot

    Malware rootkits were a pretty big problem about a decade ago, I understand the techniques those mostly used are more or less impossible under secure boot now too

    Then we could go into all the government and adjacent industry use cases where state-sponsored targeted attacks are a real concern. Measures like filling USB ports with super glue and desoldering microphones on company laptops is not unheard of in those circles, so blocking unknown bootloaders from executing is an absolute no brainer.

    Saying it provides no security is just not true. Your front door isn’t only secure if someone has failed to break in


  • You don’t have to

    If you only need it for 90 days before it expires, Microsoft will give you the VM for free (and if you’re particularly industrious, you might write a script that then installs a load of your shit for you to run after you fire up a fresh one)

    If you don’t care about potentially breaking the law you can run it forever with a couple of scripts you can find on GitHub

    If you don’t want to break the law but also don’t want to pay full price you can get a dubious but working key from sites like G2A and cdkeys

    If that’s still too sketchy there’s the OEM licenses (honestly not worth it since they can only activate on a single machine ever)

    Or finally you might feel sorry for Microsoft for some strange reason and want to go full retail price.

    Basically the same experience with all options for a lot of cases, they’re just happy to have users it seems

















  • Yeah it’s not a particularly obscure character in some languages, so it’s not really going to affect an LLM at all, it’ll already know what to do with them. Hell you could write in MSN era fancy text using characters incorrectly and I’d not be surprised if an LLM had no issue decoding it.

    Heart’s kinda in the right place, but the only outcome is going to be confusion and frustration from humans.

    Edit: was curious about the assertion I made about MSN text

    Seemingly no trouble