

Both of those are screwed over by the healthcare system and the companies perpetrating it. If you cant afford healthcare or don’t understand it because it is to convoluted, that is a result of the policies of healthcare providers.


Both of those are screwed over by the healthcare system and the companies perpetrating it. If you cant afford healthcare or don’t understand it because it is to convoluted, that is a result of the policies of healthcare providers.
While not caring about the things that should matter to them
Dont even need to make it open source for that. Just use either visual studio/vsc or have the code on github (private repo so not OSS)


Terminology: revoked means the issuer of the certificate has decided that the certificate should not be trusted anymore even though it is still valid.
If a attacker gets access to a certificates key, they can impersonate the server until the validity period of the cert runs out or it is revoked by the CA. However … revocation doesn’t work. The revocation lists arent checked by most clients so a stolen cert will be accepted potentially for a very long time.
The second argument for shorter certs is adoption of new technology so certs with bad cryptographic algorithms are circled out quicker.
And third argument is: if the validity is so short you don’t want to change the certs manually and automate the process, you can never forget and let your certs expire.
We will probably get to a point of single day certs or even one cert per connection eventually and every step will be saver than before (until we get to single use certs which will probably fuck over privacy)


One reason for the short certs is to push faster adoption of new technology. Yes that’s about new cryptography in the certs but if you still change all your certs by hand maybe you need to be forced …


You don’t need something ever. Sometimes you just want something because the alternative is realy bad. I don’t need to eat. I want to eat because I don’t want to starve.
I want to watch a movie with my partner at the agrees time because otherwise they will be mad. I want to access my digitalized documents to send a letter in time because otherwise I will have to pay late fees. I want to access my gameserver because that’s the one time a week I get to have fun with my friends from my college time.
There are many situations where I’d rather do the thing I want instead of doing maintenance.


There is still a good reason to know about problems early. Without any monitoring you will find out about problems exactly in that moment when you what to use the service that doesn’t work. Sometimes you need something quick and you don’t have time to debug and fix in that moment. If you get an alert early you can decide to fix it right away or in a few hours or tomorrow.


But that is also the worst part of boarderlands
Linux is famously both American and Corporate /s
But yeah sytsem76 and valve are both american and valve is corporate. And around Lemmy you would think they are the only ones responsible for the Linux boom.


The verifier does not have the information which sites you use. That’s the point of the setup. All communication goes through you, never the site to the verifier directly. You only pass cryptographic values between them that does not include identifiable information (neither about you to the website, nor about the website to the verifier). The verifier knows who you are, the website knows that you are old enough. Nothing else.


This system does nothing to protect against an allowed user helping a not allowed user to gain access
There is no system in the world that can fully prevent an authorized user to grant access to an unauthorized user. Even with an all time on camera and screensharing I can still find ways to have someone else control my computer while I “authorize” the connection with my face in the camera


Super easy. Technology has existed for quite some time and was already used in the encrpytion of web traffic.
Basically: you sign up with your “age verification institution” (ideally a service of your government because they have your ID anyway and no profit motive). This involves createing a private key (reaaaaaaaaaaly long password that is saved in a file on your device) and saving the public key with that institution. They also check your ID to ensure your identity and your age.
When you want to visit a 18+ website, the website sends you a nonce (loooooong random number). You take that nonce and send it to the verifier, along with a signature of your private key (and the age they want you verified against). The verifier verifies your signature using your public key. They then sign the nonce with their own private key, thereby verifying, that you, the owner of your private key (whos identity and age they have verified) are above the asked age theshould. You then send the signed nonce back to the 18+ website and they can verifiy the signature to confirm that a trusted age verifier has verified your age.
The site never has access to your identity and the verifier never knows which site you visited, only that you wanted to visit a website that wants to know if you are of a certain age.
(The corresponding technology was used for OCSP Stapling in TLS verification … and has been discontinued last year because nobody was using it …)
Honestly, the next Democratic president might actually deserve one if they stop the active fashist takeover of democracy. Even if they do nothing else and continue all current wars etc. Not being Trump could probably save thousands if not millions of lives.


A memory pointer? So it must have been a program sending a pointer using an API to itself so it ends up in the same process again?


I wouldnt blame that on stupidity as much as on ignorance and naivety. Many people simply don’t think about anybody deliberately misusing their design. The idea that somebody could even want to access somebody elses receipts didn’t occur to them. And if they were still doing their studies they might not have known that you can “combine” SQL queries and ask for two things at once.
I don’t blame the girl, but whoever chose her to design a system with sensitive information.
Thats because the US is used to MM DD YY thats why the US talks like MM DD YY thats why its intuitive to you to use MM DD YY thats why …
There is no inherent “intuitiveness” to it. Its intuitive if you grew up with it and you use it. It is unintuitive if you didn’t.
Its intuitive to people used to MM DD YY and unintuitive to everyone else.
Today is the 24th of November.
Skyrim has a collectible item that is found in a main story area that is only accessible once. Its a very early mission and in one of the last thief’s guild quests they will tell you to get that item. That might be 200h after you did that main quest …
Good thing modding exists
I think in cyberpunk its because cars use a separate control set that can/has to be separately rebound. Its so you can use a joystick for driving and a gamepad for walking
Not sure if there are tar pits with dinosaur bones but there are bones (not petrified bones) of post-dinosaur megafauna like sabertooths in the La Break tar pit in Los Angeles. There probably exists a real dinosaur bone somewhere on the planet.