• 0 Posts
  • 400 Comments
Joined 3 years ago
cake
Cake day: June 7th, 2023

help-circle
  • If you have the time, put some resumes out before accepting the first thing to come along. I don’t know how things are in Germany, but I’ve always believed it’s easier to find a job while you are still working. That said, if the new position, pay and work culture seem good, taking the position for now may be a good choice. You can always job hunt later.

    As for how you conduct yourself, I’d always suggest conducting yourself in a professional manner. While you may have zero intention of coming back to this organization, you never know when you are going to run across the people you work with again. And the next time they may be in a position to help or hurt you. For example, I worked for a company really early in my career which started falling apart quickly. Towards the end of my time there, they announced they were closing the office I worked at and basically gave my department a big “fuck you”. I could have gone out causing trouble or just worked my time until I left for greener pastures. I did the latter. Years latter, I was applying for a job I really wanted and an important member of the hiring team had worked with me at the first job. Not as my boss, just someone in another department. He remembered my work and work quality and had effectively said, “yup, hire this guy”. While I have long since left that job as well, his confidence in me changed the trajectory of my career.

    Maybe it’s different over there, but I’ve always heard that “it’s who you know, not what you know” that gets you hired. And I’ve run into that in my own career. You don’t want to be a pushover, but keeping professional relationships professional can pay dividends down the line. Do the job you are paid for, don’t make messes for other people and at least try to be professional in your dealings with others. You may be able to climb the ladder quickly today by being an asshole, but you never know if the fingers you step on today will be attached to the hand you will need to help you tomorrow.



  • IT is what you do when you are good with computers and not so much with people. You get really good at making the magic number boxes work for the MBAs and start explaining RFCs or networking protocols so that they fuck back off upstairs so you can go back to digging through log files and pcaps. It’s all just puzzle solving, reading and a crippling fear of social interactions.


  • This is one of the reasons vigilantism works better in fiction than in real life. In cases where some vigilante left a beat up suspect and some sort of evidence, any competent defense attorney is going to move to have the evidence suppressed due to issues around chain of custody and possible tampering. They would likely also push the narrative that the vigilante is the real criminal and left the evidence to frame their client. Between possibly getting much of the evidence suppressed, and building doubt around anything remaining, a conviction could be really hard for the prosecutor.

    This also ignores issues around vigilantes going after the wrong person for something (see: lynchings) and applying wildly disproportionate, extra-judicial punishments for crimes (see: lynchings, again). Crime and punishment really are hard problems which don’t lend themselves to easy answers. And there is a reason the Code of Hammurabi is seen as such a big deal in history. Rule of Law is an important concept which protects people.







  • This one is a mixed bag. KYC regulations are very useful in detecting and prosecuting money laundering and crimes like human trafficking. But ya, if this data needs to be kept, the regulations around secure storage need to be just as tight. This sort of thing should be required to be kept to cybersecurity standards like CMMC Level 3, audited by outside auditors and violations treated as company and executive disqualifying events (you ran a company so poorly you failed to secure data, you’re not allowed to run such a company for the next 10 years). The sort of negligence of leaving a database exposed to the web should already result in business crippling fines (think GDPR style fines listed in percentages of global annual revenue). A database which is exposed to the web and has default credentials or no access control at all should result in c-level exec seeing the inside of a jail cell. There is zero excuse for that happening in a company tasked with protecting data. And I refuse to believe it’s the result of whatever scape-goat techs they try to pin this on. This sort of failure always comes from the top. It’s caused by executives who want everything done fast and cheap and don’t care about it being done right.



  • I have two:

    1. Waves glowing with bioluminescence during a red tide. We didn’t know it would be going on and were just camping by the beach. Walking on it at night, we all saw the waves glowing and weren’t sure it was real. As we got closer, our footsteps in the area where the waves were rolling in and out were glowing as well. Just surreal.
    2. A house blowing up. Guy opened a natural gas valve in the house and touched it off. Insulation shot way up in the air and the house itself bowed outwards in basically every direction, stayed standing though. At least until it burned down.

  • Unless the romance is central to the game, that sort of focus and depth just isn’t going to be put into it. There is also the issue that the writers in video games have far less control over the main character than they do in other mediums. In a book, you don’t have to worry about your main character deciding to to fuck off for a week collecting all the boxes in a village and stacking them on the town well, just because it’s funny. That main character stays on task and on plot for the writer. There are games where that high level of control is possible, visual novels exist, but that starts to push into the question, “why not just make a book/movie instead?”

    Similarly, I think it’s going to be hard for any video game romance not to come off as transactional, due to the nature of a game being a computer program. Imagine trying to tell Romeo and Juliet as a video game. At some point, Romeo and Juliet will need to interact. Romeo arrives at Juliet’s window and professes his love. How does the player interact with the game for that scene? Is it just a cutscene? Or a cutscene with quick time events (press X to woo). Trying to replicate a Jane Austin style story would be even worse. As books about people sitting about in drawing rooms drinking tea and being catty to one another, replicating that in a video game is all going to boil down to dialog trees. Perhaps the first time through it could feel fresh and interesting, but on a second playthrough it’s going to quickly be obvious that the whole thing is really just “pick the right options for a chance at sexy-time”. Maybe we could get a Jane Austin Rouge-like, in that each time you load it up the characters’ personalities change and you really do have to pay attention to verbal and social queues to get anywhere. But even that is still really just “pick the right options for a chance at sexy-time”.

    Ultimately, I think video games are always going to be fairly transactional in nature. They are computer programs and are ultimately deterministic. All the interactions you have in a video game need to be planned out, scripted and maybe even voice acted. It’s what makes all the interactions in Baldur’s Gate 3 so amazing. Everything those characters do was planned for, written and recorded. Every comment, every facial expression was planned, written and coded. There is no spontaneity, because there can’t be (maybe with AI, but that’s a different can of worms). That so many little things actually did get covered is amazing. But, the trigger conditions for playing that bit of animation and voice acting will be hard coded. Whether or not a character likes the main character must be a set of numbers stored in memory, because that’s how computers work. Yes, it could be far more complex than just an easily identifiable number. And perhaps hiding those numbers from the player would make it feel less obvious, but they aren’t going to go away.

    And all the work which goes into planning, writing and coding those interactions is time spent during development. Going back to Baldur’s Gate 3, wouldn’t it be awesome if some of the NPCs started pairing off with each other? If the main characters isn’t getting busy with Shadowheart, maybe she discoverers an interest in big men who can turn into bears so you come back to camp sometime to find her and Halsin sitting very close together talking softly. This could even have the whole random element where different characters have different crushes/interests each time you play through. That would be neat to see, but it’s going to require a lot of extra development. Unless that’s a feature which starts selling video games, it’s not going to happen. Perhaps this sort of thing will show up in indie games, I wouldn’t expect it in major titles anytime soon.



  • While I don’t know the specific post you are referring to, Malware exists for Linux. Here’s a great overview from last year. If someone wants to argue, “oh it’s from a security company trying to sell a product” then let me point you at the Malware Bazaar and specifically the malware tagged elf. Those are real samples of real malware in the Linux specific ELF executable binary format (warning: yes it’s real malware, don’t run anything from this site). On the upshot, most seem to be Linux variants of the Mirai botnet. Not something you want running, but not quite as bad as ransomware. But, dig a bit and there are other threats. Linux malware exists, it has for a long time and it’s getting more prevalent as more stuff (especially servers) run on Linux.

    While Linux is far more secure than Windows by design, it’s not malware proof. It is harder for malware to move from user space into root (usually), but that’s often not needed for the activities malware gets up to today. Ransomware, crypto miners and info stealers will all happily execute in user-land. And for most people, this is where their important stuff lives. Linux’s days of living in “security through obscurity” are over. Attackers are looking at Linux now and starting to go after it.

    All that said, is it worth having a bloated A/V engine doing full on-access scanning? That depends on how you view the risk. Many of the drive-by type attacks (e.g. ClickFix, fake tech-support scams) all heavily target Windows and would fail on a Linux system. The malware and backdoors that come bundled with pirated software are likely to fail on a Linux system, though I’ll admit to not having tested that sort of thing with Wine/Proton installed. For those use cases, I’d suggest not downloading pirated software. Or, if you absolutely are going to, run those file through ClamAV at minimum.

    Personally, I don’t feel the need to run anything as heavy as on-access file scanning or anything to keep trawling memory for signatures on my home systems. Keeping software up to date and limiting what I download, install and run is enough to manage my risk. I do have ClamAV installed to let me do a quick, manual scan of anything I do download. But, I wouldn’t go so far as to buy A/V product. Most of the engines out there for Linux are crap anyway.

    Professionally, I am one of the voices who pushed for A/V (really EDR) on the Linux systems in my work environment. My organization has a notable Linux footprint and we’ve seen attackers move to Linux based systems specifically because they are less likely to be well monitored. In a work environment, we have less control over how the systems get (ab)used and have a higher need for telemetry and investigation.


  • One of the things to look at is the interest rate you would be paying for either loan and how that would effect the total cost of the loan. Also, there is the question of the utility of any money spent up front. For example, if using a loan on the existing house would result in no up front costs and a 5% interest rate over 30 years, and the standard mortgage would cost $20,000 and have an interest rate of 8%, you’re almost certainly better to use the existing house as backing and throw that same $20K in a long term interest bearing investment (e.g. government bonds). All this assuming you plan to hold onto the second property long term.

    Compounding interest is a fantastic tool and a fearful master. If you can make it work for you, then do it. If you are facing the possibility of paying it, you almost always want to lower it as much as possible.