General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
TommyJ
Mental Outlaw
comments
Comments by "TommyJ" (@ImperiumLibertas) on "Mental Outlaw" channel.
Previous
1
Next
...
All
@parknich081 who TF are you? The comment goblin?
347
@absolutelydegenerate1900 it has nothing to do with effort. Big brands were spending a lot of money on sponsored videos just to get a ton of negative attention. YouTube knows that if a viewer can't see the number of dislikes that they are much less likely to dislike the video themselves.
135
@silver6229 Starlink literally cannot be blocked in Brazil because it does not rely on any hardware on the ground other than the dish which is owned by the customer. They'd have to target the specific frequencies that Starlink uses. Even then jamming like requires a ton of power and would only affect connections near to the jammer.
125
@ErikUden if you think kiwifarms is a "Nazi filled page" you either think everything is Nazi that isn't mainstream or you've never actually been to kiwi farms. It's full of edgy humor and lolcow content for the most part.
91
@cherrypepsi2815 ddos protection is just about the only thing you can't self host. He's self owns everything else.
90
It is very likely the exposed azure api key was used in many critical services and revoking the key wasn't an option. Imagine it was an actual hack what would have happened.
86
@UmVtCg both. It's always a cat and mouse game. People really hate ads and will go great lengths to not see them.
80
@wafflecat_ have you ever worked at a technology company? You would blush at the amount of information a company can get on you. Most of these analytic companies know more about you than your husband/wife.
79
They should release code that patches the APK to not risk IP laws. They'll still get legal pressure but they'd be in the legal right. Adding adblock to your own software isn't illegal which is already confirmed by existing case law. Magisk offers a feature for patching parts of the OS or post patching apks
78
It's never the super complicated computer thingy that gets these people caught. Even the Dread Pirate Roberts was caught because of usernames.
65
Does Monero support arbitrary data on the chain? Is this going to be a separate blockchain?
52
I'm convinced Tor is compromised. Seems like every year the NSA is able to crack more traffic through the onion.
52
@Lonovavir like 1911s aren't "malfunction prone" 😂 get a better gun
52
LUKS does not decrypt all the files on the file system when you enter the password. What LUKS is doing is creating a virtual mapper that intercepts read and write requests to the storage device and either encrypts or decrypts the data in memory. This mapper is never stored on the storage device. It only exists in memory which is why the hard drive is able to stay encrypted even if you yank out the power cable.
48
Suckless software falls short because it requires you to modify code to change basic settings. I do not want to have to configure my applications in code. The idea of making software patchable as a first class citizen is great and should be the norm but configuration should be done in config files.
41
The internet is becoming a cooperate hell scape.
40
Netbooting tails isnt that bad of an idea if you can trust the network youre on and the os image youre targeting.
31
@matthias6933 the email protocol cannot support encryption in its current state. There'd have to be a complete overhaul of the standard.
30
My company blocked my use of tmux for 3 weeks until they could do a security review. Maybe security needs to not be a joke before I take them seriously.
29
Can you explain what full chain membership proofs are?
29
You could tor proxy to that service to bypass Tor exit node blacklists. Without it services can block all tor and VPN access essentially requiring users to doxx themselves.
28
@samwhaleIV garbage tv.
27
Protonmail just released a cloud storage and collaboration product. It's very likely this could be adapted for that relatively easily.
26
They need to make the tx-extra data a one way transaction to a separate chain that way you can't associate specific tx extra data with a specific transaction. All the malicious actor would be able to see would be the presents of tx-extra data or not.
26
It must have been downloaded over long periods of time. Pulling something that large too quickly would trigger automatic detection.
25
@markm0000 never "listening" always "hearing" love the big tech bs.
25
@zuighemdanmaar752 interesting. I was unaware of ram being encrypted in enterprise settings. That would make encryption at rest much more effective since Linux uses a mapper to access data which runs in memory. The partitions themselves are never decrypted so the feds wouldn't be able to image the decrypted data without beaching the encrypted ram somehow.
24
@robotron1236 I'm a software engineer for nearly 10 years. For me, it's not about know how. It's about not wanting to unnecessarily overcomplicate what should be a simple process. Just make it read from a file and call it a day. Making compilation required for configuration is unnecessary and tedious. Now I have to setup auto builds if I want quick iteration instead of just having it hold a socket to the files contents.
23
Yes, FOSS is only as secure as the number of people reading the code
22
@ezmodey1105 they're not extreme. They're just incompetent. Don't know what threat vectors to focus on. It's more about job security than actual security to these people.
22
@Yoro.Thatcher.Demllion not really. Most of the ddos mitigation comes from distributed caching with intelligent verification. Without massive hardware distributed it becomes near impossible to create what CloudFlare has.
21
The way they implement harm reduction is hardly harm reduction at all. It was more blanket decriminalization with no plan for harm reduction. Harm reduction can be successful if implemented correctly but the cities don't actually care about harm reduction and just care about pandering.
20
Free marketing. I'll probably recommend this to my normie friends and family now.
20
Wanted to save their budget of having to send agents to colorado lmaoooo. Budget conscious glowies
18
Sounds like a step closer to remote disabling of cars.
17
The driver sets the desired speed and is capped at 15mph I believe.
15
@thewhitefalcon8539 They can make it more difficult to download vulnerable software by making a standardized way of distributing software that isn't garbage. A trust based system is how most linux application repositories do this with open source install scripts, builds, and changes to the software is how the AUR handles it. Windows is trash because there is no easy way to know what you're running before running the application. On linux usually the binaries are openly hashed and maintained by teams of very talented people.
15
It's not going anywhere. There's a demand for this type of service. There will be a new company that pops up tomorrow.
15
Problem with the exit nodes are that they are a single point of failure. Law enforcement and ISPs have for as long as Tor has existed targeted exit node operators with warrants, cease and desist orders, etc. Additionally, Tor has a known vulnerability where if one bad actor NSA cough cough controlled enough relays they could do correlation attacks to track the flow of traffic. Tor is legacy unfortunately and it's time to move to a better solution whatever that is.
14
@tylerhorn3712 it typically uses a text message to trigger a notification and breaks out of the notification engine and runs it's payload. Thats about all we know about only one of the vectors pegasus has.
14
@visekual6248 this isn't about freedom. This is about a foreign adversary owning a major social media platform that can be used to influence the US. They're not banning you from using TikTok, they're banning TikTok from operating in the US.
14
@dangerous8333 This is simply not true. The entire internet is built off of linux. The majority of sensitive data is stored on hardware using the linux kernel to some degree.
14
If your culture can be eroded by nothing more than access to the Internet then you didn't have much of a culture to begin with.
13
He wont get the death penalty. The crime can warrant the death penalty which means it is an option for the judge but it is extremely unlikely.
12
@maruseu it's the fact I have to compile at all instead of just loading the file as its written to or having a single command to refresh the config. If you recompile you have to restart dwm for the config to take effect. It's entirely automatable, which is what I did, but I found it unnecessarily complicated for something that is not even a primary feature of the program. I use hyprland now which is a much better experience although the config is terrible in its own ways. I disagree with the philosophy that by adding a configuration file outside of the compiled language makes the program suck. The suckless devs were trying to avoid having to dictate a way to handle configuration and somehow found the only way to make configuring the software more inconvenient somehow.
12
They're not storing the actual images. They'll store a hash of the image. Still don't like anyone especially a mega cooperation having the ability to scan my phone for any reason. Right now its CP. But what happens when the FBI issues a subpoena to apple to scan your device for firearm serial numbers? Or something similar.
11
They don't need to unite against the US infrastructure. Look at what biden and his cronies are doing to the logistics system/supply chain. He's doing their work for them.
11
@chongjunxiang3002 making software open source does not make malware any more dangerous. Linux is far less vulnerable due to its open source nature than windows.
10
@thomp I made that comment before me mentioned that. I think allowing cryptographically secure one way transactions to a separate Blockchain with tx extra data is the only way to resolve this.
9
@Thornskade DaVinci resolve is a great video editor and if you absolutely have to use Photoshop (gross) then run it in wine or in a KVM box.
9
Previous
1
Next
...
All