Zalack

joined 2 years ago
[–] Zalack@startrek.website 4 points 2 years ago

The FBI and regular police have very different standards. I definitely think this should be fully investigated like any use is force, but I have more faith that the FBI handled this appropriately than of it had been a local PD department.

[–] Zalack@startrek.website 4 points 2 years ago* (last edited 2 years ago) (1 children)

Not a treasure

[–] Zalack@startrek.website 12 points 2 years ago

Thatsthejoke.jpeg.zip

[–] Zalack@startrek.website 1 points 2 years ago

In many cases it should be fine to point them all at the same server. You'll just need to make sure there aren't any collisions between schema/table names.

[–] Zalack@startrek.website 19 points 2 years ago (1 children)

I'm not saying there aren't downsides, just that it isn't a totally crazy strategy.

[–] Zalack@startrek.website 5 points 2 years ago

Same. I write FOSS software in my free time and also paid.

[–] Zalack@startrek.website 5 points 2 years ago* (last edited 2 years ago)

Man, I really think you should either saddle up, don't block ads, or use a free, non-ad-supported alternative.

Sync is made by a single dev who uses it as his main source of income. It's not made by a corporation. Taking the fruits of someone's labor, that they have priced to make it worth their time, feels kinda shitty to me.

If you really feel it's so much better than the alternatives that you won't even use them, then pay what the person making it feels they need to keep making it.

[–] Zalack@startrek.website 38 points 2 years ago (3 children)

You're being sarcastic but even small fees immediately weed out a ton of cruft.

[–] Zalack@startrek.website 2 points 2 years ago* (last edited 2 years ago) (1 children)

What about spicy food? Go for the Trifecta!

[–] Zalack@startrek.website 4 points 2 years ago* (last edited 2 years ago)

Sorry you're right that I wasn't being precise with my terminology. It's not a DDOS but it could be used to slow down targeted features, take up some HTTP connections, inflate the target's DB, and waste CPU cycles, so it shares some characteristics of one.

In general, you want to be very very careful of implementing features that allow untrusted parties to supply potentially unbounded resources to your server.

And yeah, it would be trivial to write a set of scripts that pretend to be a lemmy instance and supply an endless number of fake communities to the target server. The nice thing about this attack vector is that it's also not bound by the normal rate limiting since it's the target server making the requests. There are definitely a bunch of ways lemmy could mitigate such an attack, but the current approach of "list communities current users are subscribed to" seems like a decent first approach.

[–] Zalack@startrek.website 2 points 2 years ago (1 children)

Take me HOOOAAAAAAMMMMME

view more: ‹ prev next ›