[-] drspod@lemmy.ml 1 points 28 minutes ago

Did you think this blog post was aimed at the people with power, to petition them to change the laws?

It's aimed at us, the people getting fucked over, to point out what (among the many other things) we should be fighting for. Commentary like this is important to align the goals of the organizations, charities and lobby groups that defend YOUR civil rights by filing amicus briefs, publishing articles, encouraging activism and drives to get citizens to write to their representatives on the important matters that affect their rights. You don't even have to do anything and there are thousands of people out there trying to protect you from getting more fucked by Big Tech and capitalism, on a volunteer basis.

It sounds to me like you've just given up hope that any progress can be made on this front, given the new status quo.

Never give up. Just because civil rights defenders will be on the defensive for a few years does not mean that discussions of what is worth defending no longer have value.

19
submitted 23 hours ago* (last edited 19 hours ago) by drspod@lemmy.ml to c/lemmy_support@lemmy.ml

Edit: this appears to be fixed now: https://lemmy.ml/post/22203615/14801411

All images in posts on lemmy.ml are currently being resized to 256px on the longest dimension (width/height), even if they are image posts, not intended to be just article thumbnails.

Is this an intentional change? It makes text in images illegible and means that I have to view the original post to see the original image on every image post.

If this is a deliberate space-saving measure, could it be tuned for a little better usability? For example, increasing the maximum size of image when the post is an image post (as opposed to a web link that generates a thumbnail) and setting a size threshold to trigger resize (ie. most small images could be left alone).

Some examples from my feed:

[-] drspod@lemmy.ml 3 points 1 day ago

Yes sorry, I didn't realize that until I posted it and saw all of the "cross-posted to:" links. It's the first time it's posted to this community though, and I think it's an important topic.

[-] drspod@lemmy.ml 5 points 1 day ago

Flexing my GIMP skills that I use about once every 7 years

22
submitted 1 day ago by drspod@lemmy.ml to c/privacy@lemmy.ml
[-] drspod@lemmy.ml 5 points 4 days ago

Who funded the research? They probably have the source code and want to keep it proprietary.

[-] drspod@lemmy.ml 5 points 5 days ago

I will get a custom paint job on my car depicting a person driving while on their phone with no seatbelt on.

[-] drspod@lemmy.ml 47 points 5 days ago

If you distribute Linux crackers then you need to provide not just the list of ingredients but also the recipe used to make them.

[-] drspod@lemmy.ml 54 points 5 days ago

Idgaf about rabies

Now that's a take I wasn't expecting to see.

[-] drspod@lemmy.ml 24 points 6 days ago

The past tense of the verb "to lead" is "led."

"Lead" is a heavy metal.

[-] drspod@lemmy.ml 7 points 6 days ago

It's one of the most anticipated translations because it's a beautiful looking game that is just impenetrable if you don't speak Japanese. The best we had before was a translation script that you could read along with a walkthrough guide, but that's not the way most people like to play a game.

It's not surprising that if you start a project for a game like this and then go no-contact for a decade, people will start to look to see if they can pick up where you left off. There's this unwritten rule in the fan-translation community that you don't start working on a game that someone else has already started working on, but what is the time limit on that?

It seems like everyone in this situation could have done a better job of communicating in the first place, and then could have been more gracious to eachother after the fact.

[-] drspod@lemmy.ml 207 points 1 month ago

She's a great chess player but she's never been a World Champion. There's no need to embelish her story. She's currently training to become a surgeon at University of Missouri School of Medicine.

35
submitted 2 months ago* (last edited 2 months ago) by drspod@lemmy.ml to c/programming@programming.dev

Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks.

The technique "could be used to hijack 22K existing PyPI packages and subsequently lead to hundreds of thousands of malicious package downloads," the researchers say.

If you ever install python software or libraries using pip install then you need to be aware of this. Since PyPI is allowing re-use of project names when a project is deleted, any python project that isn't being actively maintained could potentially have fallen victim to this issue, if it happened to depend on a package that was later deleted by its author.

This means installing legacy python code is no longer safe. You will need to check every single dependency manually to verify that it is safe.

Hopefully, actively maintained projects will notice if this happens to them, but it still isn't guaranteed. This makes me feel very uneasy installing software from PyPI, and it's not the first time this repository has been used for distributing malicious packages.

It feels completely insane to me that a software repository would allow re-use of names of deleted projects - there is so much that can go wrong with this, and very little reason to justify allowing it.

368
submitted 2 months ago by drspod@lemmy.ml to c/196@lemmy.blahaj.zone
20
submitted 7 months ago by drspod@lemmy.ml to c/chess@lemmy.ml

Description: "Featured is a playthrough of a blitz chess game between Rodrigo Vasquez and Vladimir Kramnik from an Early Titled Tuesday event which was held on October 17th, 2023. Kramnik recently admitted, via a YouTube comment on this topic of fair play surrounding him, that he played several tournaments under someone else’s chess.com account. This act violates chess.com’s Fair Play Policy. Kramnik played under Denis Khismatullin’s account, “Krakozia”. I share reasons why this is a violation of fair play policy, how a player can be negatively impacted because of it, and provide Kramnik’s YouTube comments where he attempts to explain it all."

292
submitted 1 year ago by drspod@lemmy.ml to c/privacy@lemmy.ml

cross-posted from: https://lemmy.ml/post/4912712

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

188
submitted 1 year ago by drspod@lemmy.ml to c/technology@lemmy.ml

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

329
submitted 1 year ago by drspod@lemmy.ml to c/linux@lemmy.ml

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

[-] drspod@lemmy.ml 127 points 1 year ago

XMPP did not exist on its own outside of nerd circles, while ActivityPub enjoys the support and brand recognition of Mastodon.

Jabber was widely used in the early 2000s and not just among "nerds." But Rochko would have only been 7+ years old at the time so how would he know that.

The "brand recognition of Mastodon" part makes me think this has to be a joke... right?

1
submitted 1 year ago* (last edited 1 year ago) by drspod@lemmy.ml to c/lemmy_support@lemmy.ml

[SOLVED]: The issue was caused by having "Show read posts" unticked in Settings. This will hide your own posts from you!

I recently made a post^[1]^ to this community about a bug that I experienced and reported.

The post does not appear in the New feed for /c/lemmy_support nor does it appear in my user profile under Posts ^[2]^.

However the post does have 3 replies (from users on multiple different instances) which means that other users can see it across the fediverse, so it's not a federation issue. (Also, my account and the community are both hosted on the same instance - lemmy.ml).

I was not subscribed to /c/lemmy_support at the time I made that post, but I am subscribed now to see if that affects my visibility of this post.

Is this a bug, or am I misunderstanding how lemmy works?

Interestingly, if I view my profile while logged out, it does show the posts that I made, but when logged in it shows zero posts in my profile.

[1] https://lemmy.ml/post/1394597

[2]

view more: next ›

drspod

joined 2 years ago