[-] sudoshakes@reddthat.com 14 points 4 hours ago

They wrote. It down.

It may prove to not end in consequences, but they took notes on a criminal conspiracy before the outcome and it’s part of evidence submitted in federal court.

Nothing burger is not nothing.

[-] sudoshakes@reddthat.com 6 points 4 days ago

If your portfolio was a Fidelity target date fund, it would not be impacted by the local industry you mention in your post.

I also happen to know more about the details of how our retirement fund recommendations to clients works at Fidelity… because I worked there for the last 5 years.

You are showing the results of poor selection on your part.

[-] sudoshakes@reddthat.com 56 points 8 months ago

Better still, is he swore under oath to having $450 million in cash. So if he says otherwise he then opens himself up to charges for lying under oath.

[-] sudoshakes@reddthat.com 22 points 10 months ago

Most modern cancer drug treatment is sequenced to at least the specific proteins of the type of cancer it is.

Have breast cancer? Cool. We figure out which of the many variations so that we can give you medications for that exact type of breast cancer.

This sort of specific targeting has been increasing and increasing for the last 20 years. MRNA is the next step of that and is highly likely to be a means or become or for treatments in many other areas.

[-] sudoshakes@reddthat.com 23 points 11 months ago

Not being able to inspect their code vs no passing are different things.

[-] sudoshakes@reddthat.com 26 points 11 months ago* (last edited 11 months ago)

Technically he was stopped by an illegally stacked Supreme Court from a single senator in Kentucky refusing to allow a floor vote on a justice while Obama was president.

But tomato tomato.

[-] sudoshakes@reddthat.com 28 points 1 year ago* (last edited 11 months ago)

His point, which seems pedantic, but isn’t, is to illustrate the specific attack vector.

Breaking encryption would mean that the cryptographic process is something that an attacker can directly exploit. This is as close to impossible as it gets in that line of work.

While you can compromise the effectiveness of encryption by subverting it using other attack vectors like man in the middle or phishing or the good old fashioned physical device access, these don’t break the algorithm used in a way that it makes it vulnerable to decrypting other data.

None of those mean an algorithm used like say the ole Two fish encryption is “broken”.

Blowfish Triple DES Twofish RC4 Etc. All are fine and not currently broken. All however cannot protect your data if some other attack vector companies you or your site’s security.

[-] sudoshakes@reddthat.com 27 points 1 year ago

The US fucked up hard on its killing of civilians, but MODT of the time it was at least a result of supporting direct ground combat where friendly forces were engaged. At least that was true from weeks after the initial invasions of Iraq and Afghanistan.

Israel is tossing bombs at targets, using the most advanced aircraft in the world… and their ground forces are not within 10 miles of the site.

That’s what makes this inexcusable. They had time. They didn’t have ground forces under threat. Every vehicle isn’t an IED waiting to happen yet. They have the time to check for authorization before letting a JDAM off the rails.

The right to defend has to come with purse string implications if they use it as right to kill without mercy. They do this, we cut funding. They do it more, in clearly not accidental strikes, we impose sanctions. The purse will hurt enough due to their reliance on western arms, that they change lest they not be able to drop bombs at all.

It’s one thing to have a legit terror target and mistake the building or some freak accident. It’s another to drop a bomb on a refugee camp and then simply shrug.

[-] sudoshakes@reddthat.com 58 points 1 year ago

Billion with a B.

view more: next ›

sudoshakes

joined 1 year ago