Yes, i got it, but it depends from the distribution. If there is correlation on where the bad apples appears (e.g. for cultural or socio economic conditions), it is more likely that we are close to the case of 3 bunches (that is 30 apples, just 5 more than the “original” apples)
If we stop this parallelism (that is what I disagree with) and we move to the actual issue with the police, i think it’s a problem with all power positions: all positions that come with power (no matter how small) attract certain kind of people. This is true from the folks that check tickets in public transportation to teachers. Police is worse because there is a lot of unchecked power and close to no accountability
The solution is not how to do bin packing of the bad apples, the solution is reducing the power, increasing accountability and add checks (e.g. while body cam have some privacy implications that i don’t like, it’s a step in that direction)
between 3 and 25, depending from the distribution… And your point is? 🤷
Never changed the ROM of my abdroid phones but, as far as I understand, it should possible to install Lineage and lock the boot loader and stop using root, no?
Clearly fake: LLM don’t mind citing their sources 😂
I don’t use windows for close to 20 years so I didn’t need ntfsclone so far but do I read correctly the man page that only the source is specified as positional parameter? If so, shouldn’t you have to write
nftsclone —overwrite /dev/sdc /dev/sdb? It still can be misleading (given that mv uses two positional parameters so mv -f source destination would have done what you wanted) but a bit less cryptic?
15’000/15’000 65 chf/month (~70$/month). No cap. Native IPv6 (with static IP subnet and reverse DNS if you want), Free IPTV on multicast. With a bit of extra you can have Static IPv4 or even the ability to run your own Autonomous System and have BGP at home.
Here in Zurich/Switzerland.
But there aren’t consumer router that can handle this speed so I need to have a workstation on 24/7 for routing that </first world problems>
And not refund…
Hard to ask to the pig they used for the experiment 😅 I suspect we are talking of highly sedated brains anyway
The question is not what Google does now but what it will do in 1month, 1quarter, 1year.
It has been years that more and more petty measures have been taken.
FWIW I would make a spare account
Next step: “we are a nation of smokers and millions of us smoke daily. We are making the life of these people easier. Stop to the No Smoking areas. If a pregnant woman is present she can go eff herself. Stop to taxes on tobacco.
Because Google is like 90% of the market.
It’s not the bidding part per se the issue, the issue is that the bidding (and possibly other effective strategies) are so successful that Google is almost a monopoly.
The illegal part is that google is a bit too successful AND it uses these not-merits based techniques 🙂
The idea is that if you really want to become almost a monopoly you should not play these games. And being a total monopoly would be illegal in any case
It’s software, everything can be done. Even if username and passwords are not kept in plaintext as you suggest (and likely nobody would do)
Problem is that the number of people that self host password repositories is so little that it makes no financial sense. And so for this reason your “massive scale” is an hyperbole because there isn’t a massive scale of people that self host password repositories
Botnets that stole from local password repositories makes more sense because there are more people that use password managers of sort.
Humans looking are flexible enough to look at all possible long tail cases like this… but not going to happen except for high profile targets.
All in all what i am saying is that i don’t see clear evidence that self hosting is more dangerous (in practice) than centralized hosting
PS: pro tip If you link references, make sure to read the references you link… The second one has nothing to do with password stealing, it was about a password cracker that was a trojan horse for a botnet. Yes, it fits the search “botnet password” but it doesn’t sustain your point
You need to aumatize any operation… It’s not conceivable that an human look at every device for stuff to steal. It would be even more expensive.
Generally all these bit malware do is 1) using a vulnerability to replicate themselves 2) mine crypto or other kind of crap. Sometimes (1) involves also stealing ssh keys but it’s not the goal, it the mean.
Self hosting password/code/photos/whatever niches you are almost guaranteed that no human will look at hit because the amount of IoT/Routers/etc with nothing valuable beyond themselves generally composes the majority of these compromised bots
This is just the economic incentive
Self hosting is less appealing for criminals, though. Especially if the protocol is “vanilla” like ssh.
When you hack LastPass you know what you’ll find, millions of passwords. When you hack a dude ssh you have one chance over one million that there is one dude password wallet.
It doesn’t make financial sense to hack self hosting (unless it’s specific server software)
The real question is… Are these people repeatidly hurting you or they were one offs?
If it’s repeated… Well that is an issue… You don’t have a defense mechanism.
If it’s one off… Well you just are an optimist person 😃
I guess they may have thought you were there only for the “legal speed”.
I would just try another doctor… I would not take it personally… Albeit it sucks you had the experience 😕
You can change the settings of your account to not show NSFW and porn is filtered out 🙂
Hashing enters the chat