It’s an F-18 super hornet.
Fucking degenerate.
It’s an F-18 super hornet.
Fucking degenerate.
Right?
We lived a war that was in the infancy of modern media coverage. It’s weird my firefights are on YouTube.
It’s weirder to know I could be retiring this year if I had stayed in.
I don’t feel like it was that long ago, but we are those guys now.
Notice how I didn’t just use the service name?
<Disco>
<Netfucks>
<MailGoog>
Whatever nickname you use for your services. There is no requirement you also use the service name in the tagging template.
The idea that a breach of a service would have someone looking at your individual password is also pretty silly. There would be variations and pattern matching Lagos run against lists of hundreds of thousands to millions of passwords… but the decryption of a complete password to plain text is so reductions at this point, we are talking about the 0.01% case of a then even more silly “let’s look at this guys password in particular” 0.0001% case on top of it…
It’s not a real problem because if your service is at the point it is leaking not just salted and hashed passwords, but plain text passwords: you are in a big problem up no matter what for most users. Almost everyone reuses passwords. The real risk is the simple reuse. Get just a slightly different variation and you are miles more secure in the case of a breach that results in full decryption.
The majority still reuse Password1234! Everywhere. This gives you a easier way to be miles better.
Better still of course is some sort of managed password vault, assuming you trust their implementation. However, this costs zero in the training, or tech literacy upskilling that even the moderate change to a password vault requires. It’s simply an extension of what people already intuitively know. Thus, barrier to entry is easier while giving you several orders more protection.
Merica means freedom to do dumb things. Lemme fly!
https://dev-to-uploads.s3.amazonaws.com/i/it0fk0jbqphcgecnpbq7.jpg
You don’t partially decrypt passwords. You either get the full thing or you get gobble.
So if they get 1, they still don’t know you use <DiscordTag> or <Disco> or <DiscordSeevice> etc. I wouldn’t just straight up say “Netflix” in my service tagging.
You can take this a step further to segregate passwords as well.
Reusing passwords across devices is bad. If one gets compromised you don’t want a password being out into a brute force table to be used with all your other accounts elsewhere.
This method of tagging using HTML markup styles in your passwords lets you keep the same core passphrase but alter the tagging, specific to the service.
You can do this easily while also giving you artificial password complexity.
Example:
Core passpgrase is “yogurt”
Password for gmail becomes markup with a <mailPassGoog>yogurt</mailPassGoog>
I only need to remember yogurt.
Every device just gets a truncated service tag appended to the beginning and end using HTML style tags.
Suddenly you have a 26+ character password that you don’t forget and doesn’t compromise you across other services because each is different.
Most modern cancer drug treatment is sequenced to at least the specific proteins of the type of cancer it is.
Have breast cancer? Cool. We figure out which of the many variations so that we can give you medications for that exact type of breast cancer.
This sort of specific targeting has been increasing and increasing for the last 20 years. MRNA is the next step of that and is highly likely to be a means or become or for treatments in many other areas.
Sure it does, but that doesn’t make it bad.
Open source code is not the only solution to secure communication.
You can be extremely secure on closed source tools as well.
If they found specific issues with Signal aside from not being allowed to freely inspect their code base, I suspect we would be hearing about it. Instead I don’t see specific security failings just hat it didn’t make the measure for their security software audit.
As an example of something that is closed source and trusted:
The software used to load data and debug the F-35 fighter jet.
Pretty big problem for 16 countries if that isn’t secure… closed source. So much s you can’t even run tests against the device for loading data to the jet live. It’s a problem to sort out, but it’s an example of where highly important communication protocols are not open source and trusted by the governments of many countries.
If their particular standard here was open source, ok, but they didn’t do anything to assure the version they inspected would be the only version used. In fact every release from that basement pair of programmers could inadvertently have a flaw in it, which this committee would not be reviewing in the code base for its members of parliament.
Not being able to inspect their code vs no passing are different things.
From time immemorial, the purpose of a navy has been to influence, and sometimes decide, issues on land. This was so with the Greeks of antiquity; Romans, who created a navy to defeat Carthage; the Spanish, whose armada tried and failed to conquer England; and, most eminently, in the Atlantic and Pacific during two world wars. The sea has always given man in expensive transport and ease of communication over long distances. It has also provided concealment, because being over the horizon meant being out of sight and effectively beyond reach. The sea has supplied mobility, capability, and support throughout Western history, and those failing in the sea-power test -notably Alexander, Napoleon and Hitler - also failed the longevity one. - Edward L. Beach, in Keepers of the Sea
Who is we and deep into what?
I simply responded to your statement that you couldn’t think of a way to express the position without sounding as if you were against another people.
It feels very very simple.
The actions of those who cause harm to innocent people are deplorable. Those who order such actions or commit them, should be held accountable. I don’t have to say any proper nouns or even make it specific to this conflict to express that.
“I don’t want the response to horrific things to be more horrific things inflicted on those who have no control of these events.”
That seems pretty cut and dry…
hah, you think these trades are in a 3rd normal form database instead of unsorted excel sheets passed for nightly batch job settling transactions? Nahhhhh fam.
I work for one of the largest private investment firms in the world.
The scrutiny is something I understand well. We have a lot more thorough checks than his firm does. Real name, kids, spouse, girlfriend living in your house, parents, all part of the review process and more. Significant individuals as well as non-person entities you are tied to in any way.
You could, in theory, still get past it, but you would be doing a lot more money movement to do so.
The front running trades amounted to a total of 6% of all the personal trades he made in that period.
I think he was assuming, that inter dispersed in the group and traded in segments of the sums, it would be hard to dig through the mountain to spot the relationships to the company trades.
If you were alive in 1960s America, you would have seen no seat belts, significantly lower life expectancy, children still dying to smallpox and polio, and if you are ethnically from the Middle East; everyone in America would have hated you. Race riots were a massive thing in the 60s, police brutality was rampant against people of color. Even the FBI was trying to suppress race progress.
You have presidents for decades trying to create racist drug politics to entrap only non-white non-affluent people into cyclical prison systems.
You have so much hidden then, that happens today, but it was both hidden and far far greater.
The ideal doesn’t exist at all and more so for someone like yourself.