[-] [email protected] 14 points 5 months ago

and one doesn't program GPUs with assembly (in the sense as it's used with CPUs)

[-] [email protected] 14 points 5 months ago

look, if we just rename it a bit harder, I’m sure we’ll get the promptfondler uptake that marketing had forecast. this can’t be an itanium situation, dave in sales assured me there’s a use!

[-] [email protected] 14 points 5 months ago

the word "commentariat" was invented too early, because it would be the absolute perfect choice with which to describe such posters

[-] [email protected] 14 points 8 months ago

behind the bastards has also recently done two episodes on the clown, if you want to learn more things you'll hate

[-] [email protected] 14 points 8 months ago

sammy boi is giving up on the pretense that any of this was about enriching lives, and is now only focusing on the eyegrab (archive)

anyone wanna take bets on how much pearlclutching surprisedpikachu we'll see

[-] [email protected] 14 points 8 months ago

imagine dropping into the takes lounge for techs, and instead pouting

but also holy fuck this is the second "waaaaaaah just you wait until you grow up" we've had recently, wtf. are the promptfans okay?

[-] [email protected] 14 points 8 months ago

I’ll take “comments posted with extremely definite and concrete knowledge of current operator spend and market dynamics” for 2c, Alex

[-] [email protected] 14 points 11 months ago

you know what

I'll do you the courtesy of an even mildly thorough response, despite the fact that this is not the place and that it's not my fucking job

one of the literal pillars of security intrusions/research/breakthroughs is in the field of exploiting side effects. as recently as 3 days ago there was some new stuff published about a fun and ridiculous way to do such things. and that kind of thing can be done in far more types of environments than you'd guess. people have managed large-scale intrusions/events by the simple matter of getting their hands on a teensy little fucking bit of string.

there are many ways this shit can be abused. and now I'm going to stop replying to this section, on which I've already said more than enough.

[-] [email protected] 14 points 11 months ago

so you start by claiming that you don't think there's any problematic security potential, follow it up by clarifying that you actually have no fucking understanding of how any of it could work and might matter, and then you get annoyed at the response? so rude, indeed!

[-] [email protected] 14 points 11 months ago

sure hope you're not in charge of security anywhere

[-] [email protected] 14 points 1 year ago

that probably got "strategically removed" for uhhhhhhh checks notes financial reasons

(read: almost certainly some execs made the call to get that nuked, because it didn't fit the narrative they're tried to sell)

[-] [email protected] 14 points 2 years ago

“with a device he purchased to help her out” is such an extremely load bearing sentence in there

The whole goddamn example is batshit, but that one really did it for me

It continues to amaze me these people are real

view more: ‹ prev next ›

froztbyte

0 post score
0 comment score
joined 2 years ago