[-] user28282912@piefed.social 7 points 1 day ago* (last edited 1 day ago)

Based on the relationships he maintained, Ehud Barak, Robert Maxwell, and others ... Epstein having ties to the CIA is a given. People who have worked in the US Government understand how much Israel is embedded within the cyber/intel aspects of it. It is difficult know where US/Israel ends. Any intel agency would kill for the photos/videos that Epstein appears to have amassed with his VIP guests as they 'partied' with minors and each other.

[-] user28282912@piefed.social 39 points 1 day ago

The content produced by humans was scraped en-masse for the explicit purpose of training models which were then monetized into business products.

I struggle to reconcile that with Fair Use.

I can see if the source was EULA'd to remove all rights to what you post to things like Reddit, Stack Overflow, and if somehow those entities were contacted ahead of time and negotiated usage. You, I and the web server logs know that this was almost never the case.

27

Credit where credit is due.

Microsoft has started rolling out built-in Sysmon functionality to some Windows 11 systems enrolled in the Windows Insider program.

Sysmon may be somewhat unknown to those who aren't in cyber security circles but it can also be a useful diagnostic tool as well.

[-] user28282912@piefed.social 38 points 1 day ago

This project has never been more relevant in light of the recent acceleration of enshitification over at Microslop. Might be time to donate a few bucks.

[-] user28282912@piefed.social 4 points 1 day ago

It should but you can test that assumption by trying to ping any other device on the non-guest wifi. (and try ping in the other direction)

[-] user28282912@piefed.social 91 points 2 days ago

Do not, under any circumstances, conduct any private business on it. What isn't being logged by Microsoft and shared with your employer, advertisers, various governments will be screenshot'd every n seconds. Additionally, I highly suggest, if you haven't already, to setup a separate VLAN for this device if you ever bring it home and connect it to your home network. Defender absolutely does passive sniffing and active network scanning now. It will also be collecting and logging visible SSIDs as well. Enjoy!

[-] user28282912@piefed.social 31 points 2 days ago

So the thing with useful quantum computers is that if they ever do make it actually work and manage to scale it up, the first thing they will do is render most modern encryption obsolete over night. My guess is that Bluffdale has a mountain of encrypted data they'd start cracking immediately.

My cynicism can't allow me to think that we'd hear about it until years after that backlog is cleared and the NSA (and now by extension Israel and Russia) have backdoored any network of interested 10 times over.

The far more likely scenario is that this like stable/cold-ish Fusion, practical graphene, CRiSPER miracle cures are still way more theory than driveable cars at this point and for next several years at least. These folks just want more money and have to keep claiming they are close to get it.

[-] user28282912@piefed.social 34 points 2 days ago

Prolific cannibal promises to review their choice in seasonings to be more tactful as they continue to feast on PC users' privacy, freedom and last scraps of digital dignity on a global scale.

I am sure that this empty promise of change has everything to do with their user empathy and absolutely nothing to do with their recent financial results which indicated how hollow their AI-slop-bullshit revenue growth was last quarter.

[-] user28282912@piefed.social 1 points 2 days ago

Wireguard should be the default here. The rest is just networking configuration implemented in both routing and firewall. I never understood why people use Tailscale, like why would you intentionally pay someone to be man in the middle of your virtual private network? Twingate I am not familiar with.

[-] user28282912@piefed.social 6 points 3 days ago

OpenRC seems to work pretty seamlessly on Gentoo. Just throwing that out there.

[-] user28282912@piefed.social 9 points 6 days ago

So ... device attestation ... the same shit coming from Google, Microslop and others. At least Poettering is consistent with his shit ideation.

[-] user28282912@piefed.social 46 points 1 week ago

Except that Microsoft basically puts a gun to every users head to login with a Microsoft account which can/does backup the recovery keys.

view more: next ›

user28282912

0 post score
0 comment score
joined 1 month ago