

Oh no, my very sharp keys fell hard onto that screen, tragically cracking it.
Wait, that might look obvious from security cameras. I’m sure there’s a substance one could (accidentally) discreetly smear onto it that would destroy the display.

-credit to nedroid for strange art


Oh no, my very sharp keys fell hard onto that screen, tragically cracking it.
Wait, that might look obvious from security cameras. I’m sure there’s a substance one could (accidentally) discreetly smear onto it that would destroy the display.


Sorry you’re right, number MUST GO UP /s.
sigh.


Oh no. Anyway…
Make Windows 7 again (or just use Linux), ditch AI, value your users. Sack the CEO. Pretty simple.


Me too!


OK: dispatch tech workers to cut out every microphone, network antenna etc. on the vehicles before they’re sold to Canadians. If the vehicles don’t work with said things cut, ask some VERY hard questions of China as to why they have sent us defective merchandise to our country, and make them justify why these items need those bits to work.
Similarly, any MAC address, BLE device, LTE modem, etc. in Chinese EVs could be enumerated upon entry to the border, and blacklisted by Canadian ISPs and mobile providers so their traffic cannot leave our borders. There are a myriad of data exfiltration experts who could advise the government on how to protect against such things.
We can do this with our eyes open and play hardball. We don’t have to be rubes.
LLM showed its true nature, probabilistic bullshit generator that got caught in a strange attractor of some sort within its own matrix of lies.


The paranoid in me wonders though… can DRAM be backdoored? I’d bet ‘yes’, and this would be a perfect opening to introduce a huge amount of compromised hardware to the world market…


So what’s the floor here realistically, are they going to lower it to 30 days, then 14, then 2, then 1? Will we need to log in every morning and expect to refresh every damn site cert we connect to soon?
It is ignoring the elephant in the room – the central root CA system. What if that is ever compromised?
Certificate pinning was a good idea IMO, giving end-users control over trust without these top-down mandated cert update schedules. Don’t get me wrong, LetsEncrypt has done and is doing a great service within the current infrastructure we have, but …
I kind of wish we could just partition the entire internet into the current “commercial public internet” and a new (old, redux) “hobbyist private internet” where we didn’t have to assume every single god-damned connection was a hostile entity. I miss the comraderie, the shared vibe, the trust. Yeah I’m old.


I have a script that watches apache or caddy logs for poison link hits and a set of bot user agents, adding IPs to an ipset blacklist, blocking with iptables. I should polish it up for others to try. My list of unique IPs is well over 10k in just a few days.
git repos seem to be real bait for these damn AI scrapers.
Good point. Mechanical means are safest and simplest.