• 0 Posts
  • 15 Comments
Joined 2 months ago
cake
Cake day: August 2nd, 2025

help-circle
  • No.

    It really doesn’t have much to do with their biology tbh, it’s because nobody I’ve ever met who is trans ever shuts the fuck up about being trans.

    Be a man or a woman, gay, fucking whatever. I really don’t care. Like at all. But I find vanity and self absorption huge turnoffs.

    If you want to make your entire identity a single thing I again have no issue with it but I also wont want to be around you.

    I dont have a problem with you. I just dont want to stand around beating a dead horse over and over and over again.

    Also a penis is a straight up non starter. Everything to do with dudes gives me the ick.



  • You’re looking at it from a business perspective which is valid but the resources available to the average person to prevent and / or mitigate a realm threat are virtually nonexistent.

    Up until now it’s made no sense to target Joe Schmoe or his neighbours what happens when a state sponsored threat actor decides to burn it all down, or someone decides to start targeting the average person rn Massé with malicious ai?

    It’s not a big deal on a case by case basis but almost no cybersecurity company will help out an individual unless they’re rich, the police are brain dead.




  • krunklom@lemmy.ziptoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    59
    arrow-down
    1
    ·
    11 days ago

    The laissez faire attitude most tech companies, non tech companies, and people, have towards cyber security is a ticking fucking time bomb.

    This isn’t 1990. Everything relies on technology. I can’t help but feel that we are headed towards a clusterfuck the likes of which has never been seen before.










  • With the caveat that I haven’t read how google is implementing this I can provide some high level context on how hashes work from a security perspective.

    Anyone else feel free to correct anything I get wrong here.

    So, once upon a time someone came up with something called md5 for encrypting things. This didn’t end up being a very effective way of encrypting files, but people did find that encrypting files this way was a great way to predictably create a value that would be unique to that specific file.

    So if you take an md5 hash of a .txt files with “goat testicles” in it, called goats.txt, and someone sends you a file called goats.txt, you should be able to take an md5 hash of the file before opening it, and if they match up they’re the same file. If someone adds a “z” to the end of goats.txt the md5 hash will change so you’ll know it’s not the same file.