![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
Super Thunder Blade did this, same era too.
Super Thunder Blade did this, same era too.
Could a hypothetical attacker not just get you to visit a webpage, or an image embedded in another, or even a speculatively loaded URL by your browser. Then from the v6 address of the connection, directly attack that address hoping for a misconfiguration of your router (which is probable, as most of them are in the dumbest ways)
Vs v4, where the attacker just sees either your routers IP address (and then has to hope the router has a vulnerability or a port forward) or increasingly gets the IP address of the CGNAT block which might have another 1000 routers behind it.
Unless you’re aggressively rotating through your v6 address space, you’ve now given advertisers and data brokers a pretty accurate unique identifier of you. A much more prevalent “attack” vector.
If you still do the sizing (it’s not entirely wasted as it’s a reasonably effective tool to gauge understanding across the team), This can still be done without the artificial time boxing.
“How much work have we done in the last two weeks?” Just look at all the stories closed in the last two weeks. Easy.
“When will X be delivered?” Look at X and all its dependencies, add up all the points, and guesstimate the time equivalence.
Kanban isn’t a free for all, you still need structure and some planning. But you take most of that away from the do-ers and let them do what they do best… do.
They were first to market with a decent GPGPU toolkit (CUDA) which built them a pretty sizeable userbase.
Then when competitors caught up, they made it as hard as possible to transition away from their ecosystem.
Like Apple, but worse.
I guess they learned from their Gaming heyday that not controlling the abstraction layer (eg OpenGL, DirectX, etc) means they can’t do lock in.
While suing everyone else that makes shovel handles that work with your shovel heads.
Problem then is, You Still gotta buy a truck to buy and haul your 2nd motorcycle, your 3rd motorcycle, your dirt bike, and your track bike.
Yes, this link has been disabled as per (dumb) organisation policy.
Ok. Did a quick read. And I think I mixed my words a little.
Yes, Active Directory supports TOTP fine.
But my understanding is rollouts can disable TOTP, and instead force the use of the proprietary scheme requiring the MS Authenticator app (which also supports TOTP) that uses push notifications to the device.
As is the case with my employer. They didn’t enable TOTP, and I am unable to use the provided MFA QR code with 1Password.
Afaik, Microsoft’s OTP implementation is proprietary and not TOTP.
But also, my understanding is you can select which MFA schemes you can use, and allow SMS, MS MFA, and TOTP.
Source: employer used to allow sms, locked it down, and totp apps can’t parse the MS authenticator QR codes.
Alternate headline:
Companies accept money for a thing that will happen anyway, and will be unable to prove if they say no.
GenAi is unfortunately here, and the technocracy wants you to want it so they can farm you for more and more intimate data to leverage and enforce their technocracy. And the only way they’re going to do it is by keeping the press positive, and feed it more and more data in the hopes it fixes things.
I was expecting some sort of “Ai discovers new bug in 30 year old software”… cool I’m excited.
Then they were talking about how the bug was persistent, and I’m more intrigued “is the bug some weird emergent behaviour corrupting state somewhere?”
Nope, just another example of a shit in shit out data model.
I thought everyone decided “jfgi” in online discourse was a toxic years ago. It’s the same attitude as :
chemtrails make you sick!
How so?
go do your own research
If you’re going report on something, provide a little more information than just “no”. It’s more helpful, better for the community, and in 5 years time when the facts are different, there’ll still be a reference of what was factual in the past.
How long until it’s revealed they’re being driven by 1000 Indians like we recently did with Amazons “staffless” stores
My brother behaves weird with Linux (fedora 39 silverblue).
When doing multiple copies of double sided printing, it’ll print [1|2] [1|1] [2|2] [1|1] [2|2] and then repeat until you realise you now have onen copy of what you want and 10 pages of one side, and 10 pages of the other side.
It’ll also randomly refuse jobs, and then print them 30 minutes later (lmao if you printed multiple copies, gave up and went for a walk)
My Panasonic I replaced it with was better, but you had to download binary blobs to make it work.
But, Linux has gotten more and more complicated in the last 20 years I really can’t be fucked working out if it’s the printer, cups, flatpacks, the app that’s printing, or all of the above.
Now I just email myself a PDF and print from my phone. Fucking stupid but it works.
There are still servers?!
Do state cases stay state cases?
Could “someone” leak some evidence that would make the case a federal one, and then pardon himself?
The host was stable. And I was compiling the kernel for hardware and vfio reasons anyway, so why not compile everything and it’s not like there was a lot to compile.
Because you’re only ‘exposing’ the port on the peer to peer network.
You “publish” a port to holesail, then clients have to create a local proxy via holesail before they can access it.
I agree, It’s a dumb pointless claim. But I don’t think it’s misleading.
It looks like holesail is just tailscale, but on a much smaller scale. It’s not networks, it’s just ports.