Migrated account from @CosmicTurtle@lemmy.world

  • 3 Posts
  • 271 Comments
Joined 1 year ago
cake
Cake day: April 9th, 2024

help-circle



  • I’ve met these women. They aren’t stupid, per se. They don’t want to “think”. They just want to live their simple life, doing whatever their husband or kids want.

    They don’t want to think about the world. Just their world.

    But think about this for a second.

    It’s the conservative mindset: “The world doesn’t affect ME so why should I care? I’m not being oppressed so everything is fine!”



  • When you’re discussing your own OPSEC (Operational Security for those unaware), you have to evaluate and determine your personal threat profile. Generally speaking, you need to determine what risks you’re willing to accept, what risks you’re willing to mitigate, and what risks you will not tolerate. There’s a whole field of IT dedicated to this but the general idea is for you to understand that there is no perfect solution and everything is a trade off.

    There is an inherent risk to downloading pirated software, especially software that you use for private activities (e.g. finances, etc.). With today’s landscape of mining crypto, I’d go so far as to say almost any pirated software is at risk of this.

    I would agree that generally playing media files is relatively low risk (though there was a vulnerability I read about a few years back of a zip-type attack. The details allude me at the moment).

    But for executables, you basically have two options:

    • spin up a VM to host your executable, sandboxing it from everything else.
    • trust the people who are providing the executable and run it on your computer

    Personally, I avoid pirated executables. More often than not I can find a similar open source product that I can download. My risk tolerance is not only low, but I don’t see the benefits of using a particular company’s software especially if an open source is available.










  • CosmicTurtle0@lemmy.dbzer0.comtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    109
    arrow-down
    2
    ·
    8 days ago

    Which…is absolutely wild. The government should absolutely be funding vulnerability research. If anything so that they can exploit them.

    But I suspect they are taking the corporate approach. The foundation is going to do the research anyway and publish it widely. Just take advantage while adding nothing of value in return.

    God I hate this fucking timeline.