• 0 Posts
  • 18 Comments
Joined 2 years ago
cake
Cake day: December 25th, 2023

help-circle
  • In the sense of okhams razor it’s also possible that you’re just more sensibilized to the term.

    It would be a fun experiment to next time first check YouTube before looking it up elsewhere, just to eliminate the chance that the information vector is before the search.

    From there then come various other possibilities (from behaviour based prediction to Lemmy profe linking).

    Just to widen the search area!


  • I can’t argue about the historic relevance; The article you linked is from 2020, the issues from early 2019. The original matrix developing company seems to have deep ties as described, yes.

    But:

    If you follow the very first link I. The article you can read the history of the matrix protocol itself. It shows where and when the matrix protocol was separated from this company and what the status quo seems to be:

    https://en.m.wikipedia.org/wiki/Matrix_(protocol)#History

    From this it seems clear to me that the information from this article are by now obviously outdated with KDE and Mozilla two big mentioned community projects that are involved.

    Wikipedia as primary source is not well suited, but the fact that the article linked to it themselves seem to show that they relied on the back then status quo.

    In short: in 2017 they would be absolutely right, in 2020 there were still huge issues - but by now those are mostly addressed or are unknown.




  • I see your point but there is one major difference between adults and children: adults are by default fully responsible for themselves z children are not.

    As for your question: I won’t blame the parents here in the slightest because they will likely put more than enough blame on themselves. Instead I’ll try to keep it general:

    Independent of technology, what a parent can do is learn behavior and communication patterns that can be signs of mental illness.

    That’s independent of the technology.

    This is a big task because the border between normal puberty and behavior that warrants action is slim to non-existent.

    Overall I wish for way better education for parents both in terms of age appropriate patterns as well as what kind of help is available to them depending on their country and culture.


  • The first part is a technical question and the second part a definition one.

    For the how to: the most common approach is to simply blacklist their IPs on a provider basis. This leads to no provider that obeys your blacklists to allow their users traffic to that target. Usually all providers in a nation obey that nations law (I assume, I only know that for my own :D)

    For the censorship: I don’t like that word because it’s implications fan be used against any and all laws. A shitload of content is made inaccessible because it breaks laws from active coordination of attacks to human trafficking. All of this can be described as censorship.

    Forthe UK law it’s… I’m not British and to me it appears to be a vague tool to silence and control all types of content under the guise of protecting children. Not with the intention to protect or prevent something but with the intent to control. I would fully understand and emphasize with using the word censorship in this context.




  • I really don’t enjoy Linus’ content without context I have to admit.

    He was an absolute dipshit back then and he’s one of the few people I’ve read about who not only acknowledged that but also put effort into changing it - and succeeded.

    Yeah the newer mails are not as funny to third parties anymore but I’m really happy for him and especially the kernel devs around him.



  • Because a security engineer focused on cloud would rightfully say “pod security is not my issue, I’m focused on protecting the rest of our world from each pod itself.”. With AWS as example: If they then analyze the IAM role structures and to deep into where the pod runs (e.g. shared ec2 vs eks) etc. then it would just be a matter of different focus.

    Cloud security is focused on the infrastructure - looks like you’re looking for a security engineer focused on the dev side.

    If they bring neither to the table then I’m with you - but I don’t see how “the cloud” is at fault here… especially for security the world as full of “following the script” people long before cloud was a thing.




  • You got a lot of relevant answers so I want to point out something else:

    You’re hosting your own services. By yourself. Fuck everyone with a broom who tries to gatekeep that. And I don’t mean wooden side first.

    Seriously, your question is on point here from my perspective and as long as it has a connection to running services by your own I personally would love more diversity in hosting solutions.

    Personally, I’d love to see people share more about their provider agnostic opentofu deployment or someone who went all in on AWS lambdas for weird stuff.