VCs complaining about secure document sharing are essentially saying "I am totally pwned, so send me and who pwned me all your confidential data pls"
A flaw in Sudo—that comes installed on almost every #Linux OS—could let users run commands as "root" even when they're restricted.
How? Just by specifying user ID "-1" or "4294967295" in the command instead of the root.
now THIS is my kind of Python book. apologies to the fine folks at O'Reilly. 😂
@freakazoid This particular issue is still going through responsible disclosure, so it's not publicly known.
Oh fuck me.
One of the most popular "whole home WiFi" systems is fucked from start to finish.
This is unbelievably bad.
«No information contained on any server located w/in China will be exempted […] No communication from/to China will be exempted. [N]o secrets. No VPNs. No private or encrypted messages. No anonymous online accounts. No trade secrets. No confidential data»
I think more people need to head over to @[email protected]'s media feed to binge watch all of her silly dev story musical parodies.
Neat to see the cost of a bug broken down like this! Solid first edition of @[email protected]'s new newsletter, curated by @[email protected] https://cloudfour.com/thinks/an-html-attribute-potentially-worth-4-4m-to-chipotle/?utm_source=Iterable&utm_medium=email&utm_campaign=the-overflow-newsletter&utm_content=10-04-19
SRS TALK: I get really sick of 'core' gamers and media outlets atempting to paint the motion control era as a colossal mistake that produced games no-one ever had fun playing.
The millions whose first gaming moments were a DS, Wii or a phone had just as valid an eiphany as you.
Ken Thompson's Unix Password - https://leahneukirchen.org/blog/archive/2019/10/ken-thompson-s-unix-password.html
How can I explain privilege? 🤔
My dad owned an arcade. When I came in the manager flipped a switch so I had unlimited Ms Pac-Man lives
I thought this was normal. I had no idea other kids had to pay ¯\_(ツ)_/¯
I got fairly good at the game, better than most
The influence of drug-induced #synesthesia on the work of writers from Keats and Coleridge to Poe and Baudelaire: https://thereader.mitpress.mit.edu/exploring-drug-induced-synesthesia/
Nothing new here. I always lead with the “myth of zero risk!” But just because you can’t eliminate all risk doesn’t mean you don’t make every effort to reduce the risk by using strong de-identification protocols, combined with a risk of re-Id framework. Let’s get past this! https://twitter.com/privacycdn/status/1181166050622218240
Broke: Hacking people to scare them to make news
Woke: Hacking people to encourage good habits to make news
I don't know for sure, but I suspect it's because of how movies and TV were traditionally experienced.
Movies were like traditional plays, experienced in a theater, and the terminology of being *in* a play was probably borrowed.
Television was different, actors were seen on the screen but it was obvious that they weren't inside it, just visible *on* the surface.
A year 10 student came in Monday morning not knowing what complex numbers were.
Monday: complex numbers, vectors, matrices, tensor products
Tuesday: entanglement, circuits, Deutsch–Jozsa
Wednesday: implementing Deutsch–Jozsa and using LaTeX
On Friday he hands me 4 pages!
Hardware & Software Development • Rapid Prototyping • Embedded Systems
Social.Rights.Ninja is a small Mastodon instance for those looking for a quiet home-base from which to explore the fediverse. Please email [email protected] for information on getting an invite.