|
Fiddler on the Roof - If I Were a Rich Man - YouTube
Quote: The most important men in town would come to fawn on me
They would ask me to advise them
Like a Solomon the Wise
"If you please, Reb Tevye..."
"Pardon me, Reb Tevye..."
Posing problems that would cross a rabbi's eyes
Ya-da-dee-da-da, Ya-da-dee-da
And it won't make one bit of difference if I answer right or wrong
When you're rich, they think you really know
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Peer-to-peer file sharing would make the Internet far more efficient "Another dimension, new galaxy. Intergalactic, planetary"
|
|
|
|
|
I don't see how IPFS deals with bad actors on the net. How does the receiver ensure that the content sent by the sender is identical to that published by the author?
Also IMO, one of the strengths touted for IPFS - its immunity to censorship - is also a weakness. As legal takedowns via the DMCA (or equivalent) would require sending a takedown order to every host containing a copy of the offending material, copyright infringement becomes impossible to enforce. No one can afford to sue everyone with a bootleg copy of a song / movie on their home computer; there are simply too many of them.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Daniel Pfeffer wrote: No one can afford to sue everyone with a bootleg copy of a song / movie on their home computer; there are simply too many of them. Do we bet that someone will come with the "idea" anyways?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Daniel Pfeffer wrote: No one can afford to sue everyone with a bootleg copy of a song / movie on their home computer; there are simply too many of them.
You had my curiosity, but now you have my attention.
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
And yet another step in the road to an Orwelian hellscape is paved via good intentions.
Because the govt, spyware advertisement complex, bigots looking for victims in specific groups to harass, etc would never abuse a platform were ordinary users are constantly broadcasting what content they're looking for to the entire internet and likewise responding to queries about if they've viewed specific content in the recent past.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
|
|
|
|
|
We propose a new framework for audio generation that learns to generate realistic speech and piano music by listening to audio only Then they came for recording artists and I did nothing as I'm not a fan of what's on the radio these days
|
|
|
|
|
Everyone jumped to cloud computing to save money but got the opposite. Cloud ROI will require optimization, finops, and refactoring before it lives up to past promises. Except for the cloud companies, of course
|
|
|
|
|
Kent Sharkey wrote: Everyone jumped to cloud computing to save money but got the opposite. And if the only issue was the more expensive than thought...
Is it here where we could say "we told you..."?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Meta’s VR social network Horizon Worlds — the company’s flagship “metaverse” app — is suffering from too many quality issues and even the team building it isn’t using it very much, according to internal memos obtained by The Verge. Because sometimes, dogfood is just fit for the dogs
|
|
|
|
|
Before committing your organization to an emerging technology or methodology, you should first determine its staying power. If you want to do it, it's a trend. If someone else wants to do it, it's a fad.
|
|
|
|
|
The Rust team is putting more resources into helping developers write code faster. Oxidize like the fancy folk
|
|
|
|
|
There may never be a "Year of the Linux desktop," but Canonical thinks there's room for a Ubuntu Linux business desktop. It's just like the regular Ubuntu, but with added nagging to send them money
"You get security patches not just for the operating system, but for all of Ubuntu's open-source applications for a decade. "
|
|
|
|
|
I wanted to loo smart and sassy saying that this is the year of Linux desktop but apparently ZDNet preempted me.
Linux has become such a joke. Worst part? It's starting to become as unpredictable as Widows in term of kernel loading and driver initialization.
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
Chrome might be the most popular browser in existence, but that doesn’t make it the most secure. I guess the Google security engineers need to spend more time looking in house before throwing stones?
By being the most popular, I would expect it to be under the heaviest attack.
|
|
|
|
|
It comes with built-in spyware and methods to track the user to fuel G's bottom line, what would you expect?
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
I find it interesting that MS-Edge, which is built on the same Chromium rendering engine has one third the vulnerabilities as Chrome. Compare this to Google's claim that Chromium Edge wasn't as secure as Chromium Chrome when Microsoft released Chromium Edge. Sounds like my response, "If Edge isn't secure then Chrome isn't secure." was prophetic.
|
|
|
|
|
Does edge really only have 1/3rd the vulnerabilities of Chrome, or do 2/3rds of the common vulns just not get reported to Edge or any of it's forks?
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
|
|
|
|
|
This is actually a good question. I suspect the answer is that the Chromium rendering engine is relatively bug free as it's used by several browsers now. It's the code around the rendering engine that's different for each browser and frankly, based on memory usage Google's is atrocious and bloated, which frequently translates into more bugs. These differences are why Google initially claimed that Edge wasn't as secure as Chrome because Edge doesn't use Google's security services.
The flip side of this is how many bugs in Edge are reported as bugs in the underlying Windows OS?
|
|
|
|
|
Celsius Exposes User Information in Public Court Docs - Blockworks
Quote: A filing submitted to court on Wednesday contains over 14,500 pages that include co-founders Alex Mashinsky, Dan Leon and Nuke Goldstein’s financial transactions. But it also lists customer names, date of transaction, type of account, which cryptoasset and how much of it was involved.
|
|
|
|
|
I can't see how secrecy could have been touted here. Celsius was subject to KYC (Know Your Customer) laws, so they had to vet all their customers. They wanted the names to be redacted from the documents that they filed with the court but were refused. The doxing is therefore the fault of KYC laws and the court.
The crypto crowd says this is a problem with CeFi (centralized finance), the model under which Celsius operated. DeFi (decentralized finance) is supposed to be immune to this. But even the names behind its anonymous "wallet" addresses can slowly be revealed by getting someone to disclose who they transacted with. This allows a growing network of transactions to be traced whenever another user in the skein can be coaxed into cooperating with investigators.
|
|
|
|
|
Blockchain is public. You are anonymous as long as nothing links a wallet to a person (orders, exchange, NFTs, whatever).
I'm following many investigations where scammers are getting caught due to the publicity of blockchain. Services like Torn***C*** (sorry but I won't explicitly advertise it) are well known money laundering services but the chances of them not being already infiltrated by public officials are slim. And as anybody who ever had to do with organized crime knows, it's better to do a large scale operation once because after that everyone would escape and lie low, wasting the cost of investigation.
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
modified 10-Oct-22 10:22am.
|
|
|
|
|
Low-code has many benefits, and they’ve been widely discussed in a number of articles here on SD Times, but one area in which they don’t really have an edge is security. Obvious statements are obvious
|
|
|
|
|
"Lower the drawbridge" code!
|
|
|
|
|
Low code means more security risks because the tools that build the code from models use the same algorithm and same codebase so a single vulnerability in the generated code will propagate to all products using that technology.
Many environment require strict (and expensive) validation procedures for every software version, massive product recalls and may have issues on no longer supported platforms. Low code on other systems (i.e. web pages) is even worse due to the lack of all of the above, leaving many sites lying around unsecured for ages until a massive data breach is discovered.
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|