Pro tip: If you find large mysterious eggs on a derelict space ship, ALWAYS inspect them very closely. They tend to contain some really cool stuff. Mind-blowing, transcendental best stuff ever. I’m talking, like, way too legit to be legit, feel me? If you see movement inside, be sure to place your head close to the top of the egg. You should try to smell the egg or even give it a lick.

  • 0 Posts
  • 97 Comments
Joined 2 years ago
cake
Cake day: May 19th, 2024

help-circle
  • Let’s say you put some slow burning rocket fuel in there, and it ignites one day. The inside of the safe will probably melt, smoke will ruin your entire house, but it shouldn’t burn down the whole thing.

    Actually, this brings up an interesting alternate use for an old safe like that. If your old fireproof safe is broken, or you lost the key or whatever, you could turn it into a fireplace of sorts. Just flip it the door side up, throw in some logs and a place a large pan on top. May look a bit ghetto style, but who cares as long as the wok veggies and meat taste good.











  • It’s well known that brooms are the pinnacle of cybersecurity among cleaning tools! Every smart device is a potential target for hackers, while these dumb tools stand as an impenetrable fortress. Forget about remote hacking; the only way to breach a broom’s defences is with good old-fashioned physical access and a hacksaw. As long as you keep your brooms locked up tight, nobody will be hacking them. Better yet, being 100% software-free, there’s no pesky malware or bloatware either. Brooms also take wireless security very seriously. No hardware kill switches are needed when there’s zero communication in either direction.


  • This is why it’s important to sit down and write a document titled “my threat model, 2026”. OP should figure out what they’re really worried about, how important it is, and what are they willing to sacrifice. Once that’s done, it’s easy to start putting that philosophy into practice.




  • TranquilTurbulence@lemmy.ziptoPrivacy@lemmy.mlCareer and privacy
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    6 months ago

    When they ask to see your ID, they probably also define exactly which parts of the it they want to see. If you choose to comply, you could still cover everything else from the ID card.

    Ideally though, you would tell them where they can shove these requests. In reality, avoiding LI is getting a bit hard.



  • Some people have managed to diversify their income, but a hefty chunk still comes from ad money. That income is also wildly unpredictable, so it really makes economic sense to diversify. Being entirely dependent on a single source puts your business in a very precarious position. If your company fails as a result, it’s just bad strategy. On the other hand, you could also blame YT for being unpredictable, wild and turbulent.

    The way I see it, the core of the problem is economic. Making videos takes money. Storage and bandwidth cost something too, so doing this on a small scale won’t make much sense.

    There are a few medium scale platforms like Nebula, and they seem to be doing just fine. IMO those platforms are the way to go.



  • However, iOS does have a ridiculous degree of sandboxing and restrictions, which sounds familiar to those who have looked into Manifest V3. An iPhone isn’t really a pocket computer any more, because there’s hardly anything you can do with it. Like, browse Xitter, have ads shoved down your throat, and pay Apple for the opportunity to suffer maximum enshittification.

    If you can come up with an application so gutted that it actually runs in spite of Manifest V3 shenanigans, there’s a chance that it might also run on iOS. Turns out, UBOL does, which is really impressive considering how hostile this software environment is.

    Why go through all this trouble? The people at UBO really want to block ads everywhere, even on platforms that are actively fighting against ad blocking.