• 0 Posts
  • 25 Comments
Joined 3 years ago
cake
Cake day: August 16th, 2023

help-circle

  • Sounds like you consume useful information. I wager she uses socials as many: to compare herself to others, perusing a mix of ego-affirming and ego-damning content. These are powerful emotional hooks and oscillating between those states can be confounding. Add a dash of fatalism, which is not hard to come by in this culture, when at a low, and I think it easy to see how one might capitulate.

    There are a lot of people out there that think their personality traits are inherent and that their physical attributes are static. In fact, my brother was one of these people. He passed away at 40 years old due to morbid obesity. I attribute his downfall to capitulation by way of comparison. He came to think the hole was too big and that his genetics were too poor to make changes, despite me providing an example to the contrary. Sadly, my parents fanned the flames of his dissonance with their own identity-bound delusions.

    So, my guess is that you have developed a healthy personal philosophy and have not surrounded yourself with the type of people or digital content that renders that philosophy dissonant.



  • This post motivated me to check in on minetest and its various games. I fired up a mineclonia world. First time I’ve played a minecraft-like game in some years, and I’m happy to report that it’s quite good, especially with controls mapped to my steam controller.

    I think I might even start hosting a persistent server.

    Also, fuck Microsoft. I had tried to transfer my Mojang account back in the day only to be met with various obscure errors. Never managed to get it to work.












  • thax@lemmy.dbzer0.comtoTechnology@lemmy.worldPlex got hacked.
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    7 months ago

    It matters if someone manages to hide an exploit in jellyfin’s codebase, or more likely, a popular plugin. I imagine many folk have permissive outgoing firewall rules, in which case, an exploit could establish connectivity. Whether that eventually leads to privilege escalation on the jellyfin host would depend upon other variables.

    edit: I should add that I’ve not used jellyfin and am unfamiliar with how plugins are implemented. I don’t want to speak out of turn, only to suggest, in the abstract, that just because software isn’t exposed to the net, doesn’t mean it cannot harbor exploits that could become problematic. And, plugins are a common vector.