Sparkega

joined 2 years ago
[–] Sparkega 2 points 4 days ago
[–] Sparkega 7 points 5 days ago

Thank you for your contributions! Your work makes it easy to stay informed.

[–] Sparkega 12 points 6 days ago

Oh no, the wrong people are dying.

/s

 

Defense Secretary Pete Hegseth last week ordered U.S. Cyber Command to stand down from all planning against Russia, including offensive digital actions, according to three people familiar with the matter.

The exact duration of Hegseth’s order is unknown, though the command has been told the guidance will last for the foreseeable future, according to sources.

Russia is a bastion for cybercrime, with state-linked and criminal ransomware actors striking targets around the globe. The command has become a key player in countering the malicious activity.

Outside of internal challenges, the order could derail some of the command’s most high-profile missions involving a top U.S. digital adversary, including in Ukraine.

[–] Sparkega 9 points 1 week ago (1 children)

I hear you. Last August I prepaid for two years and now I regret it. I'm just going to ride it out since I can't afford to switch.

[–] Sparkega 12 points 1 week ago* (last edited 1 week ago) (23 children)

What are the typical beliefs of the Christian Democratic Union (CDU) / Christian Social Union (CSU)?

[–] Sparkega 17 points 2 weeks ago (2 children)

If y'all get a chance, try Navajo Tacos.

[–] Sparkega 3 points 2 weeks ago

Fair enough. I tried HeliBoard because it was recommended and stuck with it. I don't use voice to text, but got swipe texting to work on HeliBoard

[–] Sparkega 6 points 2 weeks ago (3 children)

What are your thoughts on HeliBoard compared to FUTO?

[–] Sparkega 3 points 2 weeks ago (2 children)

Try Molly instead which is a hardened fork of Signal. Molly uses the same servers and is transparent to the operator.

You can install Molly through F-Droid or Accrescent.

[–] Sparkega 36 points 2 weeks ago (5 children)

In depth review validating the credibility of Signal's encryption by a Security Engineer who specializes in encryption.

Reviewing the Cryptography Used by Signal by Soatok

The bottom line was in total, no vulnerabilities were found.

331
Over It Rule (sh.itjust.works)
submitted 3 months ago by Sparkega to c/[email protected]
 
173
Tomorrow (sh.itjust.works)
submitted 10 months ago by Sparkega to c/[email protected]
 
19
Video Archive (self.tomscott)
 

Sorry to hear Tom isn't making videos anymore. Anyone know about an archive of his videos available for downloading for later viewing and archiving?

 

I should have known if the apps free, you're the product. Duolingo appears to harvest the most data compared to other language learning apps.

Source: Surfshark Research

53
Long Resting (self.baldurs_gate_3)
 

I've never played D&D and I'm getting into BG3. I must be marathoning my characters cause I'm usually out of spells when I run into fights. My useful exploration spells also cost spell slots so I'm usually proceeding with cantrips for my adventures until I decide I really need to recharge.

How often is everyone else going through a long rest? I know there's a trade off of consuming camp supplies and so maybe I'm just the guy who saves all the items for end game and never ends up using them.

14
submitted 2 years ago* (last edited 2 years ago) by Sparkega to c/cybersecurity
 

Researchers analyzed 190 million hacking events on a honeynet and categorized the types of hackers into Dungeons and Dragons classses.

Rangers evaluate the system and set conditions for a follow-on attack.

Thieves install cryptominers and other profiteering software.

Barbarians attempt to brute force their way into adjacent systems.

Wizards connect the newly compromised system to a previous to establish 'portals' to tunnel through to obscure their identity.

Bards have no apparent hacking skill and likely purchase or otherwise acquire access. They perform basic computer tasks.

view more: next ›