Online sovereign citizen?
Lath
- 0 Posts
- 55 Comments
Lath@kbin.socialto Technology@lemmy.ml•China invents most powerful detonation engine for hypersonic flight4·1 year agoAerodynamics.
Lath@kbin.socialto Privacy@lemmy.ml•Office 365 asking for permissions to change browser settings31·1 year agoMakes bing your default search engine.
Lath@kbin.socialto Privacy@lemmy.ml•Office 365 asking for permissions to change browser settings21·1 year agodeleted by creator
Lath@kbin.socialto Asklemmy@lemmy.ml•Often we say infinite growth (capitalism) is not sustainable and reasonable. Can we also say infinite progressivism is also not sustainable and reasonable?2·1 year agoAny limitations we have are either created by available resources or self-imposed.
I believe humans as a whole are willing to do anything and everything in every possible way.
Lath@kbin.socialtoI only need two buttons, CTRL-C + CTRL-V@lemmy.ml•*Permanently Deleted*31·1 year agoIt’s called Git Hub, so it’s a hub made by gits for gits. So if you ain’t a git, git out!
Lath@kbin.socialto Asklemmy@lemmy.ml•If you could split yourself into a copy of yourself, how many copies would you make to satisfy all your wishes?4·1 year agoWe’re all copies of each other and memory sync isn’t that far away. But it comes with ads.
Lath@kbin.socialto Asklemmy@lemmy.ml•Do you often hear the ringing of switching power supplies and devices when you are in a quiet space?5·1 year agoUgh. Now you got me thinking about hearing my heart beats.
Lath@kbin.socialto Asklemmy@lemmy.ml•Was the allegations against michael jackson ever proven right or wrong ?1262·1 year agoNothing proven. Much documentary about it though.
There’s a vine/TikTok dude that made a short about it somewhat recently in a shallow and humorous fashion.
Basically, the Jackson dad was an asshole who beat his kids. Michael being the most successful one got the worst of it, as per the documentary. Not sure if his brothers covered him and how often.
He didn’t have a childhood, he had beatings, training and concerts.
His soft-spoken voice was beaten into him, only allowed to use his full voice for singing.
His Neverland was built for that which he never had and he tried to give that to other children he felt were like him.
Whether something happened is only known by the the people involved, but odds are that unless Michael himself was molested as a child, it’s far more likely that he was deeply traumatized, cried himself to sleep and had recurring night terrors.I’ll repeat, only the people involved know what happened and they’re not talking.
It definitely will. Past CSAM spam used abandoned or ignored instances to smuggle into the larger ones.
When you build something yourself, you also become responsible for what goes through it.
Lath@kbin.socialto Privacy@lemmy.ml•How to constructively protest against AI voice transcription at work?20·1 year agoDunno, maybe collect the news of every private digital data leak in recent years and show how unsafe it really is?
Lath@kbin.socialto Privacy@lemmy.ml•Anyone else noticing a lot more "Access Denied" pages while using hardened Firefox lately?2·1 year agoCloudflare says it’s not them, but the website owners using custom settings or malware taking over websites and posing as cloudflare.
Yea, but he’s really passionate about it.
Lath@kbin.socialto Privacy@lemmy.ml•A perfectly normal warning on Instagram. KOSA is going to be perfectly fine... 🔥🔥🐶☕🔥🔥311·1 year agoThat’s what you get for all the teabagging you’ve been doing…
Lath@kbin.socialto Linux@lemmy.ml•Use work laptop as personal device by dual booting on a separate internal drive?24·1 year agoExcuse my lack of cybersex knowledge, but if you plug in an infected appendage to a hub, then can’t that hub become infected as well and pass along the STI to any other appendage plugged in?
Far as I remember, wearing a condom isn’t a guaranteed protection against infections.
Lath@kbin.socialto Asklemmy@lemmy.ml•Am I the only software engineer greatly worried and disturbed by AI ?61·1 year agoIf you are, it should be due to working for the wrong people. Those that don’t understand what’s what and only seek profit religiously.
Thanks for the readable code though.
Lath@kbin.socialto Linux@lemmy.ml•Use work laptop as personal device by dual booting on a separate internal drive?82·1 year agoOne doesn’t need to work in cybersec to know that the vast majority of attacks work because the targeted users have personal dum-dum moments.
Lath@kbin.socialto Gaming@beehaw.org•Weekly “What are you playing” Thread || Week of February 4th4·1 year agoXCOM: Enemy Within. Finished a game over two days because everyone kept missing their attacks, even the planes. Even the enemies.
Gonna do a second wave marathon and then maybe move on to XCOM 2.
I believe it uses your browser history to gauge your interests and bases its responses partly on the type of stuff you participate in repeatedly.
So if for example you browse websites related to privacy more than anything else, it takes that into account and gets all creepy about it.