Gresham's Law
Anti-Imperialist/Scientism/Atheist/Marxist-Leninist/Intersectionality
“War is what happens when language fails”
- Your Voice Matter
#He Him/She Her/They Them
- 2 Posts
- 21 Comments
Cut throat environments!
A. Device part of a business infrastructure:
Just don’t change anything; those policy are there for a reason!B. Consumer device:
1/ If we’re talking about proprietary hardware/software forcing your network to use a specific DNS, then you need to provide more details because you should be able to change it.2/ There is also the case for a malware:
A fresh start is preferable.
Disinfect the system while offline, then back up the needed files.
Reinstall the system on a new/old formatted drive.
With the exception of taking your privacy/security seriously this time.
Gresham's Law@lemmy.mlto Socialism@lemmy.ml•The super wealthy have their own exclusive versions of Amazon, Tinder and Instagram271·2 years agoPlease don’t share corporate media, it’s a pitfall they want individuals like you & me to use those platforms to sell ourselves.
Gresham's Law@lemmy.mlOPto Privacy@lemmy.ml•So, Neuralink got FDA approval for human trials, and a certain fanbase is VERY excited about that4·2 years agoThey’re constructed hierarchy not natural (That hints that someone didn’t want to be the fuckup alone & created a destructive system for everyone) otherwise we would be living in a socialist utopia.
I invite everyone to listen to this episode, The history of humanity with Christopher Knight https://www.historicly.net/p/the-history-of-humanity-with-christopher
Gresham's Law@lemmy.mlto Linux@lemmy.ml•I Compiled the Linux Kernel myself for the first timeEnglish14·2 years agoI hope it was in an airgapped environment.
Gresham's Law@lemmy.mlto Privacy@lemmy.ml•Mozilla opposes Web Integrity API proposalEnglish121·2 years agoMozilla opposes a proposal because it goes against their principles and vision for the Web.
They believe that any browser, server, or publisher that follows common standards should be considered part of the Web.
Standards are designed to be independent of specific hardware or software, allowing for a wide range of devices, operating systems, and browsers to access the Web.
This diversity of choices promotes accessibility and overcomes personal obstacles.
Mechanisms that restrict these choices harm the openness of the Web and are not beneficial for users.The proposal’s use cases rely on the ability to detect non-human traffic, which could hinder assistive technologies, automatic testing, and archiving and search engine spiders.
These tools require access to content intended for humans in order to transform, test, index, and summarize it.
The proposed safeguards are unlikely to be effective and fail to address these concerns adequately.Mozilla acknowledges the importance of addressing fraud and invalid traffic but finds the proposal lacking in practical progress for the listed use cases and highlights clear downsides to its adoption.
Credit: https://chatbot.theb.ai/ just another version of https://chat.openai.com/ without the need to sign-up.
Gresham's Law@lemmy.mlto Technology@lemmy.ml•Musk rushes out new Twitter logo—it’s just an X that someone tweeted at himEnglish1·2 years ago“Someone tweeted at him” Narrative built for liability reasons.
It’s a crucifix to taunt the masses due to how powerless we are against the elites and their pawns.
For more contexts: St. Andrew’s Cross or the Saltire Cross.
Gresham's Law@lemmy.mlto Technology@lemmy.ml•Musk rushes out new Twitter logo—it’s just an X that someone tweeted at himEnglish6·2 years agoNarrative built for liability reasons.
It’s a crucifix to taunt the masses due to how powerless we are against the elites and their pawns.
For more contexts: St. Andrew’s Cross or the Saltire Cross.
Gresham's Law@lemmy.mlto Green - An environmentalist community @lemmy.ml•/c/green Weekly Discussion Thread 24th July - 30th July: Share your thoughts on environmentalism, gardening, nature observations, etc.English62·2 years agoSo much for green while supporting unsustainability with Microsoft closed source products (Yeah there’s apple too, giving that one the benefits of the doubts for now), plus the addiction industry of processed food and sugar & nootropics.
That’s object-oriented neural programming, stereotypical with corporate advertisements.
Gresham's Law@lemmy.mlto Privacy@lemmy.ml•The official chat room for a privacy community is discord?4·2 years agoThere are plenty already, why not a joint?
More solidarity/less division would be nice but it doesn’t mean that some individuals wouldn’t need to prove themselves to the tasks.
Without accountability it’s moot but it’s not like it’s possible with the current technological advancements & as always they create a hierarchy about fucking everything.
Pretty sure you’re describing most if not all the developer’s demographics, coding can always be optimized.
The same goes for a lot of things we do in life (Productivity).
Gresham's Law@lemmy.mlto Privacy@lemmy.ml•Encrypt Your DNS (STOP Your ISP SNOOPING!) - Naomi Brockwell2·2 years agoHave you read the pfSense documentation, you do need a set of compatible hardware so the firewall becomes functional:
The best way to ensure that hardware is compatible with pfSense software is to buy hardware from the Netgate Store that has been tested and known to work well with pfSense software. The hardware in the store is tested with each release of pfSense software and is tuned for optimal performance.
For home-built solutions, the FreeBSD Hardware Notes for the FreeBSD version used in a given build of pfSense software is the best resource for determining hardware compatibility. pfSense software version 2.6.0-RELEASE is based on 12.3-STABLE@ef1e43df92c6. Another good resource is the Hardware section of the FreeBSD FAQ.
At some point I was doing it each 2 weeks due to the inability to secure it, another OS though that I rather stay nameless. It May or may not start with the character W.
Gresham's Law@lemmy.mlto GNU+Linux Humor@lemmy.ml•The *nix Compass (originally posted on r/linuxmemes)English1·2 years agoTypo!
Gresham's Law@lemmy.mlto Technology@lemmy.ml•LastPass users locked out (again) with infinite 2FA loop13·2 years agoThe irony is lost on me, how about using KeePass
Gresham's Law@lemmy.mlto Fediverse@lemmy.ml•How to Kill a Decentralised Network (such as the Fediverse)English2·2 years agoIt’s premeditated, the “Drama” is used as a scapegoat & a precursor (Divide & disintegrate).
Typical tactics with conservative & neoliberal thrive on Repression/Regression/Chaos/Disorder (We’re dealing with corrupt institutions & industry.).
use an ethernet cable, you gonna need to keep that connection spotless and WiFi are vulnerable no matter which protocols, better turn it off.
If I may also add a secure systems (Harden its configuration), a custom firmware on your router(Rec. Tomato series most updated)/hardware firewall(Rec. pfSense) with a VPS if the network is used for other means, they will help you in the long-term.
It should go without saying if you can’t secure a server, don’t host one. You’re responsible for anything that happens to it & us.
Gpt-4 Prompt using Forefront.ai (Worth taking a note):
Q: Recommendations on the levels of security that need to be taken into account for self-hosting a decentralised community
A: Self-hosting a decentralized community involves a number of security considerations. Here are some recommendations:-
Secure Server Configuration: Ensure that your server is configured securely. This includes using strong, unique passwords, disabling root login, and setting up a firewall. Also, consider using a security-focused operating system like SELinux or HardenedBSD.
-
Data Encryption: All data, both at rest and in transit, should be encrypted. Use protocols like HTTPS for web traffic and SFTP for file transfers. For data at rest, consider using disk encryption technologies like BitLocker or LUKS.
-
Regular Updates and Patches: Keep your server and all software up-to-date. This includes the operating system, web server software, database software, and any other software you’re using. Regularly apply patches to fix any known vulnerabilities.
-
Backup and Recovery: Regularly backup your data and test recovery procedures. This will help you recover quickly in case of a data loss event.
-
Access Control: Implement strict access control measures. This includes limiting who has access to your server and what they can do. Use technologies like two-factor authentication (2FA) to add an extra layer of security.
-
Intrusion Detection and Prevention Systems (IDS/IPS): Use IDS/IPS to monitor your network for suspicious activity and automatically block or alert you of potential threats.
-
Secure Application Development: If you’re developing your own applications, follow secure coding practices. This includes input validation, output encoding, and proper error handling. Consider using a security framework to help with this.
-
Privacy Protection: As a decentralized community, your users will likely value their privacy. Use technologies like Tor or VPNs to help protect user privacy. Also, have a clear privacy policy and follow it.
-
Auditing and Logging: Keep detailed logs of all activity on your server. This can help you identify and investigate any security incidents. Also, regularly audit your security measures to ensure they’re working as expected.
-
Education and Awareness: Educate yourself and your community about security best practices. This includes things like recognizing phishing attempts, using strong passwords, and being cautious with downloads and attachments.
Remember, security is not a one-time thing but a continuous process. Always stay informed about the latest threats and security best practices.
-
I hope that this will result in less futulitarianism & quality control, you’re stepping into a blurred line (Censorship).
It goes without saying that blocking should be kept on both levels, as a victim of doxing moderators are slow to react (To put it lightly) that I stopped relying on them, while I can do mitigation the rest of the community has to deal with those types of individuals.
An invitation would be appreciated by anyone who builds a community that values its users.
Some of the moderators that run lemmygrad.ml also run this one, I’m pleading my case until someone does something about it.
I can’t seem to find where I can formally post it in “lemmygrad.ml”.