Forgot your password?
typodupeerror

Comment Re:Porn (Score 1) 220

If you think about it, you'd be grateful for the ethnic replacements when your decreasing native population gets old, stops working and no longer generates tax for your government to run - or maybe they'll work and tax you until you die.

I think they're more concerned about the gene pool, 1 Latina could potentially disrupt centuries of inbreeding.

Comment Re:Navy SEAL drills work best for Navy SEALs (Score 1) 111

Question: why do they need any of that at all? Why have your employees do this stupid shit? What does it accomplish? Can the bros really not think of a better way to spend $500k? Does this really enhance your product? Does this really help people get their work done and gel as a team? Or... is it really so the CEO can say "hey guys, guess what we did, lol (not me, i was faking E.Coli so i could stay in my room)" to his cadre of other insufferable douchebags at the next conference?

Less of a need and more of what would be beneficial. They don't actually need any such training but one thing the armed forces teaches in basic is how to work together, even with people you don't like and that would be beneficial in an office environment (have you ever tried herding cats into a coherent meeting).

But it's a moot point as those with an abundance of ego and dearth of talent or self awareness would never accept that they'd learn anything from "basic" training.

Comment Re:Yet another reason to buy dead tree books (Score 1) 62

But you know, I still have most of my college textbooks, still stored in the milk crates I stole from behind the dorm. I graduated in '83.

That is something I left out of my post. In another reply where I said a similar thing I was clear to specify *fiction* books. I still do have my college textbooks as well. They (along with other older books) still make for great reference material. I will likely gift a portion of them on when I retire, but for me they aren't even in a milk crate, they are on my shelf in my office.

Comment Re:Yet another reason to buy dead tree books (Score 1) 62

And because you don't, no one should, right?

If you are unable to read you may say that. Did you read to the end of my post?

I'm shocked your wife hasn't divorced your dumb ass, yet.

Why would she have, did you start reading from the beginning of my post?

Seriously you read something, my entire post clearly, but neither one of your points could logically exist if you understood my entire post, only if you read each sentence in complete isolation like an idiot. Try not doing that in future.

Comment Re:So..... (Score 1) 48

Why would I sue you? It's clear that I have been living rent free in your head for 3 years now. Maybe if you raised the rent... that said there's nothing but mold and rubbish in here.

Nothing makes me happier than to see a truly stupid person have someone get under their skin. Seriously man, u dum!

Comment Re:Good! (Score 1) 47

Option is not the correct word. I think it would be better so I had the "illusion of choice". Much like Apple's iPhone repair kit where they will send you a screen and 40kg of equipment they expect you to haul back to the post office when you're done, the choice ceases being a choice when there is a more viable path of lease resistance.

It's one thing provide spare parts and options, but quite another to put it in a price or complexity category that is beyond the reach of any straight thinking consumer. If I priced every single component of the WD5 from the repair shop individually I'd be looking at a vacuum cleaner some 10x the cost of RRP, and that's before we even start discussing the accessories that are normally included.

I agree John Deer is next level toxic with actual cryptographic lockdown of certain parts of their systems, but do you accept the status quo of insanely difficult to repair laptops? Phones where a battery swap requires hours of work and specialised equipment? Those are options. Burnt out RAM on a GPU? technically you have the option of fixing that yourself as well.

Comment Re:Stop connecting it to the internet (Score 1) 93

And modems no longer exist?

We still have modems. They are used to connect to the internet. You know what doesn't exist? Leased lines. I was part of a project that was literally forced to replace such a leased line with an internet connection. We still used a modem.

Point to Point networks are insanely rare these days.

But since you're living in the past, an old leased line and modem can't even keep up with the data requirements of a remote pumping station, let alone the data requirements of a larger facility. An old leased line and modem can't even handle the overhead of the DNP3 protocol reliably, let alone send any data over it.

Comment Re:Consent Decree Expired for Microsodt (Score 1) 64

While the pattern is the same the world has in fact changed a bit. Consumers generally expect things integrated. OSes need to include browsers, it's expected cloud storage to be included (an Apple innovation with iCloud closely followed by Google with Drive), and lets face it Microsoft was completely late to the party for any attempt to integrate an assistant at an OS level, they just slapped AI on it.

I suspect courts would not find these things anti-competitive in today's world. It's the unexpected bullshit that gets found anticompetitive, like Teams bundling with Office. Actually this has been explicitly tried in Europe, where a complaint to the EU commission directed at OneDrive bundling was eventually withdrawn in 2025 after the commission collectively yawned, ... and then proceeded to issue a ruling against Microsoft on Teams.

Comment Re:Control of Secure Boot via the Windows copyrigh (Score 1) 102

Microsoft specifically denies windows certification to any device that doesn't allow secure boot to be disabled and custom keys loaded, and they have since the release of Windows 8.1 (13 years ago). There's no Windows RT devices on sale, and even Microsoft's own first party Surface Pro Snapdragon devices give you, the user, complete control over secure boot process and custom key loading.

But if the best you can come up with is criticising a Windows version that flopped so badly it nearly took an entire idea of using arm as a desktop computer architecture with it, that was used by so few people that Microsoft abandoned ideas to develop an ARM based system for a full decade, then I'm sorry but you are advertising a huge win for Microsoft there.

Now, have you got anything to say that actually impacted users, preferably something from this decade?

Comment Re:Microsoft issues the Linux keys too (Score 1) 102

Bullshit.

Your lack of understanding doesn't make something bullshit.

You had root on my box, you have already had the opportunity to crypto ransom me, just vandalize my system in general, find and extract any sensitive data in my home directories and on any mounted volumes.

You forgot one. I had root on your box. That made me an evil-maid, and you just said secure boot protects against that. There's a difference between malware at a point in time, and achieving residence. Maybe I don't want your shitty dick picks in your mounted volumes, maybe I'm after your bank account details. Oh I know how about a key logger. But what if you attempt to remove said key logger? Well we have the perfect solution, since you don't know about persistent malware and choose to leave secure boot disabled I now have fucked your system beyond your repair. We thankyou for your ignorance and lack of security.

In fact I would suggest for most users of home PCs anyway (to include laptops that rarely if ever travel) are less secure for using secure boot and even FDE. Most of them are one bad update or certificate expiration away from rendering their data completely inaccessible and unrecoverable.

Maybe you should look up the word "secure" in the dictionary. You just described data in its *most* secure state. Nothing is more secure than something inaccessible and unrecoverable. Even if your case were true (secure boot has zero to do with your data) the result would still be more secure not less secure.

At this point it's clear you don't even understand the basic terms being used in the discussion.

Comment Re:Microsoft issues the Linux keys too (Score 1) 102

You're speaking in circles. You remove all the things you claim you don't want and then you complain that there's nothing left and that you may as well run Linux? Please don't ever advertise for Linux anymore you make it sound horrible.

It's not a conspiracy theory that Microsoft steals your data, they admit it.

No it's a conspiracy theory. They admit to specific things, calling it "your data" is FUD. What is actually taken is known and agreed to in ToS, so not only is it not "your data" it's not "stealing".

They enable One Drive by default.

They don't do anything by default. They force you into a choice screen which is not able to be bypassed by an X. And even if you blindly click okay because you don't want to read it backs up only specific folders on your computer, and does so with big bright green visible tickmarks leaving no doubt.

They enable Ink & Type, along with other analytic services, all to steal your data.

Yeah nah, no data is being stolen there. They aren't taking all your data, just a database of mistakes that are miscorrected. You can thank me for participating for your spellchecker working better than ever before.

So, that being the case, you need to run something like VeraCrypt to key your files safe from Microsoft.

I may have told you before you have no idea how security works, but in case you tried to educate yourself in the mean time you clearly failed. VeraCrypt addresses precisely zero, nada, NIL, none of the issues you list or complained about. It has no ability to hide any data from Microsoft what so ever other than the data that you never access.

Please get some help.

Comment Re:Other privacy-related projects are also affecte (Score 2) 102

Just because it's FOSS doesn't mean the key isn't generated at run-time, stored locally, and would have to be sent as part of the first packet or burst of data... if the key that decrypts it on your end isn't sent, how does the exit node have usable data to send to the Internet-at-large?

Congrats, you don't understand the basics of secure key exchange, but that's easy to fix: I suggest starting with the colour model for a basic understanding: https://www.arsouyes.org/artic... afterwards you can look into the details of how this works mathematically. No your key is *NEVER* sent anywhere. EVER. It's not required for key exchange.

And, especially because it's FOSS, the governments have already reverse-engineered it, figured out the decryption so they can peek at what you send, re-encrypt it, and send it on it's way.

There's nothing to reverse engineer. Encryption and security is based on well known public algorithms. These are designed to enable secret communication, that you can verify on a mathematical level. There's no reverse engineering anything, there's only breaking the key, and the key generation process relies on a the concept of mathematics that easily calculate but difficult to reverse. E.g. Discrete logarithm problems. Take M^b mod p = x. I could tell you M and p and x and you would still have no hope in hell of figuring out b.

You don't like what I post, then don't read it.

Why post if you don't want to engage in a discussion?

Maybe you'd rather terrorists and cartel members converse over these encrypted channels, and nobody knows a thing...

If this is the kind of thing you normally post I don't have any idea why no one has called you deranged before.

Slashdot Top Deals

If you are smart enough to know that you're not smart enough to be an Engineer, then you're in Business.

Working...