felbane

joined 2 years ago
[–] felbane@lemmy.world 3 points 12 hours ago

Why use netcat when you can just tap the bits into an ethernet cable with a bench power supply like a telegram operator?

[–] felbane@lemmy.world 38 points 17 hours ago (4 children)

This is one of those rare situations where reading the fucking ~~manual~~ article helps:

 A standard home charger trickles power overnight at roughly 7 kilowatts, like a garden hose. A Tesla Supercharger—long considered the gold standard of public fast-charging—maxes out around 250 kilowatts. BYD is unleashing six times that amount of energy, effectively hooking the car up to a high-pressure municipal water main.

During a live demonstration onstage, BYD plugged in its new Han L sedan, making the battery jump from 10% to 80% capacity in exactly six minutes and 30 seconds.

[–] felbane@lemmy.world 3 points 1 week ago (1 children)

But then people just think you're a dirty government spy. I prefer "IDPL" for "I don't practice law" because it's fun to pronounce.

[–] felbane@lemmy.world 5 points 1 week ago (1 children)

On my blessed day.

[–] felbane@lemmy.world 0 points 2 weeks ago (1 children)

Jellyfin also lets you play your local copies of media, which is way better IMO than relying on someone else to stream from.

[–] felbane@lemmy.world 1 points 2 weeks ago* (last edited 2 weeks ago)

Freeze your mom, freeze your dad!
Freeze your recent high school grad!
Freeze the dog, freeze the cat!
Freeze your hurble durble sprat!

Freeze it all or freeze it none,
If it's frozen you have won;
Freezing everything you see
Will grant you immortality!

[–] felbane@lemmy.world 3 points 2 weeks ago (3 children)

Imagine recommending Stremio when Jellyfin exists (you can use torrentio with Jellyfin as well).

[–] felbane@lemmy.world 2 points 2 weeks ago* (last edited 2 weeks ago)

"Properly implemented" is doing the heavy lifting in that sentence.

Four paragraphs down from your quote is this:

Their attacks ranged from integrity violations affecting specific, targeted user vaults to the complete compromise of all vaults within an organisation using the service. In most cases, the researchers were able to gain access to the passwords – and even make changes to them. 

If E2EE were properly implemented, the above would be impossible.

[–] felbane@lemmy.world 1 points 2 weeks ago (1 children)

This is what Bitwarden claims to do, and yet we have a paper showing that with a compromised server there exists a vulnerability.

view more: next ›