

I’m like a generation younger than you at least and I’m on the default terminal and tmux train, so I’m saying you’re not out of touch.
Cybersecurity professional with an interest/background in networking. Beginning to delve into binary exploitation and reverse engineering.
I’m like a generation younger than you at least and I’m on the default terminal and tmux train, so I’m saying you’re not out of touch.
It has not defaulted to root prompt in many years.
This is very anecdotal, but both myself and the vast majority of my peers use macOS as their base host system. I work in cybersecurity, specifically offensive penetration testing. Myself, most of my coworkers, and probably half of my peers I’m competing against at local conference CTFs or that I know at local meetups are using a MacBook host with VMs spun up to need.
Something like 75% of my job is done in a Linux VM. Doing it on a MacBook is infinitely more pleasant than any other laptop I’ve ever tried using, regardless of what OS it’s running.
Also, and again extremely anecdotal, the most technical people I’ve ever known were all using hackintoshes when I knew them, and would use MacBooks when away from the home/office.
I really don’t understand where this “Mac products are for non-technical people who want to appear technical” trope comes from. MacOS is a phenomenal product for non-technical people. My partner is the least technical person in the world, but they started using macOS in art school and found it intuitive and easy to use. As a technical person, I appreciate the polished UI built on top of the Unix kernel and that I can do everything I need to do from a terminal shell. The fact that the product is excellent for both wildly disparate types of users is testament to how great it is imo.
Holy shit that got spicy. I was not expecting a Ukrainian and a Serb to start bickering back and forth while stacking racks over the level of support a country gave to the Nazis in WW2 on a kernel mailing list like they were in the comments here on Lemmy.
I get that tensions are high, and for many people the geopolitical reality is their homes being used as cover on an active front line, but like bro your actual fucking name is attached to these messages. At least I keep my most unhinged shit on a semi-anonymous platform. They need to lock it the fuck up.
Edit - jfc, a few messages later somebody comes in with something along the lines of “Taiwan isn’t a country, it’s part of China. When reunification comes sanctions won’t be appropriate against Chinese entities.” Is Lemmy just a front end for this mailing list and I had no idea this entire time?
I mean is there a material pronunciation difference between the two conjunctions? I don’t think so, but I can still somehow manage to work out what people mean when they say use “your” and “you’re” in the same spoken sentence.
I can’t quite get a read on if you’re being sarcastic or not, but if you are you should know that there are curated porn blocklists for pihole. This obviously won’t stop anyone from accessing porn via nsfw channels on sites that are not exclusively nsfw, like lemmy, Reddit, tumblr, or whatever.
Run pihole with a MikroTik router at your houses demarc.
Set up firewall rules in the tik to redirect any packet with dst tcp/udp 53 outbound on wan to the pihole. If you’re worried about dns when pihole is down, create disabled rules to allow the dns traffic as well, then set up a scheduler script using if blocks to toggle the sets of rules depending on status. This will force any client on your network, even one with hardcoded dns IPs, to use the pihole.
If the client is configured for DoH you’ll just have to build out an ip block list in the MikroTik and block all known DoH IPs.
Create firewall rules to drop all vpn traffic you can, combining port based rules and similar IP lists as for DoH, but subbing in VPN provider IPs. If you want to route your home traffic over a vpn, set up a vpn client in the router itself and basically site-to-site your home to the vpn provider you use.
This would block the vast majority of kids trying to bypass parents blocks, but it’s asking quite a lot from the parents who don’t have experience configuring this stuff already.
If someone starting swatting the extended family of local police chiefs across the country I’d be willing to bet that even the police unions would be calling for an end to these types of raids, regardless of how they were handled.
I wouldn’t buy a used MacBook from an individual seller unless I could meet in person to verify there’s no BIOS/TPM lock going on that would prevent me from doing a secure erase and wiping the SSD to start fresh. A laptop with a replaceable ssd is probably less of an issue, but I’d still feel more comfortable having a picture of the BIOS showing no password set or anything, and a picture of it booted to desktop at minimum so you know it isn’t a stolen laptop that has a password no one knows. If you’re buying from like a second hand recycler or something, anyone that sells through significant volume of devices, I’d be much more comfortable just pulling the trigger sight unseen.
Yes, treating crypto as a way to invest is a scam. The vast majority of crypto and crypto-adjacent “projects” are scams.
We live in a world where payment providers have the power to force Etsy to delist vendors that sell sex toys to customers of a legal age, payment apps like Venmo or PayPal will permaban your account for selling NSFW art or products, and physical cash is being largely abandoned for cards and digital wallets. Surely you can see the benefits of a completely anonymous payment method?
To be clear, I vastly prefer cash, but there’s an obvious issue with trying to anonymously use cash to pay for something on the internet or to send money to someone who isn’t within easy driving distance.
Slam an Edge user agent up in there.
Just to note, Kali is a downstream release of Debian Testing, not Ubuntu. Also for question 55 you didn’t include “git clone and build binary from src”.
Put a public pgp key in your profile bio, then you can actually send true end to end encrypted messages over insecure public channels.
A very similar conversation led to a joke chain of pgp encrypted replies between me and some other rando on Reddit a few years ago. We were both banned.
deleted by creator
your autocorrect misspelled debian server in that last line there.
I don’t have FDE (BitLocker) enabled on my Windows 11 gaming PC. It sits in my house and has nothing on it but video games and video game related shit. I don’t even have my password manager installed for logging in to Steam, GoG or whatever other launcher. I manually type passwords in from the vault on my phone if the app doesn’t support QR code login like discord. Also I paid for this ridiculous m.2 nvme drive, I’m not going to just give up iops bc i want my game install files encrypted.
I don’t use FDE on my NAS. Again it doesn’t leave my house. I probably should I guess, bc there is some stuff on there that would cause me to have industry certs revoked if they leaked, but idk I don’t. Everything irreplaceable is backed up off site, but the down time it would take to rebuild my pirated media libraries from scratch vs just swapping disks and rebuilding has me leery.
I have FDE enabled on both my MacBooks. They leave the house with me, it seems to make sense.
I don’t use FDE on Linux VMs I create on the MacBooks, the disk is already encrypted.
My iphone doesn’t have the option to not use FDE I don’t think.
I use encrypted rsync backups to store NAS stuff in the cloud. I use a PGP key on my yubikey to further encrypt specific files on my MacBooks as required beyond the general FDE.