Skip to content

‘You can’t pause the internet’: social media creators hit by burnout

Technology
123 53 0
  • OpenAI's $210K Residency Program Tackles AI Talent Shortage

    Technology technology
    1
    1
    6 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 4 Stimmen
    5 Beiträge
    3 Aufrufe
    M
    Of course, if they’re in the army, can’t they be executed for treason and the like?
  • Was ist ChatGPT?

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    12 Aufrufe
    Niemand hat geantwortet
  • Right to Repair Gains Traction as John Deere Faces Trial

    Technology technology
    30
    1
    622 Stimmen
    30 Beiträge
    104 Aufrufe
    R
    Run the Jewels?
  • 43 Stimmen
    2 Beiträge
    15 Aufrufe
    C
    From the same source, Blacklight is really good. https://themarkup.org/series/blacklight Blacklight is a Real-Time Website Privacy Inspector. Enter the address of any website, and Blacklight will scan it and reveal the specific user-tracking technologies on the site So you can see what's happening on a site before you visit it
  • 15 Stimmen
    1 Beiträge
    9 Aufrufe
    Niemand hat geantwortet
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    34 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • How a Spyware App Compromised Assad’s Army

    Technology technology
    2
    1
    41 Stimmen
    2 Beiträge
    17 Aufrufe
    S
    I guess that's why you pay your soldiers. In the early summer of 2024, months before the opposition launched Operation Deterrence of Aggression, a mobile application began circulating among a group of Syrian army officers. It carried an innocuous name: STFD-686, a string of letters standing for Syria Trust for Development. ... The STFD-686 app operated with disarming simplicity. It offered the promise of financial aid, requiring only that the victim fill out a few personal details. It asked innocent questions: “What kind of assistance are you expecting?” and “Tell us more about your financial situation.” ... Determining officers’ ranks made it possible for the app’s operators to identify those in sensitive positions, such as battalion commanders and communications officers, while knowing their exact place of service allowed for the construction of live maps of force deployments. It gave the operators behind the app and the website the ability to chart both strongholds and gaps in the Syrian army’s defensive lines. The most crucial point was the combination of the two pieces of information: Disclosing that “officer X” was stationed at “location Y” was tantamount to handing the enemy the army’s entire operating manual, especially on fluid fronts like those in Idlib and Sweida.