![](https://lemmy.world/pictrs/image/7ce891be-9f12-4f28-92a8-52cd9e16139a.png)
![](https://lemmy.ca/pictrs/image/7b0211f0-7266-4e13-9d26-8c3e6126af62.png)
What’s cb12?
If this is a Deez nuts joke I’ll leave a bad review for you on yelp.
What’s cb12?
If this is a Deez nuts joke I’ll leave a bad review for you on yelp.
Pokemon literally crying rn.
Alright I’ll give you that
He’s not a good person but some of the things he says are things that almost every young man resonates with. Feeling worthless, being lonely, wanting something to strive for, having no purpose, the feeling that life is unfair to you but you can’t complain, or social stuff is hard.
It’s not the solutions he proposed that made him popular, but the problems he raised.
Now let’s be clear here, he’s a slimy criminal with a ton of different schemes running concurrently, but at face value we still haven’t found the time to address the problems he raised. The void he leaves is exploitable unless we get someone righteous who takes his place to inspire young men. And no, I don’t think there’s role models right now that can take his place, at least not with that reach or that charisma.
lawful interception
Idk bout that. Usually you get a warrant for wiretapping and then you pay someone to install it. If they are trying to break encryption or identifying users, that means they inherently are doing something the law does not favor.
Let’s also acknowledge that if encryption is bad because it cannot be broken, that means encryption is pretty good at what it should do.
Breaking encryption is never something you do for the right reasons.
That’s good to know because this is stuff does not inspire confidence.
You know what, there’s a small chance they would if they knew. But let’s say the Pentagon stopped all silos and kept it hush. Russia and China would never know whether they stopped or where remaining ones would be.
It’s not the weapons itself that protect the USA but solely the fact they are probably somewhere and they know how to trigger them.
This is overkill. In every aspect. Need, justification, budget, maintenance. The definition of a US defense department toy. It’s a flex. But it’s a covert flex, which is the definition of stupid. We’re not talking trap track but government decisions and that boggles my mind.
What the fuck that’s like a whole NPC quest line.
And some of these artifacts are much more meaningful to those foreign countries than the bill of rights. A lot of stuff in there has huge sentimental value to the families in there as it literally represents their ancestors to them.
John Oliver had a great episode about Museums where he explains all of this.
2 has Chad energy.
Welcome to Germany. We use bureaucracy for everything.
NGL it’s kind of a brilliant way to make Netanyahu show his true intentions to the Israeli public.
That, the target audience and the overall production size as well.
Ah that makes sense let me put an asterisk on that then
That has to do with how hashes work.
Hash is if you want someone to be able to check if he’s got the right password but not able to know what it actually says.
Imagine my password is “shark”. Let’s say I use a hash algorithm so that it becomes “2gtth5”. If I log in. I enter my password. My browser* uses the same algorithm, so the text I entered is “2gtth5” now. The server looks up my hashed password, checks if it’s the same and then it lets me log in. The benefit is, the server doesn’t know my actual password, it only knows that the hash is “2gtth5”. This means if the database gets compromised, people only see “2gtth5” but not my actual password. And because it’s a hash, they don’t know how to get back from “2gtth5” to “shark” and therefore my password is not compromised.
Now imagine if I knew the hashing algorithm used and I have a list of possible passwords. There might be “shark” in there. So I can take the password list, make a hash out of every password and see if it matches. Because my password is in there, the hash for “shark” will match the hash “2gtth5” in the compromised database and they now know my actual password. This is a far bigger problem.
Everytime you see that someone “hacked” a database and password hashes got compromised, this is what happens. They use rock you and a few other lists to see if they can “crack” the hashes (this just means checking the hashes and seeing if one of the password from the list matches).
This is specifically what those lists are for. They are used by bad actors to make use of the hashed passwords they stole.
Glossary:
*Someone in the comments corrected me on this. The server does the hashing not the browser.
Imo this is the most dangerous part rn. War is bad and everyone can see that, but propaganda on a global scale is very opaque and those who are targeted will usually not know, as it employs various forms of subtlety.
I would assume that because the original rockyou list was always just used for dictionary brute force attacks, so no associated usernames.
I think it’s more than that. For some people their mom is their hero for taking care of them and they have a special love for her. Now if someone sleeps with my mom just to brag, the insult is that they did it just to brag about it and I am supposed to be angry because I know it wasn’t genuinely someone who loves her.
My favorite series rn
Removed by mod