![](/static/e3814064/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/c47230a8-134c-4dc9-89e8-75c6ea875d36.png)
You’re one link click away from understanding why your message is stupid. Question is whether it’s message alone.
You’re one link click away from understanding why your message is stupid. Question is whether it’s message alone.
Or Star Control 2 Hyperspace theme.
Did you systemically persecute Indian business owners in Britain, escalating it to ethnic cleansing?
The analogy is historically exact.
Teeth cannot produce enamel. Enamel is not a living tissue and it was produced by cells outside of the tooth in a coral-like manner. In order to grow a new tooth, you need it to be fully surrounded by specialized living tissue for the whole growth cycle.
PS: I honestly expected something like this to come out of bioelectric computation research, but progress seems slower there. Or rather knowledge and techniques in other fields is reaching critical mass, giving us these advances.
So in a choice between arrest and killing innocents, choosing to kill innocents is moral somehow?
I could write a long tirade on the terrifying flaws of this logic, but instead I’ll just share a reminder that barely anyone is the villain of their own story.
I’m not sure if you’re calling Putin a stupid man that is easily manipulated or incompetent.
They are parroting Russian propaganda. The one where “the west” is stipid, cunning, strong, and rotting all at the same time.
Monitor the room temperature.
It’s called Russia Law because it’s literally a Russian law copied verbatim
If you use HTTPS, the attacker can still see what websites you connect to, they just can’t see what you are sending or receiving. So basically they can steal your browsing history, which defeats the purpose of a commercial VPN for many users.
This is blatantly false. They can see IP addresses and ports of you connect to from IP packets, and hostnames from TLS negotiation phase (and DNS requests if you don’t use custom DNS settings). HTTP data is fully encrypted when using HTTPS.
If exposing hostnames and IP addresses is dangerous, chances are that establishing a VPN connection is as dangerous.
Control of the DHCP server in the victim’s network is required for the attack to work.
This is not a VPN vulnerability, but a lower level networking setup manipulation that negates naive VPN setups by instructing your OS to send traffic outside of VPN tunnel.
In conclusion, if your VPN setup doesn’t include routing guards or an indirection layer, ISP controlled routers and public WiFis will make you drop out of the tunnel now that there’s a simple video instruction out there.
And if there’s a bug in that code, you’re fucked.
Safety features should work if everything else fails. Their failure mode can’t be “fuck it, it didn’t work”. Which is directly opposite to the failure mode of a subscription based service.
Word “respect” means two different things. One of them can only be earned, another can only be given.
What’s more, the part that can only be given is best described by trust. As in, the only way you can truly know if you can trust someone is to trust and find out.
In this context, the respect that is given - a regard for the others - is a baseline trust in a reciprocal valuation. The respect that is earned is the collection of outcomes that feed into others’ trust risk assessment.
Oh yeah, please do imagine there is no such thing as a time zone.
On an ellipsoid!