ricecake

joined 1 year ago
[–] ricecake@sh.itjust.works 1 points 3 hours ago

Heh, very true. It just messes up the first impression which is where the clothing jokes have the best impact. Never as fun if people take time to get to know you before getting the joke your appearance made.

[–] ricecake@sh.itjust.works 2 points 5 hours ago (1 children)

Nope, the president doesn't have the legal authority to give that order. He has the legal authority to order them to consider the question, which is the process that's going on.

[–] ricecake@sh.itjust.works 8 points 1 day ago (1 children)

My favorite type of incoherent gibberish is the type that might be trying to talk about a terrible idea.

Politicians keep talking about building pipelines from places that have water to places that don't.
Maybe the answer is actually that California isn't the best place for agriculture once you get past the easy access to migrate labor, and they should price industrial and agricultural water usage accordingly.

[–] ricecake@sh.itjust.works 16 points 1 day ago (2 children)

The whole tactical-style-for-not-tactical-thing makes me rage. Not because it exists, but because it's been picked up by the wrong demographic.

That sort of thing should belong to the realm of the ironic, and be worn by the person who has a bad joke to go with it.

Tactical baby carrier should be for the fun dad who uses it to make jokes about how you otherwise might notice the baby, and not the fragile guy who needs a shield to defend his masculinity in the face of raising his children.

It's like so much of these things started as a gag, and then got picked up by people who aren't in on the joke.

[–] ricecake@sh.itjust.works 2 points 1 day ago

A lot of that information can be weirdly public. Looking up property records often comes with data about utility bills and taxes, and their payment statuses.

[–] ricecake@sh.itjust.works 20 points 1 day ago

The RSV vaccine is even being used in the wild! Certain high risk demographics can get it during RSV season. And not rare high risk either, women beyond a certain point in pregnancy and older people.

[–] ricecake@sh.itjust.works 1 points 1 day ago (1 children)

Yeah, and it's not like you want the information out there, it's just that in my opinion it's not something I would pay money for. Having the authority to make the request doesn't mean that the party on the other end is obligated to comply, or in some cases even legally permitted to.

I've used Google's service where they send you an email to review results if they find something, and my Google results for my incredibly distinctive name are basically only professional resources that I kinda want to be findable.

[–] ricecake@sh.itjust.works 1 points 2 days ago (3 children)

Honestly? It's not something I would pay for. Google has their own service where they'll let you know if they find your information and you can ask them to remove the search result.
Beyond that, there's some information that you just fundamentally can't make private and no service can get taken down.
Most data mining sites just collect those public records and put them next to each other, so they get a pile of your name, birthday, where you were born, how active you are as a voter and all that stuff.

Removing your address from Google maps just seems silly to me. That there is a residence there is fundamentally public information, not being on maps doesn't make it less public it just probably causes issues for delivery drivers.

Anyone who has your data and is going to be a jerk about it isn't going to listen to a request to take it down either. They're just going to send you spam messages.

The odds of being Targeted by a determined individual who's focused explicitly on you is low. They tend to target a broad swath of people, and then dig in on people who take the bait a few times.

[–] ricecake@sh.itjust.works 21 points 2 days ago (5 children)

I have never felt so old.

Name, address, and phone number of the account holder used to be published in books that got sent to everyone in the city and also just left lying in boxes that had phones in them if you needed to make a call while you weren't home, because your phone used to be tied to a physical location.
You also used to have to pay extra to make calls to places far away because it used more phone circuits. And by "far away" I mean roughly 50 miles.

It's not the biggest thing in the world, privacy wise, since a surprising amount of information is considered public.
If you know an address, it's pretty much trivial to find the owners name, basic layout of the house, home value, previous owners, utility bill information, tax payments, and so on. I looked up my information and was able to pretty easily get the records for my house, showing I pay my bills on time, when I got my air conditioner replaced and who the contractor who did it was.

As an example, here's the property record for a parking structure owned by the state of Michigan. I chose a public building accessible by anyone and owned by a government to avoid randomly doxing someone, but it's really as easy as searching for public records for some county or city and you'll find something pretty fast.

[–] ricecake@sh.itjust.works 4 points 3 days ago

Depends on the vendor for the specifics. In general, they don't protect against an attacker who has gained persistent privileged access to the machine, only against theft.
Since the key either can't leave the tpm or is useless without it (some tpms have one key that it can never return, and will generate a new key and return it encrypted with it's internal key. This means you get protection but don't need to worry about storage on the chip), the attacker needs to remain undetected on the server as long as they want to use it, which is difficult for anyone less sophisticated than an advanced persistent threat.

The Apple system, to its credit, does a degree of user and application validation to use the keys. Generally good for security, but it makes it so if you want to share a key between users you probably won't be using the secure enclave.

Most of the trust checks end up being the tpm proving itself to the remote service that's checking the service. For example, when you use your phones biometrics to log into a website, part of that handshake is the tpm on the phone proving that it's made by a company to a spec validated by the standards to be secure in the way it's claiming.

[–] ricecake@sh.itjust.works 25 points 3 days ago (2 children)

Package signing is used to make sure you only get packages from sources you trust.
Every Linux distro does it and it's why if you add a new source for packages you get asked to accept a key signature.

For a long time, the keys used for signing were just files on disk, and you protected them by protecting the server they were on, but they were technically able to be stolen and used to sign malicious packages.

Some advanced in chip design and cost reductions later, we now have what is often called a "secure enclave", "trusted platform module", or a general provider for a non-exportable key.
It's a little chip that holds or manages a cryptographic key such that it can't (or is exceptionally difficult) to get the signing key off the chip or extract it, making it nearly impossible to steal the key without actually physically stealing the server, which is much easier to prevent by putting it in a room with doors, and impossible to do without detection, making a forged package vastly less likely.

There are services that exist that provide the infrastructure needed to do this, but they cost money and it takes time and money to build it into your system in a way that's reliable and doesn't lock you to a vendor if you ever need to switch for whatever reason.

So I believe this is valve picking up the bill to move archs package infrastructure security up to the top tier.
It was fine before, but that upgrade is expensive for a volunteer and donation based project and cheap for a high profile company that might legitimately be worried about their use of arch on physical hardware increasing the threat interest.

[–] ricecake@sh.itjust.works 17 points 2 weeks ago

They're goal is to sell to each person for exactly the most that they can get the person to pay.
A lot of people get the medication through insurance, meaning they're just gouging another leach.
The insurance will pay because the medicine is just cheaper than what it would cost them if you didn't get it.

If you don't have insurance, they have programs to try to gouge you at more plausible rates that they refer to in compassionate language.

If you're a third world, they try to price gouge in terms affordable for the market.

About the only place they charge a fair price is in places they think the government might just set price ceilings.

8
submitted 8 months ago* (last edited 8 months ago) by ricecake@sh.itjust.works to c/imageai@sh.itjust.works
 

Been having fun trying to generate images that look like "good" CGI, but broken somehow in a more realistic looking way.

 

Made with the Krita AI generation plugin.

 

digital illustration of a male character in bright and saturated colors with playful and fun expression, created in 2D style, perfect for social media sharing. Rendered in high-resolution 10-megapixel 2K resolution with a cel-shaded comic book style , paisley Steps: 50, Sampler: Heun, CFG scale: 13, Seed: 1649780875, Size: 768x768, Model hash: 99fd5c4b6f, Model: seekArtMEGA_mega20, ControlNet Enabled: True, ControlNet Preprocessor: lineart_coarse, ControlNet Model: control_v11p_sd15_lineart [43d4be0d], ControlNet Weight: 1, ControlNet Starting Step: 0, ControlNet Ending Step: 1, ControlNet Resize Mode: Crop and Resize, ControlNet Pixel Perfect: True, ControlNet Control Mode: Balanced, ControlNet Preprocessor Parameters: "(512, 64, 64)"

If you take a picture of yourself in from the shoulders up, like in the picture, while standing in front of a blank but lightly textured wall it seems to work best.

view more: next ›