![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
Super Thunder Blade did this, same era too.
Super Thunder Blade did this, same era too.
Put each character in a spans with random classes, intersperse other random characters all over the place also with random classes, then make the unwanted characters hidden.
Bonus points if you use css to shuffle the order of letters too.
Accessibility? Pffffft.
Could a hypothetical attacker not just get you to visit a webpage, or an image embedded in another, or even a speculatively loaded URL by your browser. Then from the v6 address of the connection, directly attack that address hoping for a misconfiguration of your router (which is probable, as most of them are in the dumbest ways)
Vs v4, where the attacker just sees either your routers IP address (and then has to hope the router has a vulnerability or a port forward) or increasingly gets the IP address of the CGNAT block which might have another 1000 routers behind it.
Unless you’re aggressively rotating through your v6 address space, you’ve now given advertisers and data brokers a pretty accurate unique identifier of you. A much more prevalent “attack” vector.
I was maybe a little inebriated, and he was very rude.
He had to wait for the next train, and I had a sore jaw for a week. Mild inconveniences al round. I think everyone got what they deserved.
Threw a man’s belongings off a train because he was listening to music without headphones.
Worth it.
I bought Minecraft when it was first purchaseable. Only converted my account last month as my new-school-entrant kid has asked what it is.
And honestly, I wish I didn’t. The MS launcher is an absolute shit show in usability for adults, let alone kids. Next time it forces me to log back in I’m just pirating it.
I bought two copies, I’ll fucking run them how I please.
If you still do the sizing (it’s not entirely wasted as it’s a reasonably effective tool to gauge understanding across the team), This can still be done without the artificial time boxing.
“How much work have we done in the last two weeks?” Just look at all the stories closed in the last two weeks. Easy.
“When will X be delivered?” Look at X and all its dependencies, add up all the points, and guesstimate the time equivalence.
Kanban isn’t a free for all, you still need structure and some planning. But you take most of that away from the do-ers and let them do what they do best… do.
They were first to market with a decent GPGPU toolkit (CUDA) which built them a pretty sizeable userbase.
Then when competitors caught up, they made it as hard as possible to transition away from their ecosystem.
Like Apple, but worse.
I guess they learned from their Gaming heyday that not controlling the abstraction layer (eg OpenGL, DirectX, etc) means they can’t do lock in.
While suing everyone else that makes shovel handles that work with your shovel heads.
Problem then is, You Still gotta buy a truck to buy and haul your 2nd motorcycle, your 3rd motorcycle, your dirt bike, and your track bike.
Yes, this link has been disabled as per (dumb) organisation policy.
Ok. Did a quick read. And I think I mixed my words a little.
Yes, Active Directory supports TOTP fine.
But my understanding is rollouts can disable TOTP, and instead force the use of the proprietary scheme requiring the MS Authenticator app (which also supports TOTP) that uses push notifications to the device.
As is the case with my employer. They didn’t enable TOTP, and I am unable to use the provided MFA QR code with 1Password.
Afaik, Microsoft’s OTP implementation is proprietary and not TOTP.
But also, my understanding is you can select which MFA schemes you can use, and allow SMS, MS MFA, and TOTP.
Source: employer used to allow sms, locked it down, and totp apps can’t parse the MS authenticator QR codes.
Alternate headline:
Companies accept money for a thing that will happen anyway, and will be unable to prove if they say no.
GenAi is unfortunately here, and the technocracy wants you to want it so they can farm you for more and more intimate data to leverage and enforce their technocracy. And the only way they’re going to do it is by keeping the press positive, and feed it more and more data in the hopes it fixes things.
I was expecting some sort of “Ai discovers new bug in 30 year old software”… cool I’m excited.
Then they were talking about how the bug was persistent, and I’m more intrigued “is the bug some weird emergent behaviour corrupting state somewhere?”
Nope, just another example of a shit in shit out data model.
the university probably got paid
Never underestimate management’s ability to do stupid shit (like paying for this) in the name of “the future”.
They were gonna pay for a speaker anyway.
I thought everyone decided “jfgi” in online discourse was a toxic years ago. It’s the same attitude as :
chemtrails make you sick!
How so?
go do your own research
If you’re going report on something, provide a little more information than just “no”. It’s more helpful, better for the community, and in 5 years time when the facts are different, there’ll still be a reference of what was factual in the past.
Yep, This is taken straight from Facebooks advertisements circa 2018, maybe still today.