They’re deporting themselves now too? That’s efficient.
r00ty
I’m the administrator of kbin.life, a general purpose/tech orientated kbin instance.
- 0 Posts
- 6 Comments
They send fake (non-existing) actor ids for votes to obfuscate the identity of the real user. It is “compliant”, but completely against the spirit of a public social network.
There have been discussions about how to implement this before. But it has to be done in a way that is agreed by other threadiverse software. Unless they actually provide profiles for these fake actors there will be problems since some software will look up the profile info to cache it, even for likes…
Personally I’m of the opinion of a standard header to mark a favourite message as a private one and use a random ID that the originating instance can use to validate the message as genuine. But, this needs to be adopted properly by all.
r00ty@kbin.lifeto Technology@lemmy.world•This new 40TB hard drive from Seagate is just the beginning—50TB is coming fast!9·10 days agoI bought my first HDD second hand. It was advertised as 40MB. But it was 120MB. How happy was young me?
r00ty@kbin.lifeto A Boring Dystopia@lemmy.world•NYPD robocops: Hulking, 400-lb robots will start patrolling New York City2·13 days agoAnd just to show I’m serious, you have zero seconds to comply.
r00ty@kbin.lifeto A Boring Dystopia@lemmy.world•A family of 5 downsized to a one-bedroom apartment to escape feeling 'house poor.' Saving money hasn't been the only benefit.0·27 days agoThis seems quite similar to what we call I’m the UK inverse snobbery. It was quite a big thing (apparently) during ww2.
Linux secure boot was a little weird last I checked. The kernel and modules don’t need to be secure boot signed. Most distros can use shim to pass secure boot and then take over the secure boot process.
There are dkms kernel modules that are user compiled. These are signed using a machine owner key. So the machine owner could for sure compile their own malicious version and still be in a secure boot context.