• sudo42@lemmy.world
    link
    fedilink
    English
    arrow-up
    60
    ·
    5 months ago

    If you value your privacy and you have a choice between using a browser to access a service vs installing their app, use the browser.

    Online services can get much more information about you through an app vs the browser. Browsers are generally locked down more. Apps in general have access to much more information from your device.

    • vingetcxly@thelemmy.club
      link
      fedilink
      arrow-up
      8
      arrow-down
      1
      ·
      5 months ago

      Its all useless if the very operating system ur using is collecting info about you. Stop using windows

  • CurlyWurlies4All@slrpnk.net
    link
    fedilink
    English
    arrow-up
    39
    ·
    edit-2
    4 months ago

    The cost of digital advertising cannot be justified by its effectiveness (or rather lack there of). We’ve collectively spent hundreds of billions of dollars creating the infrastructure for invasive hyper targeted ads that do not get better results than simple billboards and terrestrial TV ads even now. We’ve created a global economy of marketing, media, advertising and sales solely reliant on technofeudalist overlords who’ve provided very little actual improvement of anything.

  • Talaraine@fedia.io
    link
    fedilink
    arrow-up
    27
    ·
    5 months ago

    Most of hacking is done by mass effort with maybe a couple percent of people that aren’t doing basic things to protect themselves being affected. That couple of percent is enough to keep the hackers flush. (So please, follow basic cybersecurity steps, people.)

    The plain truth of the matter, though, is that if a hacker or group of hackers is targeting someone individually for reasons, that person is in real trouble.

    This has been a PSA for everyone chasing fame and clout.

  • rodbiren@midwest.social
    link
    fedilink
    English
    arrow-up
    18
    ·
    4 months ago

    A whole bunch of welds in nuclear reactors are visually inspected using cameras duct taped onto the end of incredibly long poles which also get duct taped together. This would be the inside of BWR plants near the fuel and jet pumps. There is also an “art” to moving the cameras and poles around to get the shots you need. And if you get stuck the talented people know how to get you unstuck. There are also cameras just duct taped to ropes that the camera handler “swims” to certain spots.

    Don’t get me wrong, we have cool ultrasonic inspecting robots as well, but I was absolutely blown away by what visual inspection looked like in practice.

    PS: The high dose fields make the camera look like it is being blasted with colorful confetti because of the high energy particles bombarding the camera module.

  • CaptnNMorgan@reddthat.com
    link
    fedilink
    arrow-up
    12
    ·
    4 months ago

    Dog groomers get almost zero legal repercussions for mistreating dogs. It has to be undeniable that the groomer injured the dog on purpose before anything really happens. That’s why it’s SO important to trust the person grooming your dog if they’re the type of breed that needs it.

  • csolisr@hub.azkware.net
    link
    fedilink
    arrow-up
    2
    ·
    4 months ago

    @protein Many things that you’d think would be under lock and key… are not. Credentials for, say, a database of subscribers to a telephone company? Just ask the team and say you’re working on an integration, they’ll happily send you the password in plain text

    • lil_shi@programming.devOP
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      4 months ago

      Although it’s not that simple, it’s way easier than an average Joe would think. That’s how one of the most wanted hackers, Kevin Mitnick, had his way around stuff through social engineering.

  • miridius@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    4 months ago

    Most software is a terrible pile of unreadable code with no tests and horrible architecture choices, that somehow manages to keep working just through the power of years of customers finding bugs and complaining loud enough to get them fixed.

    If you write any automated tests at all, you’re already better than most “professional” software companies. If you have a CI/CD pipeline, you’re far ahead.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 months ago

    The majority of technologies that power the internet were developed in the 80s and refined in the 90s. Everything since then is built as a layer of abstraction on top of those core technologies.

  • cooltrainer_frank@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    5 months ago

    Former process engineer in an aluminum factory. Aluminum foil is only shiny on one side and duller on the other for process reasons, not for any “turn this part towards baking, etc” reasons.

    It’s just easier to double it on itself and machine it to double thickness than it is to hit single thickness precision, especially given how much more tensile strength it gives it.

    Also, our QA lab did all kinds of tests on it to settle arguments. The amount of heat reflected/absorbed between the two sides is trivially small. But if you like one side better you should wrap it that way, for sure!

  • Honytawk@lemmy.zip
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    5 months ago

    The world is littered with fake empty buildings used to obscure phone line junctions and internet provider stuff.

    Almost every neighbourhood has one. But they look like normal houses, so you can never tell unless you know where to look for.