“The south shall rise (ahem) again!”
while(true){💩};
“The south shall rise (ahem) again!”
deleted by creator
Zero-party state let’s gooo
Who touched the boats?
How’d they taste?
That was a joke… Ha ha. Fat chance.
Oh yea definitely, I know this pain very well
File headers, magic bits, all sorts of stuff. Plus you can (and they do) try to load common file types, so if a PNG isn’t loading correctly, it fails the test.
“Oh sorry, looks like we couldn’t decrypt that traffic, those packets went to the burn pile”
“Hey there customer, if you want internet access on our network (the only one available in your area), you have to install our intermediary certificate on your machine!”
Look into libaxolotl
(AKA “OMEMO”), it is the same system Signal uses and is highly standardized.
True programmers know that novice code is a rite of passage. Every programmer worth their salt looks at their own older code and cringes at it. Most people who do this for a living are more likely to give helpful pointers rather than tear you down, if anything.
If someone is being a jerk to you about your code, stop listening to them immediately and walk away or block them.
This needs to get added to the common nomenclature as the third option 😂
We use one of these at work! There are a couple of companies offering these solutions such as PaloAlto, Zscaler, etc. and they are typically of the “Next-Gen Firewall” variety (I.e. they scan the content of the packets rather than just routes and ports and such).
The way they work is basically that you establish VPN connections to their endpoints, and they scan the traffic as it passes through. Like a VPN, you get a new IP address that is shared with other customers, but there is a way to pin your original IP in the packet headers if you need.
These connections can be handled via one of a few ways:
Software on the workstation (best option as it allows deeper traffic routing and control, as long as your workstations are locked down)
IPSec tunnels configured on the building’s router service’s endpoints/datacenters
GRE tunnels configured on the building’s router to the service’s endpoints/datacenters
A physical firewall box that sits in front of your other hardware that does any of the above OR something bespoke
Note that unless you have option 4, none of these replace traditional “dumb” firewalls. If you’re still using IPv4, you still need a NAT firewall.
Matrix isn’t super private though. It’s halfway there, but compared to something like XMPP, it falls short due to the fact that any instance a user federates with gets a gigantic copy of all of their metadata, and the server operator can do whatever they want with it. So all you would have to do is spin up a new host, message a target user and get them to respond, and you’re done.
And ruin it for its current residents?
not even doom music
He puts people in their place and takes no prisoners while sipping the blood of shit-committers out of wine glasses forged from their skulls.
I’ve always been a fan of for-ged-joe (like forget Joe, but with a d instead of a t)
Why does Lemmy not prevent duplicate links, at least within a time window?