doodoo_wizard

joined 3 weeks ago
[–] doodoo_wizard@lemmy.ml 3 points 14 hours ago

You’re gonna have to go a few years back to hit all the goals you have, but a 3060 12gb or even 3070 if you can get one under your price point is gonna have at least 12gb of ram, be near your tdp, maybe over but you can set a power limit, allow you to work with llms and have good linux support.

[–] doodoo_wizard@lemmy.ml 2 points 14 hours ago

Yeah but do you think that a frontend that makes ten requests for tags, including somewhere between 3 and 6 tags in the db and between 3 and 6 tags not in the db with the actual tag the user wants to know about as well would add enough obfuscation to prevent that?

[–] doodoo_wizard@lemmy.ml 1 points 19 hours ago (3 children)

Apologies, I didn’t want to assume you knew how hibp works based only on your verbiage. I think I misread your comment and assumed you were implying they werent trustworthy or something.

Out of curiosity, what do you think the vector of attack would be if someone had a honeypot of tokens they were offering people a look at?

Get the browsers unique id and tie it to the token they’re asking about? How would that not be defeated by naming a bunch of queries about extant tokens?

The problem I see is that there’s this public knowledge thing, the license tag number, and it requires monitored access to a restricted system in order to correlate that public piece of information to a human being. So would just fuzzing requests with tags in the db work?

[–] doodoo_wizard@lemmy.ml 7 points 23 hours ago (7 children)

What would you say is a better way to allow users to check if their password is in, last time I looked, over a petabyte of data breaches than to have them enter it?

[–] doodoo_wizard@lemmy.ml 2 points 23 hours ago

If you pay ten bucks you can get a vps with a few gigs of space for a year and just put your kilobyte of config files there. If you don’t want the malicious vps admin to crawl it you can encrypt a zip of them.

It costs ten bucks but you get an offsite storage vault with a public ip and in some scenarios that’s desirable.

[–] doodoo_wizard@lemmy.ml 3 points 23 hours ago

This is what MIT license defenders have to deploy to mimic a fraction of our power.

[–] doodoo_wizard@lemmy.ml 4 points 1 day ago

Yeah the technology existed forever but it wasn’t until a developer didn’t have to target the floppy disk or cd rom or even really pay for hosting at all in most cases that it took off.

[–] doodoo_wizard@lemmy.ml -2 points 1 day ago

I am also not excited for the year of the linux desktop. It’s genuinely gonna suck.

[–] doodoo_wizard@lemmy.ml 12 points 1 day ago

They are waiting for a new jurisprudence that has decided how police are expected to respond to information from the panopticon.

If the new decisions end up painting a picture where it’s okay to be shown hearsay by the panopticon then as long as there’s a sound investigation and solid evidence they’ll be able to keep using these systems, now with codified policies.

If it comes down that cops aren’t supposed to look at the panopticon then they will just sell them off to people who can (the prison system) and cover up everything they did as best as is possible.

[–] doodoo_wizard@lemmy.ml 4 points 3 days ago

It lowkey literally is. They make these stretchy pull over balaclava things as athletic wear that you can pull up over your face.

[–] doodoo_wizard@lemmy.ml 0 points 3 days ago

You can always cover your face in public. Islam is the light.

[–] doodoo_wizard@lemmy.ml 3 points 3 days ago* (last edited 3 days ago) (3 children)

Just cover your face in public

E: Islam is the light

view more: next ›