docker compose down --remove-orphans
JoshCodes
- 1 Post
- 51 Comments
Can the propaganda have more pixels next time please and thank you, how am I meant to understand the wishes of glorious leader if I can’t even make out the words?
JoshCodes@programming.devto
Technology@lemmy.world•Your Phone Isn’t Eavesdropping on You to Show You Ads (It’s Worse Than That)English
1·6 months agoYep sorry, I said a dumb thing.
My point is probably more to do with the marketing around VPNs than anything else. As you very nicely put, there are a thousand ways to track someone without having their IP address. VPNs don’t cover all bases but the marketing teams talk about them like they do.
Amazon can still sell your info to data brokers without having your home ip address: they have your email, name, delivery address and search history as a start.
JoshCodes@programming.devto
Technology@lemmy.world•Your Phone Isn’t Eavesdropping on You to Show You Ads (It’s Worse Than That)English
1·6 months agoI am not OP, I just decided to reply.
JoshCodes@programming.devto
Technology@lemmy.world•Your Phone Isn’t Eavesdropping on You to Show You Ads (It’s Worse Than That)English
8·6 months agoOooo close. It’s a shit algorithm that favours the company that paid the most for the spot. So people rely on paying for a good spot to get promoted on the most minor fucking chance of someone buying their shitty item. I heard someone say the average best item you search for is found 17th place.
They’re scamming the buyer and the seller and profiting off of being terrible for everyone.
JoshCodes@programming.devto
Technology@lemmy.world•Your Phone Isn’t Eavesdropping on You to Show You Ads (It’s Worse Than That)English
45·6 months agoThere are definitely some VPN providers to worry about.
VPNs are a security tool but they don’t protect people as much as they think. They hide DNS traffic your ISP would have received, so that your ISP can’t tell everyone which cuckold or affair site you access (except you probably forgot to turn the VPN on one time or another so…)
Your ISP can still see IP addresses you connect to, they forward all your traffic[I need to proof read before I press post - this is just misinformation]. Good opsec is a nightmare. Ad blocking does more for less cost than getting a VPN will ever do (except for certain human rights circumstances but I’d wager they’re actually going to be careful).My personal tip is use DNS over HTTPS/TLS where possible, and don’t use Cloudflare or Google. Add an ad blocker and it’s far easier to setup and way more cost effective than VPN.
I’ve got no experience with it but at first glance it seems like a very positive direction for the project:
Collaborate, not Compete
We are proud of our community and closely interact with projects around it. If we build a platform feature that can be useful in an upstream project, we prefer to contribute it to that project, rather than keep it in the platform.
You don’t hear that often enough these days, everyone seems to be siloing information.
JoshCodes@programming.devto
Selfhosted@lemmy.world•Why is my server using all my Swap but I have RAM to spare?English
7·7 months agoCounter point, set the ‘swappiness’ lower than the default 60. I’ve set mine to 30 and the system boots a lot faster. You could research and consider 10-20.
JoshCodes@programming.devto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
5·7 months ago100% agree, that is a “totally for fun” exercise
JoshCodes@programming.devto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
13·7 months agoFor added funs run an SSH tarpit to fuck with the attackers, something like endlessh.
JoshCodes@programming.devto
Mildly Infuriating@lemmy.world•"You should probably just throw it away"English
42·8 months agoThat entire sentence is unintelligible marketing drivel.
JoshCodes@programming.devto
Memes@lemmy.ml•USA’s presidents have all been awful humansEnglish
2·8 months agoI think he was a shitty husband? From memory he didn’t cope well after one of his sons died in the civil war and took it out in his personal life. He was also horribly depressed. Not that mental health was something people even considered at that time, so it’s not like seeing a therapist was on the cards.
JoshCodes@programming.devto
Technology@lemmy.world•Russia-aligned hackers are targeting Signal users with device-linking QR codesEnglish
5·9 months agoReliance on security by obscurity is unacceptable, except when the obscurity method is the oceans entire fucking surface area.
JoshCodes@programming.devto
Programmer Humor@lemmy.ml•it's how the basic linear algebra subprograms are implementedEnglish
3·9 months agoYeah look that was the front page of the repo talking about how it has C/C++ and Fortran code, sorry for not reading the docs and finding out that yes they still use C/C++ and Fortran code in the form of OpenBLAS which is a dependency… f2py is just a method of doing the following:
F2PY facilitates creating/building native Python C/API extension modules that make it possible
-
to call Fortran 77/90/95 external subroutines and >Fortran 90/95 module subroutines as well as C functions;
-
to access Fortran 77 COMMON blocks and Fortran 90/95 module data, including allocatable arrays
from Python.
Correct me if I’m wrong here but if you’re implementing an api for one programming language to talk to another then that means you have 2 programm-
I wake up as a lizard. The meaning of kernels, subroutines and programming languages is already fading. I realise the rock I am lying on is slightly in a shadow and move into the sun. Might eat a bug later…
-
JoshCodes@programming.devto
Programmer Humor@lemmy.ml•it's how the basic linear algebra subprograms are implementedEnglish
143·9 months agoIt provides:
- a powerful N-dimensional array object
- sophisticated (broadcasting) functions
- tools for integrating C/C++ and Fortran code
- useful linear algebra, Fourier transform, and random number capabilities
Not according to the repo I sourced from your message.
JoshCodes@programming.devto
Programmer Humor@lemmy.ml•Recently spent several hours fixing a bug like thisEnglish
1·10 months agoGot introduced to the phrase “your tongue was in the wrong spot in your mouth”, for something that can’t be reproduced.
JoshCodes@programming.devto
Ask Lemmy@lemmy.world•I want to spend a half hour this evening reading an essay that contains ideas I have probably not considered before. What can you recommend?English
11·10 months agoYep, and an intelligent discussion could have been had, if this had been the point of the article. Instead we got 4 paragraphs stating which people are saying this phrase and the rest discussing how much of a loser those people are.
JoshCodes@programming.devto
Ask Lemmy@lemmy.world•I want to spend a half hour this evening reading an essay that contains ideas I have probably not considered before. What can you recommend?English
11·10 months agoI will acknowledge that is in there but he spends the entire article talking about how much of a loser you are for saying Ugh capitalism, then throws in those two sentences. That’s not an actual discussion, it’s the article equivalent of drawing the person you disagree with as the virgin loser and yourself as the chad.

Yeah so targeting individuals or specific organisations is pretty hard. It sounds dumb but how do you get someone’s phone number if they don’t give it to you? Its hard unless you’re determined tbh which most people aren’t.
Most hackers setup watering hole style attacks, or use phishing which is roughly the same concept. Basically they cast a wide net and see what they can grab, like the browser credentials of Debra from accounting who knows everything about compound interest and nothing about opening an
.exefile in an email. There are some big game hunting groups, and the LinkedIn breach made some waves (see the fappening), but your run of the mill discord-as-a-c2 style hacker isn’t going after rich people.Someone “hacking a phone” likely put a kitchen scale iPhone app on the app store, which when first opened asks for permissions for microphone, camera, text messages, contacts and file storage, and sends all that information to Argentina for a week or so until their app gets banned.
Also, the most likely person to hack your phone seems to be someone in your household, abusive parent or spouse sorta thing. Most common devices to get hacked are laptops, usually windows. Its just kinda hard to hack a phone. Unless you know a lot about compressed image formats and the iPhone messages app apparently because NSO made like 5 zero days in a row out of that.