I’m just this guy, you know?

  • 1 Post
  • 27 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle




  • Sometimes I add mashed potato to it and then I deep fry scoops of it to put on my ice cream. Its like a Thai version of latkes.

    I also mix it with whiskey, variously bourbon or maple whiskey, maybe white dog, and use it for eye drops.

    Or you can put it in a food dehydrator to dry it out and make a powder of it so you can snort it.






  • SolidGrue@lemmy.worldtoMemes@lemmy.mlTime to start an internet war!
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    1 month ago

    I love disco fries & poutine, but its not an everyday thing for me. (Disco fries are like an American version of poutine with beef gravy & yellow American cheese instead of cheese curds)

    I make a dipping sauce from ketchup & mayo and will variously embellish it with things like mustard/dill relish/sriracha or worcestershire/garlic/oregano/lemon juice

    I also make a “buffalo ranch seasoning” with cayenne, garlic, vinegar powder and powdered ranch dressing.

    Cheese & bacon bits with sour cream is another favorite.



  • Yeah, sorry… My head was in 1000 different places when I wrote that. Sloppy of me.

    Overall I agree with the general statement that less code is better, except perhaps in this case it is not.

    What I had been trying to say is in-browser privacy implementations are liable to be incomplete from the perspective of privacy minded users because the software publishers, say, Mozilla, are competing for market share of installed, default browsers. One way they maintain market share is by having the fastest and most accurate page renders for the widest base of use cases. To do this requires, in part, some cooperation from website developers whose vested interest in part is in driving ad serves.

    Therefore, it’s in the browser publishers’ interest to implement enough privacy and blocking features to effectively stop malware and common nuisances, but not completely cripple ad blocking since ads are a key part of web site operators’ revenue. They’re trying not to alienate that part of the web economy such that their browser suddenly starts hitting those “please turn off you ad blocker or select another browser” paywalls.

    Mozilla pretty much said this was the case a few years ago when they opted not to turn on the privacy features by default in new installs because the advertisers threatened to start hobbling websites for Mozilla browsers. I don’t know that the situation has really changed much since then.

    Anyway, my point was that the in-browser privacy features are a good start and should be enabled, but also that they amount to little more than a fig leaf over the question of effectively blocking ads. Loading the adblockjng extensions accomplishes a few things for the user. First, the extensions grant a more complete, uncompromised blocking experience for the user. Second, it grants the user finer-grained control over the whole web experience, letting the user decide what ads and cross-site data sharing occurs. Finally, the code is independent of the browser and so it doesn’t alienate the site owners from the browser publisher.

    For Mozilla, it shifts the responsibility of incomplete page loads and breakage onto the user, which in my opinion is where we want it.

    That’s why I’m advocating for doing both in this case: because the browser publishers have a vested interest to remain relevant in an economy that wants you to see the ads, and will do everything it can to make you click them. The best defense against for the user that is a multilayered approach.

    Finally, I do want to acknowledge that I’m using the terms “privacy” and “ad blocking” too loosely here since they are separate, distinctly nuanced topics. The extensions help more in the ad blocking space than the privacy space, but in what I wrote I think its fair to say that overall the extensions do improve outcomes where the two spaces intersect.

    Anyway, nice chat. Thanks for keeping me honest





  • SolidGrue@lemmy.worldtoAsklemmy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    2 months ago

    You’ve asked a similar question here before this post. Have you been naughty? :-)

    At your uni, you probably have what’s called a reasonable expectation to privacy-- the terms of use for accessing the computer and network facilities would be spelled out at your uni’s IT website.

    The information observed and reported on by their tools most likely amounts to what websites and services you looked up by name, and the IP addresses & ports you accessed while using their network. It will be things like start & stop times, protocol used, number of bytes transferred, and maybe some “flags” on the connection. Flags in this case are special markings on the data flow to give the network hints about how to hand that traffic most efficiently.

    MS Office Online, Notion, Gmail, they all use secured HTTPS connections, so the content is secured between you and the remote service.

    As long as you’re not doing anything illegal or that severely violates the terms of use laid out by the University, nobody will even notice your traffic. Hack away.


  • SolidGrue@lemmy.worldtoAsklemmy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    32
    ·
    edit-2
    2 months ago

    Eduroam is just a network of RADIUS servers that cross-honor authentication among participating institutions. If your org participates in Eduroam, it means users from your org can connect to the eduroam WiFi SSID at other orgs, and vice-versa. It’s helpful for traveling academics and visitors from other .edus

    It’s also frequently used to authenticate access to online resources like online libraries, journals, and research infrastructure. Useful for when schools collaborate on grant projects.

    The eduroam service requires a CA certificate to validate the APs broadcasting eduroam’s SSIDs are providing the real service. The issuer of that certificate isn’t one of the well-known SSL certificate resellers, so it needs to be installed in your device’s CA store, or configured in your 802.1x WPA supplicant. The protocol used is EAP-TLS, if you’re curious.

    So what can the hosting institution see? Not much, from an authentication standpoint. Transactionally, the hosting institution sees a username and org name in an outer transaction. An encrypted payload with your user credentials is then tunneled to your home org’s servers which either validate or invalidate those credentials. If the home org validates, then the hosting org lets you connect.

    Beyond that, the network admins can “see” whatever they can normally see when you’re using someone else’s infrastructure: your DNS queries, the application ports you use, a lot of encrypted SSL/HTTPS traffic, plus the contents of anything that isn’t encrypted or sent over SSL.

    Some orgs disallow tunneling traffic out when you’re on their eduroam, so sometimes IPSec, SSH, Tor, and maybe even WireGuard are disallowed.




  • I see Systems Engineering analogies in a lot of complex natural systems. It’s a great model to understand how the world around you works, as long as you remember it’s only a model.

    For example, I optimize my navigation around town sort of like the OSPF network routing protocol. I consider the speed limit & number of lanes to be analogous to the link cost, traffic lights as Layer 3 hops, and stop signs as Layer 2 hops. I consider the local highways to be my “backbone area” so navigation is optimized to find the shortest path from wherever I am to the nearest major highway. Sometimes the solution takes me a mile or two out of my way, but I’ll avoid 4 or 5 busy lights by taking a back road or cutting through a residential block.

    In fact, the airline network is similarly structured: for a given carrier, routes among their hubs are their backbone area, and routes between regional airports in different regions connect through one or two hubs. As a traveler between two regional airports, you’re likely to fly to the hub closest to your destination and meet a second leg back out the the other airport. All to better if you just live near a hub.