• 0 Posts
  • 516 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle








  • Indeed, and currently there exist several cities that execute that ideal more-or-less. NYC is the obvious one, but Washington DC, Chicago, hell even the worst city in America, San Francisco does it adequately. The only reason we can’t have that kind of public transit everywhere is because no one is forcing city officials to plan for the long-term, and reduce sprawl.

    Zero Growth Lines are a great way to mandate density, without any other policies needed.






  • I guess having a thick provisioned VM image on your laptop means that you are hiding something. Again if the evil government you are trying to hide something from doesn’t need reasonableness as a reason to detain you, then who cares? No matter what you do you are rolling the dice every time you interact with them.

    Which is of course similar to the US today, so if I needed to hide something from them I’d make sure that once i’m legally compelled to give my password they at the very least wouldn’t have what they are looking for, since there is no way I could prove I didn’t have it anyway.






  • I’m a network engineer and I run ipv6 natively in all of our datacenters. There are even a handful of end systems that have ipv6 native networking stacks with ipv4 sockets for our non-ipv6 compatible applications. IPv6 issues are basically self-inflicted at this point by companies that see their IT systems as cost centers, or by basilisk directors who’s knowledge stopped in the 90’s.


  • PowerCrazy@lemmy.mltoLinux@lemmy.mlSSH as a sudo replacement
    link
    fedilink
    English
    arrow-up
    26
    ·
    edit-2
    5 months ago

    Seems novel. But from a security aspect, if OpenSSH has security vulnerability that allows an unauthenticated user to login, via whatever means, once you are in the system as a non-privileged user, you are now free to use the same vulnerability to get root.

    Basically this exercise is like using two locks that have the same key to open them. If the same key opens them, then a weakness in one, is now a weakness in the other so why bother with two identical locks?