

I scanned a QR code once. I got JSON data back, with embedded links and other useless metadata.


I scanned a QR code once. I got JSON data back, with embedded links and other useless metadata.


How do you know the dogs which want to fuck and fight aren’t the smarter ones?
What if the other dogs don’t recognize the reflection as anything meaningful — not a tool, a reflection, …? In that case, at least the “dumb” dogs figured out that something’s up.
Edit: anthropomorphizing the idea that nonchalant reactions = understanding well enough to not care. There’s many reasons any particular dog may not fight a mirror. Particularly, they may just rely less on vision to determine whether something is alive or not. That would not indicate understanding, though… it would indicate the dogs understandably passive approach to things which don’t seem to have any significance. Closer to a lack of awareness than an actual understanding of any kind.


I don’t know, man.
This is a culture problem, which makes it more dangerous (actually). I don’t believe that there are deliberately coordinated efforts to usher in a new era of governance. I think there are fantasies of doing as much, hence technofascism. These billionaire bastards are just opportunists, though, with far too much power and far too much common interest.
The “more sinister power” is your economic system. It’s taken on the role of “the man behind the curtain.” Now, you have no one to wag your finger at.
Intelligence agencies are interwoven with the billionaire class. This isn’t at all a secret. SpaceX, Oracle, AWS, Azure, … they all support defense contracts. Are we to believe defense doesn’t include intelligence? The people procuring these deals are the billionaire class, and as such the billionaire class is interwoven with intelligence agencies.
The US has backpedaled norms to a point where it’s corrupt by default. Good luck.


__.--.____________.--.__
( _.------._ ).
'._.--' || '--._.' )
| |================| || (
| || | || )
| || _| || (
| || _.-' | || )
| || _.-' | || (
| || _.-' | || )
| |.-' | || (
| || | || )
| || | || (
| || | || )
| || | || (
| || | || )
| || | || (
| .---. | || )
| | | | || (
| | | | || )
| | .' | || (
| | ' | || )
| | '. | || (
| | | | || )
| |O__| .))). | || (
| || ( O O ) | ||
| ||===._ (_) _.===| ||
| || '-.-' | ||
| || | ||
| || | ||
| || | ||
| || ______ | ||
__| || / \ | ||_____
/__| || (\______/ ) | ||____/
/___|_|/ (________) |_|/___/
/_____________________________/


It’s ridiculous. It presupposes that cybersecurity doesn’t value or employ defense in depth. Completely untrue.
Look at the attack vector researchers were trying to solve when they created OAuth2.0 w/ PKCE.


Can you try thinking that through again?


I tried getting into the nerdy side. I have an old PC with only one NIC, but apparently it needs two in order to bridge to a WiFi AP? That makes sense, but I don’t have an old PC with two NICs. Also, my NIC doesn’t support as much bandwidth as I have supplied anyhow. Sad times.
Edit: the desktop is old enough that the mobo doesn’t have the slots I need. Effectively, I have to get a new old burner PC. It’s an old ThinkCentre with a dvd player built in.
Apple: Shhhh. sh. sh. sh. You like it. I like it. We don’t need to tell anyone. You want silicon or spit, this time?