• 0 Posts
  • 11 Comments
Joined 2 years ago
cake
Cake day: June 30th, 2023

help-circle
  • 1000% this. I’m now rediscovering my rather fluid gender identity and attraction to both genders that started in my late 30s. Looking back, all the signs were there, I just kept things private as it wasn’t socially acceptable. Had some outlet with the teen goth scene, which was nonexistent in college. Grew up in a heavily catholic influenced region.

    Have an awesome wife who is supportive and revealed she is (now was) also closet bi from the same generation.

    We moved away from there, but when I visit family all the churches are run down and closed. I smile every time knowing their grip is loosening. All the LGBT hate today just tastes like desperation.


  • I’m both experienced and know jack shit because there is just too much to learn. I just started using it (1998ish) to make cool looking UIs. Its been my daily driver for 15 years now.

    You will never learn it all. Over time you may become more familiar with the terminal or you may not. Doesn’t matter. You do you.

    Its pretty easy to test drive. Grab a distros “Live CD” version, put in on a thumb drive, reboot and play around. This wont be persistent. When you’re ready, install it on an external SSD. Play around some more now that your edits will be persistent. You’ll mess up. Take notes. Start again once you’ve hosed your system.



  • sloppy_diffuser@sh.itjust.workstoLemmy Shitpost@lemmy.worldevery damn morning
    link
    fedilink
    English
    arrow-up
    27
    arrow-down
    1
    ·
    7 months ago

    You need downers to ride the uppers and get that perfect drug fueled circadian rhythm going.

    Energy drinks during the day and a nice indica bong/dab rip, edible, or blunt in the evening.

    Warning: If things have escalated to cocaine/meth/adderall to go up and opiates and a handy from the local masseuse to go down, you’re probably riding the rhythm too hard.

    /s please take care of yourself!





  • While I haven’t seen data to back this up, another Lemmy user called out that Intel chips may have support for running secure code the user cannot modify. The results are signed by an encryption key on the motherboard/CPU that cannot be extracted to fake the signature.

    So let’s say Chrome asks this hardware module to hash the executable code and some state for itself currently in RAM and sign it with Intel’s private key on the motherboard/CPU. The “some state” portion ensures the hash is always unique. Maybe it is just a timestamp. Regardless, this helps the attestation server know Chrome has not been modified because the hash is unique and cannot simply be captured in flight once and then replayed/faked over and over like a user-agent string.




    • Alice gives Bob a Secret Note.
    • Alice and Bob agree on a way for Bob to scramble the Secret Note so that Alice can unscramble it.
    • Bob scrambles the Secret Note.
    • Bob gives Carol the Scrambled Secret Note.
    • Carol gives Alice the Scrambled Secret Note.
    • Alice descrambles the Scrambled Secret Note.
    • Alice tells Carol the Secret Note came from Bob.

    Now, Carol trusts Alice and Alice trusts Bob. By passing this note around, Carol can trust Bob since Alice trusts Bob and she trusts Alice.

    Passing the note around tells Carol (Web Server) that Bob (Web Browser) has trust from Alice (Attestation Server) and is not some imposter just claiming to be Bob.