BrikoX
Have strong opinions, but welcome all civil discussions.
Mastodon: @BrikoX@freeradical.zone
- 1.26K Posts
- 393 Comments
BrikoX@lemmy.zipto News@lemmy.world•'Wildly underprepared’: National Guard troops seen sleeping on floors in exclusive photosEnglish151·1 month agoThey are not getting paid anything in this case. Usually they get paid by the state when doing work there, but since they were federalized they are under federal juridistion now and won’t get paid by the state for deployment. And Trump isn’t providing federal funds, hence them sleeping on the floor, having to pay for food themselves, using their own equipment.
BrikoX@lemmy.zipto Technology@lemmy.world•lemm.ee is shutting down at the end of this monthEnglish11·1 month agoGreat admin team, public finances, reasonable rules, good defederation policy, data is hosted in the EU.
BrikoX@lemmy.zipto Technology@lemmy.world•lemm.ee is shutting down at the end of this monthEnglish28·1 month agolemmy.zip would be my recommendation.
BrikoX@lemmy.zipOPto Cybersecurity@sh.itjust.works•The US proposes rules to make healthcare data more secureEnglish11·7 months agoDefinitely. Once the company reach certain level of annual turnover it must implement A-Z security measures or be fined out of existence would be great. I even go as far as making it personal liability for upper management if they deliberately try to circumvent those requirements.
BrikoX@lemmy.zipto Selfhosted@lemmy.world•Postiz (v1.6.6) - open-source social media scheduling toolEnglish11·9 months agoSince you deleted your post on !opensource@programming.dev, reposting my comment.
Another AI project that will probably be dead in a few months. Also open core not open source as many of the features are not available via self-hosted version.
Self-hosted version which source is available and hosted-version which is not public, are not the same. Or at the very least, planned to not be the same by your own admission as you talked publically about planning on adding paid-only features to hosted version.
Take out “AI features” and you are left with nothing, so yeah, AI project… It also relies on proprietary AI models that you don’t own, so it can stop working at any point and that would be out of your control.
BrikoX@lemmy.zipto Free and Open Source Software@beehaw.org•Postiz (v1.6.6) - open-source social media scheduling toolEnglish5·9 months agoSince you deleted your post on !opensource@programming.dev, reposting my comment.
Another AI project that will probably be dead in a few months. Also open core not open source as many of the features are not available via self-hosted version.
Self-hosted version which source is available and hosted-version which is not public, are not the same. Or at the very least, planned to not be the same by your own admission as you talked publically about planning on adding paid-only features to hosted version.
Take out “AI features” and you are left with nothing, so yeah, AI project… It also relies on proprietary AI models that you don’t own, so it can stop working at any point and that would be out of your control.
BrikoX@lemmy.zipto Technology@lemmy.world•EU considers calculating X fines by including revenue from Musk’s other firmsEnglish1·9 months agoI love how you quoted all the parts expect the one that mentions where for this to even apply the person have to misuse corporate assets in the first place. Follow the law, and you are good in the EU, no matter which size business you are.
If Elon Musk’s rights as a company owner can be violated, who says yours can’t?
Here you go again. If they decide to go through with it, no Musk rights will be violated, there is extensive legal precedent in the EU that covers this.
BrikoX@lemmy.zipto Technology@lemmy.world•EU considers calculating X fines by including revenue from Musk’s other firmsEnglish3·9 months agoIt can’t be irrelevant as it’s the primary factor in deciding if the fine will even be brought. But ignoring that, there are clear limits. This would only apply to cases where corporate assets were used as personal ones. Hence, the limitation to private companies that have sole owners.
And you talk like this is some novel never heard of approach. Personal liability applies to many actions under the law, just corporations managed to lobby it down for themselves. And your scaremongering of small family business becoming some governments targets are unfounded.
BrikoX@lemmy.zipto Technology@lemmy.world•EU considers calculating X fines by including revenue from Musk’s other firmsEnglish6·9 months ago<…> your family’s bakery or your neighbor’s paralegal office.
Are not subject to DSA. For the most part DSA only covers companies which have more than 45 million users in the European Union.
BrikoX@lemmy.zipOPto Cybersecurity@sh.itjust.works•1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companiesEnglish7·9 months agoThat looks to be a troll. ZendeskTeam account was created 1 hour ago and is not part of the org.
But the help article linked is pathetic.
BrikoX@lemmy.zipOPto Mildly Infuriating@lemmy.world•TechSpot can't help but sellout in their own editor picksEnglish4·10 months agoOnly in UK English, US English doesn’t.
Don’t take this as an insult, but you really need to come back when there is an independent audit that confirms the claims. Verifying cryptography is not something even a tech-savvy person can do, even if the source code is available.
BrikoX@lemmy.zipOPto Cybersecurity@sh.itjust.works•North Korean hackers target Python devs with malware disguised as coding tests — hack has been underway for a yearEnglish2·10 months agoI noticed this today too, no idea what is going on. Need to reach out to the instance admin, since it’s only happening on my instance as far as I can see.
BrikoX@lemmy.zipto World News@lemmy.world•How a Single Family Was Shot Dead on a Street in GazaEnglish3·10 months agoICC can’t impose death penalty as it’s against international human rights law.
BrikoX@lemmy.zipOPto Cybersecurity@sh.itjust.works•Found: 280 Android apps that use OCR to steal cryptocurrency credentialsEnglish20·10 months agoMcAfee blog offers some more details: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-android-spyagent-campaign-steals-crypto-credentials-via-image-recognition/
Added to the post body.
BrikoX@lemmy.zipOPto Privacy Guides@lemmy.one•YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelEnglish16·11 months agoIt’s definitely not something a regular user should panic over. But it’s a huge deal since a lot of high security, sensitive targets also rely on the same library.
BrikoX@lemmy.zipOPto Privacy Guides@lemmy.one•YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelEnglish7·11 months agoWhile the researchers have confirmed all YubiKey 5 series models can be cloned, they haven’t tested other devices using the microcontroller, such as the SLE78 made by Infineon and successor microcontrollers known as the Infineon Optiga Trust M and the Infineon Optiga TPM. The researchers suspect that any device using any of these three microcontrollers and the Infineon cryptographic library contains the same vulnerability.
Both. The cryptographic library in question is also used in other cryptographic applications too, so it’s a huge mess.
Full of them in US equipment though.