Show newer

@travisfw @jeremy_list @fleeky I think that's the direction the IPVM foks were going. github.com/ipvm-wg/homestar/

In P2P apps what you can do is move that "server code" onto the client directly. Then you focus on local first DBs and sync engines for getting clients on the same page.

The big question with "serverless functions" is how you can manage authority and trust. Apps that require secrets to access a DB need trusted servers. At that point you either need creds per client or skip central DBs

I miss finding random B movies at the local video rental place.

@travisfw @fleeky could you elaborate on what "serverless" means to you? Just stuff like cloudflare workers?

Eyyy, fixed the weird issue I had where dark mode wasn't working for me in @agregore Next I'm gonna add a keyboard shortcut for "go up one directory level" since I use that a lot in file browsers

Celebrity worship makes me sick to witness. Placing people above others soley because they get more attention is immoral.

Mastodon terminology question 

@tty That's aligned with my understanding too.

IMO contracts should require all parties to paraphrase them from memory in addition to the wording in order for them to be enforceable. If that's not possible then it's not fair to say there's enthusiastic consent on all sides.

@arichtman So glad I haven't been full-body de-gloved yet 🥰💜

Got like 8 quadrillion cookies at once while my CpS is only 600 billion. 😎👍

Show thread

strat: Keep a 7x 15 mins CpS chunk of cookies unspent so that when you get a golden cookie that increases production you can cast "Conjure Baked Goods" to get a hefty chunk all at once. Even more if you wanna gamble on getting a golden cookie that uses factories or something as the bonus.

A shitpost that's been brewing in my head for a while now

Got to tge point in my training where I'm starting to type actual words. Defs gotta make my fingers move in weirder ways than a regular two handed keyboard. 😅

Lamphone is a clever, optical, side-channel attack that can turn a simple lightbulb into a makeshift microphone. It works because the filament inside a lightbulb subtly vibrates in response to sound waves, like someone talking. These tiny vibrations change the amount of light the bulb emits. By pointing a light sensor or photodiode at the bulb from a distance, a lamphone attack can detect these variations in brightness and convert them back into audio signals, effectively “listening in” on conversations without touching the microphone or the room.

It’s a striking example of how everyday objects can be exploited for surveillance, showing that even something as mundane as a lamp can leak information if you know what to look for.

#OpticalPhreaking #SideChannelAttack #CyberSecurity #Privacy #InformationLeak

Show older
Mauvestodon

Escape ship from centralized social media run by Mauve.