Show newer

@b0rk Especially that you can manually manipulate the remote ref, and then there's no way of telling what that means.

@BBCRD

What does "please use your device's built-in loudspeakers" mean for people using a desktop computer? (I use a desktop and _have_ no speakers: I exclusive use headphones with it.)

@grrrr_shark

My own experience is that games nearly always work with proton, and when they don't it's not because of something that needs to be tweaked, but some bullshit like extremely invasive anti-cheat that won't work on Linux at all. I had the latter experience once (or twice, I'm not sure) out of ~100 games on Steam I've played.

@grrrr_shark

I'm not really the target demographic of your question (I don't use Windows since quite a long time). That said, protondb.com/ will give you a clue about runnability of games using Steam's Windows emulation stack.

@patcharcana another search term to find episodes is "Sachgeschichten" (the show is 90% that and 10% animated shorts of the titular mouse doing something amusing -- those are called "Lachgeschichten")

If you want to avoid sadness, avoid the episodes (I think 3 in total) subtitled Nachkriegsmaus (they are about the life in just-post-WW2 Germany).

robryk boosted

The fact that the opposite to “steerswoman“ is “figurehead man” is absolutely perfect, you definitely cannot expect a truthful answer from one of these.

@patcharcana

In case you know German (even at a basic level), you might enjoy Sendung mit der Maus (a TV show for kids that shows how various things work/are made that's been running since 1970s).

robryk boosted

Wir tauchen ab ins Reduit, folgen den Irrwegen von Überwachern und gespeicherten Daten, die fast vollständige Abziehbilder unseres Lebens formen.
❗Heute Abend❗ im Theater Neumarkt – mit @adfichter, @sylkegruhnwald, @karpi, Kristina Malyseva u. a.

republik.ch/veranstaltungen/wi

@freemo @peterdrake

Still happening, albeit with a smaller number of copies: I've got two notifications for end of the following poll: mastodon.neilzone.co.uk/@neil/

Stories by Naomi Kritzer are optimistic (sometimes unrealistically so) and very charming. (This is based on a sample of size 2 for now.)

@dpiponi

Ah, sorry, I wanted to ask whether "it's hard to guess how hard" applies to average or worst case or both.

@dpiponi

How hard it is on average (averaged over instances), at worst, or both?

@b0rk

Currently checked out commit or a reference to it (depending on how it was specified when checking out). I expect e.g. `git checkout <file>` to pull that file from HEAD.

I'm not sure what happens if HEAD points at a ref and I modify that ref using an operation that doesn't normally affect working tree/index.

@richlowe @mcc

`ldd -r` will also complain if any symbols cannot be found. I'm not sure whether loading a library with LD_PRELOAD will always do that.

Internally, `ldd` starts `ld.so` and instructs it to load this single dynamic library/executable via cmdline.

@axleyjc @kaoudis

Ah, so when talking about controls effectiveness you'd have less/no qualms to consider probability of control failure under the assumption that the event it's against is occurring?

> I think the same safety lesson applies to security: improbable things happen all the time. It's more important to have robust failure modes.

The place where I don't see how to apply this is with code changes/code review -- after all any controls that are implemented in your codebase can be negated by changes to it, which might be improperly reviewed.

@axleyjc @kaoudis

If you focus nearly exclusively on impact, how do you judge controls that mostly (only?) affect probability? (For example, most detection mechanism I can think of are imperfect, so they have a range of potential impact reduction between "down to 0" and "no reduction", with some nonnegligible probability assigned to "no reduction".)

@kaoudis

Totally agreed on motivations of attackers.

One reason why I think talking about malicious actors makes sense is that in some scenarios you will have actors who unwittingly help the attacker. Their expected range of behaviour is part of the threat model, so they should be mentioned somehow while being distinguished from the attackers (who are unconstrained in their range of behaviour save for things they can't do).

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.