Senja boosted
Senja boosted
Senja boosted

Feeling validated for last summer when, amid much more urgent and necessary house fixer-upper tasks, I painted the porch ceiling blue instead (it's a southern thing!).

A lovely ode to front porches, from Kerala Taylor:

medium.com/human-parts/an-ode-

Senja boosted

me folding laundry: ugh another sock is missing

puppet on my hand: how does that keep happening

Senja boosted

A kid falls out of tree: “I'm fine!”

An adult sleeps on their neck at a slightly askew angle: “I have to turn my whole body to look at you for the next week.”

Senja boosted

Blues: The world is fucked
Punk: The world is fucked and I'm pissed
Emo: The world is fucked and I'm sad
Grunge: The world is fucked and I'm medicated
Ska: The world is fucked and I have a trumpet

Senja boosted

Birds, Birbs and Borbs

I have just become heavily informed about a totally useless but otherwise awesome information. :ablobderpyhappy:

.
When Is a Bird a ‘Birb’? An Extremely Important Guide

audubon.org/news/when-bird-bir

.
What’s the Difference Between a ‘Borb’ and a ‘Floof’?

audubon.org/news/whats-differe

Senja boosted

Every company saying that their data is encrypted at rest with "strong encryption" is saying nothing. It's a free, effortless and shameless statement to boost the org's false security posture to the untrained masses. It's even worse when they say it to justify that their security was sufficient after a breach.

Encrypted data at rest just means they use the cloud. It's standard cloud practise. They give it basically for free at a button toggle. "Using military grade encryption" yes I know it's AES. That shouldn't make you feel any safer. Optus even said their unauthenticated API was protected by double layers of encryption! (TLS in transit and AES at rest!). That meant nothing, and did nothing to protect their breach. Why?

Because the threat models that encryption at rest protects against is someone walking into some data center and grabbing hard drives. And no one does that. Every piece of encrypted information stored by your business is constantly decrypted at some point for use - especially customer and production data. Any attacker who compromises your employees with access to cloud resources, or an application/system with access to those cloud resources will have credentials and permission to decrypt the data. Because at the end of the day encrypted data is just as useless to you as it is to the attacker.

My super power would be instant diarrhoea.

Senja boosted

it’s hard to believe that in this day and age people are still wearing fir

Senja boosted
Senja boosted

I hate “The Rainbow Fish,” but I love Topher Payne’s delightful alternate ending:
topherpayne.com/rainbow-fish

Senja boosted

Here's a #physiology teaching case that *everyone* who touches a ventilator needs to understand:

A 60 yo woman is intubated for hypoxemia from pneumonia. She has a SpO2 of 88% on PEEP +12 and 100% FiO2. PEEP is increased to +16 & her SpO2 drops to 80%.

What happened?

1/
1/

Senja boosted
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.