• 8 Posts
  • 45 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle

  • If it’s showing at the bottom of the browser, then the browser thinks the link is a regular link, but clicking or copying it may invoke some JavaScript that either manipulates the link or simply redirects to the tracker site after an onClick event. I’d like to see this for my own curiosity. If my thought is correct, then there should be some way to disable that specific method call with uBlock or some other mechanism. I’m curious what happens with a text based browser or screen reader type browser. You could also trace the JavaScript and see what’s happening. If this is really happening with the big social media sites, it’s just a matter of time until a plugin is developed to correct the behavior.



  • Is it the responibility of any government to enforce a parental policy? What if I, as a parent, support my kid to view this stuff?

    At home, I was allowed to have alcohol with supper at family meals from about 13.

    I feel like the regulations should be to give parents control over their child’s activities if they so choose. While we’re at it, make it illegal to collect information about a person, parent or child, without their express concent. I don’t know how, but there are many smart people in the world that can probably figure it out.



  • It depends on what you do with Docker. Podman can replace many of the core docker features, but does not ship with a Docker Desktop app (there may be one available). Also, last I checked, there were differences in the docker build command.

    That being said, I’m using podman at home and work, doing development things and building images must fine. My final images are built in a pipeline with actual Docker, though.

    I jumped ship from Docker (like the metaphor?) when they started clamping down on unregistered users and changed the corporate license. It’s my personal middle finger to them.







  • I’m using Kubernetes and many of the apps that I use require environment variables to pass secrets. Another option is the pod definition, which is viewable by anybody with read privileges to K8s. Secrets are great to secure it on the K8s side, but the application either needs to read the secret from a file or you build your own helm chart with a shell front end to create app config files on the fly. I’m sure there are other options, but there’s no “one size fits all” type solution.

    The real issue here is that the app is happy to expose it’s environment variables with no consideration given to the fact that it may contain data that can be misused by bad actors. It’s security 101 to not expose any more than the user needs to see which is why stack dumps are disabled on production implementations.




  • In the early kernel (think pre 1.0), I “fixed” the CPU scheduler for performance. I gave too much privilege to user processes, who refused to relinquish control back to the OS.

    Another time I was working on a multiprocess bootup configuration (before systemd) in a configuration where the main process would orchestrate the workers. Well, the main process would fork a child to do the work, then the child process would fork a child process to do it’s work. It was infinite delegation and I ran out of pids.








  • I started down this path after discovering that iTunes was flagging some of my music that I ripped from my own CDs or my dad’s old records (that I now own). It shows on the iPod as “not available in this region” despite purchasing the physical CD from the record store across town!

    The iPod is used 99% of the time in my car hooked to the radio, but I’ll bring it into the office from time to time. I’ve been thinking to build something with a raspberry pi and big SD or SSD so that it shows up on my home WiFi when I park and I can syncthing or drag and drop music, but I don’t have a lot of time to play. The iPod was a Xmas gift from my dad and (I know it’s stupid) but I want to keep using it if I can.