[-] dnick@sh.itjust.works 1 points 1 week ago

You're probably getting suggestions for what she should do different because, at least at a starting point, it could just as easily be something her phone is doing before sending as it is something your phone is doing on the receiving end.

I've had a phone say 'video to big, do you want to crop or share through abc app' before. Don't recall the exact message, but seems more likely than you phone downgrading something it's receiving.

[-] dnick@sh.itjust.works 13 points 2 weeks ago

Imagine the suspension of intellect it must take to admit that Russia is willing to pay you push the narrative you are already pushing, or are willing to push, and then considering yourself a victim for doing it.

You weren't the target, you were the tool.

[-] dnick@sh.itjust.works 3 points 2 weeks ago

Second job overnights at a gas station... Pretty much any combination of right/left hand, upside down/mirrored, cursive/text, words forward/letters backwards, etc.

[-] dnick@sh.itjust.works 17 points 3 weeks ago

Because Democrats want someone who will run the country and Republicans just want someone who will maintain their minority control. We are concerned for the country, they are scared for their very existence and self reflection itself is dangerous for their existence. Basically self reflection is necessary for what Democrats want to do, and it fatal for what Republicans want. So we do it, and Republicans avoid it at all costs. We get a Kamala who we hold to a high standard, they get a Trump who can punch them in the face and they'll still support him because of the party.

[-] dnick@sh.itjust.works 0 points 3 weeks ago

It doesn't require suspension of critical thought when you can look around the world and see that nowhere does anyone have high speed rail spanning distances and population densities equivalent to what the US would need to go from, say, New York to LA, it East to West Coast in general. There are plenty of examples similar locally to East or West Coast population centers, but nothing in between. High speed commercial routes? Maybe. High speed commuter rail? It's not even close to being worth the cost: utilization.

[-] dnick@sh.itjust.works 0 points 3 weeks ago

Not sure what you are arguing with exactly, theres a huge difference between commercial and commuter 'profitability'. Things that freely allow for commerce like a road can be justified from many different direction where a periodic service only makes sense based on demand. That isn't to say that maintaining an underutilized route with the goal of it becoming utilized based on is availability is always a bad idea, but a road can be built and it's cost can at least roughly be correlated to it's use. If you had to periodically rebuild every road, at roughly the same cost whether it was used or not, they would end up with the same 'profitability' concern, but mostly you have to build all the roads for minimal usability and then spend the most money on the most used roads. Freeways are understood to improve commercial visibility and are funded by taxes for that reason. The entire country benefits by having clear routes for good to move. Commuter rail primarily benefits a local area and is funded heavily by fares and local taxes.

[-] dnick@sh.itjust.works 1 points 3 weeks ago

This is a really old message, but if you're still having the same question i could try to answer, but that kind of message is pretty context dependant. For that specific one, it sounds like your program is trying to access something outside your network,, like they have a website they need to access to check for updates or something.

[-] dnick@sh.itjust.works 1 points 3 weeks ago

A benign scan could just be looking for an ftp server to connect to or a repeater or relay server of some sort. There are plenty of open services people make available for free and the fact that you would consider it an attack it doesn't make it one.

At minimum you could be alerted to look for someone attempting to connect to your ftp server with a single basic anonymous authentication vs someone flooding that port with known malicious software attacks, and block the latter across your entire network and effectively ignore the former. Really it seems like you're advertising your lack of imagination in this context than a legitimate lack of possible uses for spoofing open ports.

[-] dnick@sh.itjust.works 1 points 3 weeks ago

You seem to be intentionally misunderstanding which side actually has a plan or policy meant to help anyone other than the rich. Trump doesn't know or care what the policy plans behind 2025 are, but as long as he gets his but in the seat that can keep himself out of jail and make people keep paying attention he'll sign whatever the actual handlers come up with

[-] dnick@sh.itjust.works 1 points 3 weeks ago

Is that supposed to be a smart ass answer?

[-] dnick@sh.itjust.works 3 points 3 weeks ago

Well, since you ask, it likely depends on whether they're humorously encouraging you to look at something from a different angle, or if they've just discovered a handful of situations that get a chuckle from people who only encounter it occasionally, them proceed to subject everyone to the same 'second-think' ad nauseum.

[-] dnick@sh.itjust.works 2 points 3 weeks ago

That's probably a majority of the point. Falsely report that some interesting ports are open and he'll spend time on them and potentially trigger alerts or blocks.

Fake open ports aren't something a normal user would bother with or understand, but with all the tools available in the nefarious side, it makes sense to have options that make their job harder if you're willing to use them.

view more: next ›

dnick

joined 1 year ago