- 2 Posts
- 12 Comments
snek_boi@lemmy.mlto Technology@lemmy.world•Lab-Grown Diamonds Are Everywhere. This Company Thinks It Has the Secret to Making Them High-EndEnglish0·10 months agoUltimately, yeah. The article points out that the way they want to do it is with unique designs, carbon neutrality, and transparency in the production chain.
snek_boi@lemmy.mlto Technology@lemmy.world•Survey shows most people wouldn't pay extra for AI-enhanced hardware | 84% of people said noEnglish0·10 months agoI agree that we shouldn’t jump immediately to AI-enhancing it all. However, this survey is riddled with problems, from selection bias to external validity. Heck, even internal validity is a problem here! How does the survey account for social desirability bias, sunk cost fallacy, and anchoring bias? I’m so sorry if this sounds brutal or unfair, but I just hope to see less validity threats. I think I’d be less frustrated if the title could be something like “TechPowerUp survey shows 84% of 22,000 respondents don’t want AI-enhanced hardware”.
snek_boi@lemmy.mlto Technology@lemmy.world•Authy got hacked, and 33 million user phone numbers were stolenEnglish0·10 months agoYou’ve got a good point. I wonder if this an example of a trade-off between convenience and security. If you’re logging in and you get an MFA prompt, a Yubikey has to be physically searched, while Bitwarden or Proton Pass only have to be clicked. A Yubikey can only hold a limited amount of accounts, while Bitwarden or Proton Pass could hold many more. Of course, a Yubikey could be used as MFA for Bitwarden or Proton Pass, but that would create a single point of failure and reduce factor separation (which I think is your original point).
While I posted a Bitwarden or Proton Pass recommendation of sorts, I genuinely wonder if it’s advisable to not use MFA at all if the factors will not be separated. Or, perhaps, the best security solution is the one you’ll actually use. I guess the answer is the good ol’ “What’s your security model?”
snek_boi@lemmy.mlto Technology@lemmy.world•Authy got hacked, and 33 million user phone numbers were stolenEnglish0·10 months agoThese are not local solutions, but are cross-platform and open source: Bitwarden or Proton Pass.
snek_boi@lemmy.mlto Technology@lemmy.world•Instagram is testing unskippable "Ad Breaks" lasting 3-5 seconds, disrupting user browsing experienceEnglish0·11 months agoIt’s about time Instagram enshittifies in a grotesque way, grotesque enough for people to realize it’s shit (because it’s enshittified).
Ah. Thanks for taking the time to explain the meme’s context!
I’m sure this is a quality shitpost, but I don’t get it 😅 Can someone explain the context for this?
Or mammal supremacist. Or vertebrate supremacist. There are options
Then how do you explain this? Checkmate, anyone who doesn’t see the halo 😎
snek_boi@lemmy.mlto Technology@lemmy.world•Security expert reveals surprising way to make your password stronger: use emojisEnglish241·2 years agoOut of curiosity, what makes you say so?
Edit: Oh. Did a “Wooosh” happen to me right now? Are you being ironic and referring to the XKCD thing about how to make a secure password using words in phrases?
snek_boi@lemmy.mlto Technology@lemmy.world•Apple will be able to update iPhones while they're still in the box, report claimsEnglish1412·2 years agoThis makes me think that malware will be able to be in an iPhone even before it is taken out of the box. I wonder if this will become an issue in the future. I suppose time, good research, and effective journalism will let us know.
lol I interpret this as sarcasm, as with many of your other comments around Lemmy. If they are so, I think they’re funny and so far I agree with what you actually value, democracy. However, it took me some time to understand your sarcasm. This might be just me, but I wonder if your comments could be subjected to Poe’s Law (https://en.wikipedia.org/wiki/Poe’s_law). Do you think it’s impossible that they could be?