=== ANCHOR POEM === ═══════════════════════════════════════════════════════════════════════════──────── what's the point of using a password manager if they're just going to 2FA your ass anyway? oh right, so google knows whenever someone signs into obscure-porn-site.com or radical-chemistry-and-explosives.net or cheap-hot-anime-gunpla-fast-xoxo.itch.io or whatever the kids are buying these days ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════════════───────┘ === SIMILARITY RANKED === --- #1 fediverse/4568 --- ═════════════════════════════════════════════════════════════────────────────────── @user-192 ... and like. idk what do you do at that point say "fuck it" and live with imperfection? embrace anti-natural selection? valorize deviance and queerness in digitally appropriated artistic media collections? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════════════════════─────────────────────┘ --- #2 fediverse/3919 --- ══════════════════════════════════════════════════════════───────────────────────── ┌───────────────────────┐ │ CW: cursing-mentioned │ └───────────────────────┘ that feeling when your computers are just fucked and it's like... whatever, computers are fucked, I don't give a fuck ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════────────────────────────┘ --- #3 fediverse/3470 --- ════════════════════════════════════════════════════════─────────────────────────── alternatively, when you initiate an SSH session it sends you a randomized public key whose private key is the password that you need to login. By decrypting the string of text it sent you and sending it back (plus the password at the end or whatever) you can ensure secure authentication without bothering with the passwordless keys which are wayyyyyy more trouble than they're worth and lack the "something you know" authentication method. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #4 fediverse/970 --- ═══════════════════════════════════════════════──────────────────────────────────── ┌───────────────────────┐ │ CW: cursing-mentioned │ └───────────────────────┘ side note, but the reason PINs were invented was so that people didn't have to type in a long-ass password. "it's only more insecure when it's on a network" - someone who didn't design every product after that (actually no that's bullshit because the first PIN numbers were probably used a long-ass time ago, and besides it's not like a short password was all that uncommon - when asked "what's the password" usually people will say something like "applesauce" or "butterflies" but really the better way is "10, 16, 26, 46, 99, butts") ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘ --- #5 fediverse/2412 --- ══════════════════════════════════════════════════════───────────────────────────── @user-1209 @user-1262 just gonna say you probably deserve that particular screenshotted block haha - imagine calling anarcho-nina a fed xD xD plus that first "get the fuck out of my mentions" was a tip that went over your head, not a threat said in anger. she's pretty darn angry but that just means you don't wanna be in her way =P ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #6 fediverse/4946 --- ════════════════════════════════════════════════════════════════─────────────────── I would trust the CIA if they gave me continual access to all surveillance of myself -- stack overflow -- what if you made a program which cycled credentials? like... "give me a random credential for Zoom" because we share all of our digital resources did you get banned for account sharing? no you didn't because you routed through the correct VPN automagically [has never had a software job] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘ --- #7 fediverse/3103 --- ═══════════════════════════════════════════════════════──────────────────────────── @user-1446 trans people long ago figured out that a great way to avoid rude comments is to change your profile picture to an anime girl or something abstract like mine. It's kinda fucked but it's whatever. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘ --- #8 fediverse/5961 --- ══════════════════════════════════════════════════════════════════════════───────── @user-138 maybe it's evil hackers - idk that's beyond my expertise - good luck : ) (I'd need to see the piece of technology to work on it. I'm a hardware kinda [girl, but pronounced guy]) ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #9 fediverse/5644 --- ═══════════════════════════════════════════════════════════════════════──────────── ┌─────────────────────────┐ │ CW: palestine-mentioned │ └─────────────────────────┘ people's palestine trauma is totally gonna fuck them up when it happens to their backyard. thanks, evil-run social media. It's true we wouldn't have been motivated without it, but such horrors are interminable to concieve about. "what if we just built our own websites and linked to them when we find them?" "hmmmm, interesting, this goes in my XYZ bookmark folder" ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════════───────────┘ --- #10 fediverse/5108 --- ═══════════════════════════════════════════════════════════════════──────────────── ┌───────────────────────┐ │ CW: cursing-mentioned │ └───────────────────────┘ kinda fucked up that you can't write an explanation question answer paragraph essay statement when appealing youtube's content-guideline-artistic-content-removal-policy. Especially when there are exemptions for artistic pieces under the nudity clause article seven. it's just a boob, what's the big deal? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════───────────────┘ --- #11 fediverse/5482 --- ══════════════════════════════════════════════════════════════════════───────────── ┌────────────────────────────────────────────┐ │ CW: cursing-mentioned-militaries-mentioned │ └────────────────────────────────────────────┘ when you have a massive, fuck-off military, sometimes the best thing to do is to just... use it. ah, but what do you do when the sky rains poison bombs? I dunno turn into candy people I guess /shrug ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════────────────┘ --- #12 fediverse/3672 --- ════════════════════════════════════════════════════════─────────────────────────── ┌───────────────────────┐ │ CW: cursing-mentioned │ └───────────────────────┘ there's something kinda... liberating about working with computers at work. you always know that worst case scenario, even if you totally fuck up the system configuration, you can always reimage the machine. so... who cares! if you can't get something working, just fucking try shit until it works. Whack it with a software hammer. See what happens. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #13 fediverse/4296 --- ═══════════════════════════════════════════════════════════──────────────────────── @user-1655 why don't we just weaponize email and send json to each other that ends up parsed, interpreted, and presented on the end-user's computer using whatever client we want? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════───────────────────────┘ --- #14 fediverse/3469 --- ════════════════════════════════════════════════════════─────────────────────────── you know how SSH password login is deprecated because the password needs to be transmitted in cleartext or whatever? what if we just... required two passwords? the first initiates the conversation, and sets up an encrypted line. It doesn't matter if anyone sees the first password because they'll get a new set of encrypted keys, meaning each session automatically is encrypted in a different, randomized way. the second password is the one that actually authenticates you. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #15 fediverse_boost/3867 --- ◀─╔═══════════════════════[BOOST]════════════════════════────────────────────────╗ ║ ┌────────────────────────────────────────────────────────────────────────────┐ ║ ║ │ I really hate "two factor" auth. Like, cool, I get it, it let's you pretend you can divest responsibility for security and recovery, but also it means dropping my phone too hard could be a life disrupting event so somehow I don't really feel like this is for my benefit. │ ║ ║ └────────────────────────────────────────────────────────────────────────────┘ ║ ╠─────────┐ ┌───────────╣ ║ similar │ chronological │ different ║ ╚═════════╧════════════════════════════════════════════────────────────┴───────╝─▶ --- #16 fediverse/3766 --- ═════════════════════════════════════════════════════════────────────────────────── ┌───────────────────────────────────────┐ │ CW: personal-medical-health-mentioned │ └───────────────────────────────────────┘ gonna ask my doctor for ADHD meds so I can hopefully jump-skip framebuffer divebomb spinadoodle half A press my way over the fucking labyrinth that is my weird and jank af mind and no I don't watch speedruns but my social group hears me a lot of them. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘ --- #17 fediverse/3351 --- ═══════════════════════════════════════════════════════──────────────────────────── privacy doesn't mean anything on the internet to me because privacy on the internet doesn't mean anything to "them" gestures vaguely, maybe winks once or twice and/or presents an emphasis face ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘ --- #18 fediverse/1310 --- ════════════════════════════════════════════════─────────────────────────────────── that feeling when you type your password so fast that one hand is faster than the other and the letters get all jumbled and now you have to remake your ssh key -.- ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘ --- #19 fediverse/5109 --- ═══════════════════════════════════════════════════════════════════──────────────── does anyone know of a website where I can host videos on my neocities that isn't youtube? maybe something I can set up on my own server computer at home like a file server or something? how do I do that, what should I google, which is the easiest and closest to the metal tools I can use? [practical, sensible, courageous. these are the adjectives we need.] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════───────────────┘ --- #20 fediverse/3051 --- ═══════════════════════════════════════════════════════──────────────────────────── @user-1437 @user-1438 you poor thing, don't delete your toots! don't delete your account! you are wanted here, this is the fediverse! it's for all of us. I personally like cyber-sexual exploitation more than cyber exploitation. I wouldn't have thought about it unless you said something. there are a lot of ways to exploit someone in a digital medium, and adding "sexual" focuses the term to specifically the non-consentual sharing of sexual digital media - which is exactly what the term "revenge porn" describes. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘ |