• 2 Posts
  • 196 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle




  • Last company where I faced external suppliers, I had to take a training where they said we couldn’t accept any item worth more than like $20, except food or alcohol during a presentation. But we could accept such items on behalf of the company, and they would be raffled off to a random employee. One time a guy in purchasing got a giant brass horse head from a Chinese supplier. I guess nobody signed up for the raffle, so it became a permanent fixture in the cafeteria.






  • Limonene@lemmy.worldtomemes@lemmy.worldWho's in charge?
    link
    fedilink
    arrow-up
    11
    arrow-down
    1
    ·
    15 days ago

    When you switch to an admin account on Windows, there are still files owned by “TrustedInstaller” that you can’t touch, and processes owned by “System” that you can’t terminate.

    Linux doesn’t have that. When you switch to root, you can kill any process. You can modify or delete any file.


  • a Tennessee Highway Patrol checkpoint

    These checkpoints are illegal in all of the US. Cops can’t stop a driver without a reason. I know that’s not much consolation to someone who is arrested during a stop for no reason.

    She drove because her husband, Hilario Martínez García, 46, is undocumented and cannot obtain a license in Tennessee

    During a traffic stop, cops can ask the driver for a driver’s license. There is no reason to ask the passengers for ID, and if the passengers are asked, they don’t have to give ID. They may have to give their name in some jurisdictions, but cops usually need a reason for asking for the name, and being a passenger at a road checkpoint isn’t a reason.

    It seems clear to me that these cops are operating outside the law, and probably have been since before this immigration stuff.










  • Mozilla, for example, would sign Firefox’s flatpak with a PGP key that they would disclose on their website. You verify the signature using the RSA algorithm (or any other algorithm for digital signatures. There are a bunch.) Or, you could just trust that your connection wasn’t tampered the first time, then you would have the public key, and it would verify each time that the package came from that same person. Currently, you have to trust every time that your connection isn’t tampered.

    Major flatpak providers (Flathub at the very least) would include their PGP public key in the flatpak software repo, and operating system vendors would distribute that key in the flatpak infrastructure for their operating system, which itself is signed by the operating system’s key.