![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8f2046ae-5d2e-495f-b467-f7b14ccb4152.png)
It puts more people in prison, making private prisons’ income better. This kind of shit is never about helping anyone but the lobbyists.
It puts more people in prison, making private prisons’ income better. This kind of shit is never about helping anyone but the lobbyists.
And yet, they consider the woke to be the snowflake bitches.
Definitely not.
If I wasn’t on mobile, I would write up a more comprehensive fix. Probably something along the lines of:
window
.window.history.pushState = () => {}
window.history.replaceState = () => {}
It’ll break PWAs unless you stub it out properly, but you can throw that in a userscript for a quick and dirty way to disable the API that websites use to update the URL without reloading the page.
I wonder how long it will be until the Supreme Court overturns this one.
I share the DIY repair sentiment, but the other commenter was right. You saved them money by opting yourself out of their warranty, which is free to you, but costs them money. Now, if you had used the warranty and then repaired things yourself after it’s no longer free, that would be a nice FU to them.
The funny part is that rather than respecting this, they chose to cryptographically pair the parts, so they stop working if you replace them…
According to the post linked in the article, it’s under ~/Library/Application Support
.
The good news is that ~/Library
isn’t world-readable by default. The bad news is that it’s still very easily readable by any process running under the user and by any other user with admin privileges or access to sudo
.
With MacOS, specifically, it’s stupidly easy and unintrusive to enable disk encryption. Outside of that, programs can save key-value pairs to Keychain (a credential store) and use that to store a randomly-generated encryption key.
It’s true that any program running with the user privileges and within its session can open the file, but once the user logs out it’s unreadable.
If the data was saved to the login
Keychain, it should only be accessible while that specific user is logged in. The existence of vulnerabilities notwithstanding, it should actually be reasonably secure as long as System Integrity Protection is enabled and the program in question isn’t running. SIP stops users (including root) from messing with system files or processes, and the Keychain requires a user password prompt to give programs access to entries created by other programs.
Now, considering all the above… it would have taken a day at most to figure out how to encrypt the data before it gets written to the file so it’s not just sitting completely out in the open.
You don’t at all see how this could be abused in the exact same way as what you’re complaining about, do you?
For example, maybe Trump relaxes some restrictions on China, and the Chinese government just so happens to decide to host an expensive event at one of Trump’s businesses afterward. It’s not a bribe; it’s business as usual™
In other news, the NSA is soon to be adding blackmail to their income sources.
If Gemini has shown us anything, it’s not even useful AI. Like you said, the solution is as easy as turning it off.
I wouldn’t call it surprising or confusing, unfortunately.
I subscribe to the theory that they do, but instead take inspiration from them.
But think of the profit improvements!
The other half are rich pricks. That also checks out. The kind of privileged douche who would buy a BMW is the same kind that thinks they’re above the law.
Two things can be bad at once.
I think we all know that one of those two things will never happen in the land of the free and home of the mass-produced automobile.
Oh, I don’t give a crap about the realtors. I’m just not a fan of STEM being placed above other fields when it’s inaccessible to people without either having been born into money or taking on substantial debts.
Anon needs to reject technology and embrace luddism. Only then may he be free of oxymoron job roles.