MrEUser
Absurdist, Security Architect (Magician), Beer and Bourbon connoisseur, Gamer, lover of Dark Humor (Lovecraft was a comedian), Maker, Apistevist, Agnostic, Atheist.
- 6 Posts
- 20 Comments
MrEUser@lemmy.ninjato Asklemmy@lemmy.ml•Not including lemmy.ml what do you think is the best Lemmy instance?English2·2 years ago“Active” is an adjective. You intentionally left out the active part (posts, comments). When you consider we’ve existed for less the month and have 45 posts in Boomer Shooter… That’s 1.5 posts per day, our first month in existence. That’s activity. That’s active. Your cynicism not withstanding Team Red has existed for almost two weeks… It’s growing faster than any of the other communities on this board… Because “activity.” Really, if you understand activity and what it looks like and how it scales… We might believe you know what you’re talking about… Might.
MrEUser@lemmy.ninjato Asklemmy@lemmy.ml•Not including lemmy.ml what do you think is the best Lemmy instance?English11·2 years ago“Active” is a verb. You intentionally left out the verb part (posts, comments). When you consider we’ve existed for less the month and have 45 posts in Boomer Shooter… That’s 1.5 posts per day, out first month in existence. That’s activity. That’s active. Your cynicism not withstanding Team Red has existed for almost two weeks… It’s growing faster than any of the other communities on this board… Because “activity.” Really, if you understand activity and what it looks like and how it scales… We might believe you know what you’re talking about… Might.
MrEUser@lemmy.ninjato Asklemmy@lemmy.ml•Not including lemmy.ml what do you think is the best Lemmy instance?English4·2 years agoThis will help you find US based instances if that is what you are after.
MrEUser@lemmy.ninjato Asklemmy@lemmy.ml•Not including lemmy.ml what do you think is the best Lemmy instance?English143·2 years agoPull up a list of Lemmy instances with 100% uptime. That’s not a big list. Look for a location in the U.S. you find an even smaller list. And if your monolingual and speak English bestest… well, then you’re in the realm of a vary small list indeed.
lemmy.ninja is second on that list for size AND speed of growth. Plus, where else are you going to find communities that teach you how to use the Fediverse to your advantage? Drop by and subscribe to the boomer shooter community… We all know they did it right in lo-fi…
I’m providing a best guess on that. I may be wrong. Who knows maybe it’ll be “xtxt” or xt^2 pronounced “extasy.”
MrEUser@lemmy.ninjato Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Ad Blocking is Cyber SecurityEnglish1·2 years agoMakes complete sense. Thank for clarifying.
MrEUser@lemmy.ninjato Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Ad Blocking is Cyber SecurityEnglish3·2 years agoFirst, stop talking to me like I don’t know this already. Second, these facts don’t make me wrong or you right. The implication of what was said is that you run VM’s on docker. The fact is, you don’t. Stop arguing.
MrEUser@lemmy.ninjato Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Ad Blocking is Cyber SecurityEnglish3·2 years agoThe way, what was stated, was stated, indicated that docker runs virtual machines. It doesn’t. It runs containers, right?
MrEUser@lemmy.ninjato Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Ad Blocking is Cyber SecurityEnglish61·2 years agoIf you’re running it using Docker, that’s a container not a VM. And that IS the way you would want to run it, in a container. They’re easy to set up, easy to use, and easy to maintain.
MrEUser@lemmy.ninjaOPto Technology@beehaw.org•A tale of a new Lemmy instance, a bot infestation, the fallout, and how we dealt with itEnglish3·2 years agoGlad to be of service.
MrEUser@lemmy.ninjato Technology@beehaw.org•Mastodon thinks Lemmy’s privacy stinks. What say you?English1·2 years agoIt’s cute how you think I’m going to take legal advice from you. You do you, have a nice evening.
MrEUser@lemmy.ninjato Technology@beehaw.org•Mastodon thinks Lemmy’s privacy stinks. What say you?English3·2 years agoI’m basing what I have said off of work I have done with attorneys in similar situations. I don’t know evidentiary law, but I wouldn’t want to be accused of destroying evidence of something. But my question stands. Why should someone who has doxed someone get away with it by deleting their account? How is that ethical?
MrEUser@lemmy.ninjato Technology@beehaw.org•Mastodon thinks Lemmy’s privacy stinks. What say you?English1·2 years agoThat’s a hard question to answer. My position is based on where I live and what legal council I have worked with has said in situations I’ve dealt with. My recommendation is, check with an attorney.
MrEUser@lemmy.ninjato Technology@beehaw.org•Mastodon thinks Lemmy’s privacy stinks. What say you?English2·2 years agoI’m at a loss. You’re saying that things that you said publicly are private? Or you’re saying that they become private because you delete your account? Assume you dox someone. I need to find out if that happened. As an admin I’d be able to see that
- you
- publicly posted
- their data
I would need to be able to provide this to authorities if they provided needed legal documentation. Why do you think that privacy dictates you should be able to commit a crime, and get away with it by deleting your account?
I created a process to remove the bot accounts from my database without crashing my site. I have tested and it looks like all functions are working. If you need help because you suddenly have thousands more accounts than you would suspect ask me for the procedure. I’ll gladly provide it.
I was able to identify bot accounts by looking at creation times. They accounts are grouped by “batches” where the account creation times are within seconds of each other. That’s not typically going to happen with random humans creating accounts.
At this point, I’m not certain anymore. Luckily all the accounts use values that are easy to identify them. I’ll figure out how to remove them. Sorry for the false alarm work.
I always assume I’m wrong first, I may have put that in the wrong spot. Where should I put that in the query? I put it under the Select statement.
SELECT * from local_user; provides a list of users that has a password_encrypted field. That list is exactly equal (all the same accounts are listed) to what I get from: select p.name, p.display_name, a.person_id, a.email, a.email_verified, a.accepted_application from local_user a, person p where a.person_id = p.id;
So I can see a persons a.email (email address), a.person_id, and their password_encrypted (hash) by correlating these tables, can I not?
These accounts are NOT ALL local to my server… So I MUST be being passed hashes, right?
MrEUser@lemmy.ninjato Programming@programming.dev•The world in which IPv6 was a good designEnglish2·2 years agoThank you for the link to this story. It connected together a few dots and made some things finally makes sense.
They should have been forced to do it the other way. “You advertise as free, so you have to provide this for free.”