@xair firewalling *a code website* should not affect my *applications*. they are different things.
@xair no, in security software, it is not "pretty normal" to grant full remote code execution to anyone who controls a third party domain. this is only a thing in shitty consumer software that isn't security sensitive. most security software works fine entirely offline.
@tevruden master/slave renaming makes total sense. i wonder about whitelist/blacklist, i do think a little bit is performative. performative is good though in and of itself, as it makes not being silent and speaking out a socially acceptable choice.
why i don’t care about a wendy’s:
is it constructive possession to own an AR15 with an M4 bolt carrier and also have the 3d printable swift link file or the corresponding t-shirt?
for the record: i do not own a 3d printer, do not own an M4 bolt carrier, and do not own a swift link (3d printed or otherwise) or any other similar device.
i'm just curious about the application of the law by the government. i've no intention of testing it.
i never knew BATFE raided fpsrussia and stole half a million dollars of guns because he had some hash oil for personal use:
reminder that the US exports its racist, violent pigs to many countries around the world: https://www.splcenter.org/fighting-hate/intelligence-report/2006/several-high-profile-racist-extremists-serve-us-military
@death i think it’s more realistic that they change the budgets than expect america to suddenly lose its hard on for PUNISHING CONVICTED CRIMINALS GRRR (fuck that country and that attitude)
Hacker, researcher, entrepreneur. Make sure we're connected at https://sneak.berlin/list
these toots are also available at https://s.sneak.berlin/@sneak.rss if you're into that.