Show newer

out-of-context Alice Caldwell-Kelly on WTYP pod: "Nothing can stop a [runaway] train, except a good guy with a train"

I feel like this should be a crime. Just publishing vaguely plausible nonsense about a subject that is already difficult and vast... Sometimes when you read a species description you might be the first person to read it in a decade. We kind of rely on each other being honest, and even then it can be confusing.

Show thread

"This species is renowned for its large size... up to 15 millimeters in length."

Lies. These ants are known as "mini rubies" because they are *small* for carpenter ants.

"striking coloration, with a combination of black and metallic blue or green hues,"

WTF utter nonsense!

"prefer nesting in..rainforests and mangroves"

NO.

I just encountered a "species description"and I think it's AI generated. I think they did this so they'd have one for every species.

I'm so LIVID. This is GARBAGE.

meetings are a scam invented by google to sell more google calendars

Show thread

trying to make music is making me relate a bit to generative ai models, the ones that “hallucinate”. if i pick some kind of genre, i can imagine and hear in my head a whole song, which i've probably never heard before, and i cannot tell you what memories it was synthesised from

So, I think we should give all the good guys/gals trains 🥺👉👈

Show thread

out-of-context Alice Caldwell-Kelly on WTYP pod: "Nothing can stop a [runaway] train, except a good guy with a train"

Spent this week making a little Worms/Scorched Earth terrain demo. Tried making one of these with my first ever #pico8 project and ran into massive performance issues due to using pset.

This uses tline and a 2D array of vertical slices. Destroying the terrain earth shrinks a slice, or cuts/slices it into two. Perf is good, as terrain is destroyed, there are more slices, but less to draw! Second gif shows this in action.

Code/cart is here lexaloffle.com/bbs/?tid=140579

Every post I made as a teenager: I don’t think our political system is that good as adults claim it is

Me as an adult: They should have given me the right to vote at 14 based on this

(Long quote, sorry)

Forensic analysis of the attack performed by our independent cyber-security advisors has identified evidence of an external presence on the Library network at 23:29 on Wednesday 25 October 2023, with the first evidence of movement around the network at 23:32. Later that night, at 01:15 on 26 October 2023, the Library’s IT Security Manager was alerted to possible malicious activity on the Library network. This alert came from the Library’s Monitoring System which had automatically blocked the suspect activity at 00:21. The IT Security Manager, among other actions, extended the automatic block beyond the pre-set expiry, undertook a vulnerability scan (which came back with no results) and actively monitored activity log. No repeat activity was seen. The incident was escalated to the IT Infrastructure team at 07:00. Further investigation by the IT Infrastructure Team, including detailed analysis of activity logs, did not identify any obviously malicious activity and they subsequently performed a password reset before unblocking the account later that day.
Here we go. It's very common that the attack is detected, but ignored or not understood. This is what happened with the Conti attack on the Irish Health Service as well.

Running a "vulnerability scan" is insufficient. If malicious activity is detected, vuln scans are equivalent to telling a gunshot wound patient that you're gonna check to see if they're wearing Kevlar.

while we have secure copies of all our digital collections – both born-digital and digitised content, and the metadata that describes it – we have been hampered by the lack of viable infrastructure on which to restore it.
Right off the bat we're about to see a difference between what happens in a major enterprise and a cultural institution with limited means. They simply did not have the capacity to recover, given that they did not pay the ransom and systems remained encrypted.

And you might think "Oh just reimage all of them." I cannot stress enough to you how undersized library and museum IT staffs always are.

Show thread

Good morning, nerds! The British Library just dropped its after-incident report on the ransomware attack that has disabled the Library for, uh, months?

Let's dig in.

Corporations will, 99% of the time, take things you bought away from you if...

  1. They are not making (enough) money on them any more
  2. They can and get away with it

Simply because they want to clear the stage of all competition for their next offering, including old offerings you may be happy with so you don't want the new one.

The 1% that don't do this are orgs that either understand "Good will" and trust have value, or are somehow genuinely not shitheads. They will almost invariably in time be bought out by someone who will do this.

The release->maintain->extinguish cycle is, also, accelerating. So you're getting less time with things before corps try to take them away again.

This dog wants your 12 points (and he will lay on ALL your furniture and whine if you don't vote for him)

📸 @hikari
#FursuitFriday #fursuit #furry #NFC2024

Show older
Computer Fairies

Computer Fairies is a Mastodon instance that aims to be as queer, friendly and furry as possible. We welcome all kinds of computer fairies!