Hi!

My previous/alt account is [email protected] which will be abandoned soon.

  • 1 Post
  • 337 Comments
Joined 4 months ago
cake
Cake day: June 1st, 2024

help-circle

  • Maybe if you opened your eyes you would notice that sitting at a table full of fascists is slightly different than a state visit.

    Quick breakdown:

    Willy Wimmer is a German fascist - or as Wikipedia calls it “nationalist right-wing” former politician. He has written for the far-right extremist shitrag Compact, for “alternative media” (aka nazi blogs) and for Russian state media.

    Cyril Svobado has been invited to observe Azerbaijan’s 2013 presidential election and mentioned that everything was “fair and transparent”. An election result was accidentally released before voting began in that election. He has also given an interview to “Voice of Europe” who are infamous for interviewing nazi politicians across Europe.

    Emir Kusturica is a Serbian nationalist, supportive of war criminal Radovan Karadžić and has expressed support for the “Greater Serbia” ideology. He is a supporter of Russia’s war against Ukraine and a “personal friend” of Shoigu.

    Why is Jill Stein sitting on the same table as Russian-sponsored nazis?




  • Two reasons:

    • Sleep data can give some information on your health but isn’t regulated as strictly as health data. Health data == Money
    • Companies want your time and attention. TV manufacturers want you to use your TV as much as possible, social media companies want you to use their platform as much as possible, video game developers want you to play their games as much as possible. Nintendo successfully gained people’s time when outside through Pokèmon Go already. Now they’re trying to expand to your time sleeping. There’s not much time left which isn’t utilized by companies somewhat. Maybe there will be a Pokèmon School/Work soon?

  • Well, TOTP prevents at least these attack vectors, even for tech-illiterate people:

    • Unnoticed data base leaks being used to gain full access to people’s accounts
    • Credential stuffing (using another service’s leaked credentials to gain access)

    With TOTP there must be at least some contact between the “hacker” and the victim.


  • I think most people are just unaware of the risk that is involved. Healthcare information is some of the most sensitive data on a person and should be protected at all cost.

    Some older people in particular have as much of a self-preservation instinct on the internet as toddlers in real life. If protecting them takes away a tiny bit of agency from them then so be it because they cannot be trusted with such decisions. I believe any reasonable person would use MFA because trading off a tiny bit of convenience for a significant amount of security is always worth it.










  • Also bei uns ist das ähnlich aber besser.

    Bewerbunskonto und Passwort ist ziemlich separat, das ist OK.

    Alle internen Passwörter sind gleich. WLAN-Passwort == Email-Passwort == Kontopasswort.

    Die Benutzernamen sind sehr ähnlich. Dein Email-Konto ist [Benutzername]@student.[uni-domain], dein WLAN-Name aber [Benutzername]@[uni-domain].

    Man kann auch mit ein paar Klicks eine zweite Email einrichten mit [nachname]@student.[uni-domain].

    Für den Computerraum musst du aber ein eigenes Profil erstellen mit eigenem Benutzernamen, der deinen Nachnamen enthält und eigenem Passwort. Damit darfst du Computer nutzen und die Drucker mit 200 Seiten Gratis-Druckerkontingent pro Semester. Dieses Profil erhalten aber nur Informatik/Wirtschaftsinformatik/informatiknahe Studiengänge.

    Und auch für die Bibliothek existiert ein eigenes Konto da ist der Benutzername aber die Matrikelnummer. Allerdings haben die das letztes Jahr geändert, jetzt kannst du dich auch mit dem Uni-Konto anmelden.

    Und die Fachschaften nutzen teilweise noch die alte Domain von vor 20 Jahren.