• 0 Posts
  • 22 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle

  • I edited one word of my comment because I had another reply from someone who misunderstood what I was referring to, so i clarified so there wouldnt be further confusion, not to give myself an excuse to be snarky.

    • I’ve read the article you’ve provided a number of times previously and while yes, it does indicate that there is no scientific evidence for my claim, it is limited to the UK.

    • I don’t see what interbreed-ability has to do with invasiveness?

    I don’t care about some American publication talking about cats

    • I provided 3 sources, one was American, the others were from Oxford (also in the UK last I checked) and Tillburg (Netherlands), both discussing the EU broadly

    • Here is another study from the checks notes British Ecological Society which concludes in part

    “…It is also well established that free-ranging cats pose a significant threat to biodiversity conservation and restoration worldwide, and that remedying this threat is relatively easy when compared to other drivers of biodiversity loss…”

    If you’re not going to read the evidence I’m providing, while saying I’m only providing americentric evidence, then I’m going to respectfully abandon this thread. I apologize for the snark, that was uncalled for.

    Edit: formatting only




  • Except plastic straws aren’t actively hunting marine creatures.

    Domesticated cats are not native to north america and western Europe, and people should be more responsible in how they care for their pets, especially the ones that are invasive fucking species.

    Also, 2 things can be true. It’s possible that bird populations are being decimated by ecological destruction as well as the mass breeding and free roaming of invasive predators introduced by humans.

    Edit: clarified that I meant domesticated cats






  • The point is that if someone really wants to get into your device, they will. It doesn’t matter if youre using open source firmware, in a custom implementation of linux, on a MIPS CPU, and you personally build every package from source and complete a compliance code review before installing it, etc.etc.etc. If government agency x is targeting you specifically, your best line of security is to lock your device in a safe, take a boat into the middle of the ocean, and then dump it at an unrecorded location and never retrieve it.

    A device is only secure as long as you are not using it, and it is not accessible physically, or by network.

    You do you dude, I’m just saying your advice is awful for the average user.



  • Does your threat model involve The Mossad? There’s no way on earth that you are genuinely remembering multiple 512 byte random passwords, let alone actually taking the time to type them in.

    Having a password manager, with MFA, a strong master password, and rule based device verification is ultimately more secure as you can have every password be randomized.

    Best practices are best practices for a reason. I recommend you follow them.


  • Genuinely terrible advice. Every popularly available password manager service hashes all your passwords, if they have a data breach they have extremely strict reporting compliance and the majority of services will re-hash all your passwords. If youre so extremely concerned about that, host your own.

    But what concerns me the most is

    Unless they specify they only store the hash I refuse to sacrifice one of my strong passwords.

    … What to you mean sacrifice?