• 0 Posts
  • 72 Comments
Joined 1 year ago
cake
Cake day: July 4th, 2023

help-circle


  • Reminds me of Jung’s theory around The Gaze, and how by ourselves we are our own subjects, capable of authoring our own paths, but as soon as another being is introduced and we’re subject to their gaze, their own aspect of being a subject necessarily forces some objectification upon us (and us on them). It’s interesting theory, and a good examination of why some people feel so incredibly uncomfortable with others around.









  • Tech tried to tell them it was unnecessary, would take forever, and would be expensive. I’d agree with you if, for a second, the customer sounded like they wanted to drop the matter. No, this was the customer absolutely digging their heels in, and the tech did what they could to get an irate woman out of the store.

    At a certain point, you have to just let people make their mistakes, and get out of their way. This is exactly how I interpret the situation.


  • In a customer service setting, often times that’s all you can do. The customer knows what they want, and particularly if there’s money to be made, your employer will require you to do so. It sounds like this place wasn’t exactly like that, but dude said multiple times this was unnecessary, and the customer still wanted it. He told them it’d be long and expensive. And unnecessary. They said do it. At a certain point, we have to trust that the customer really is their best advocate, and just do what they want.



  • Game theory would lead you, as the tortured, to realize that they’re just going to beat you until death to extract any keys you may or may not have, so the proper answer is to give them 1 and no more. You’re dead anyway, may as well actually protect what you thought was worth protecting. Giving 1 key that opens a dummy vault may get the torturers to stop at you, thinking this lead is a dead one.


  • If you set it up correctly, this is essentially what it does. You have a disc that is, say, 1tb. It’s encrypted, so without a key, it’s just a bunch of random noise. 2 keys decrypt different vaults, but they each have access to the full space. The files with the proper key get revealed, but the rest just looks like noise still, no way to tell if it’s empty space or if it’s a bunch of files.

    This does have an interesting effect. Since both drives share the same space, you can overfill one, and it’ll start overwriting data from the second. Say you have a 1tb drive, and 2 vaults with 400gb spent. If you then go try to write like, 300gb of data to one vault, it’ll allow you to do so, by overwriting 200gb of what the drive thinks is empty space, but is actually encrypted by another key.

    It’s been a while since I’ve messed with this tech, and I’m mostly a layman, but this should be a fairly accurate depiction of what’s actually happening.





  • Stephen King’s Dark Tower series is my go-to epic fantasy. I’m about to start a 4th trip to the tower once I’m done with my current listen.

    Enders Game by Orson Scott Card, and a select few other books in the series (Speaker for the dead and Enders Shadow most notably) - Card at the top of his game is fantastic, I just wish he didn’t dive completely off the deep end.

    Tangentially, Berserk, if you include manga. Hands down my favorite piece of media altogether.