Thanks to @arraybolt3 I was able to fix the issue. Honestly I overreacted when the website I was using was able to change my settings and bookmarks, it shouldn't be able to do that without a good prompt from the browser and outside of the website view....
Also Firefox Sync didn't *replace* my bookmarks anyway, but *merged*.
That said, my settings are still messed up, but thankfully my carefully created site cookie whitelist wasn't deleted from. So there's that!
Does anyone know how I can get my bookmarks and settings back? I didn't tell it to sync, I just signed in to a Mozilla website and Firefox just decided to overwrite everything 😡😡
This shader shows the extent of your fovea on your visual field:
https://www.shadertoy.com/view/4dsXzM
"Look at any specific point and you should clearly see the extent of your fovea (the stars only seem to be rotating in a small circle at the center of your vision). Move your head back and forth to see it grow/shrink. Works better in full screen mode."
(You need to click the link, not look at the static image.)
(Little experiment I did back in 2021) #smash #ssbu #nintendo #fanart #smashbros
What it I fused two different Smash characters into one?
I used a random number generator and the list of fighters in Super Smash Bros. Ultimate and I got these results:
If you call your political opponents vermin, you are dehumanizing people who bear the image of God.
If you call your political opponents garbage, you are dehumanizing people who bear the image of God.
To disagree with a position and make an argument is good and wise and helpful. To dehumanize and mock does not follow the way of love.
So, thoughts on the new #NintendoMusic app?
Krok Kompilation for my brother https://video.hardlimit.com/videos/watch/0afd1114-a3f9-460d-8bf9-135d07e9bb50
Lots of Windows users will find themselves in an unsupported state in October 2025. There needs to be a Linux distribution that really helps Windows users switch.
It needs to discover the username of the primary user from the registry or file system. It needs to install on ntfs (or alongside it). It needs to discover the profiles and bookmarks and cookies and stored passwords of local browsers. It needs to port over the Steam library. It needs to discover the SSIDs for local networks and join them automatically. It needs to discern what the user believes he already needs from his existing Windows install and insert free equivalents.
The current advice of "erase everything and start over" is impractical for the majority of computer users, especially those who don't have a second computer.
The delta is too big for normal folk, not because Linux is hard to use but because computers are hard to use.
I'm picturing something that generates a KDE Plasma panel that imitates the Windows Taskbar, down to where the various pinned items were. Or the Cinnamon equivalent I guess. Most people don't care what OS they run; they just want as little to change as possible.
#linuxDesktop #yearOfTheLinuxDesktop #windows #switchingToLinux
I just live hacked Arlene Dickinson
(Dragons' Den star - Canada's Shark Tank) by using her breached passwords, social media posts, an AI voice clone, & *just 1 picture* for a deepfake live video call. Thank you Elevate Conference and Mastercard for asking me to demo these attacks live!
https://www.youtube.com/watch?v=ysu7vEkZdN0
What are the takeaways from this Live Hack video with Arlene?
1. Stop reusing passwords - when you reuse your password and it shows up in a data breach, I can then use that password against you everywhere it's reused online and simply log in as you stealing money, access, data, etc.
2. Turn on multi-factor authentication (MFA) - turning on this second step when you log in makes it more obnoxious for me to takeover your accounts. I then have to try and steal your MFA codes from you (or if you use a FIDO MFA solution like a Yubikey etc, I'm likely just plain out of luck and have to move on to another target)!
3. Recognize that AI has made attacks more believable and scalable - will every or even most hacks involve AI? Nope! Most attacks are simple and leverage your breached passwords to log in as you or they attack via phishing over email, text, call, etc.
That being said, it's important to realize that some attackers will attempt to leverage AI, especially if you have an high threat model. Arlene is a star with millions of followers around the world, because of this she has to be extra politely paranoid about those that reach out with sensitive requests!
If someone with a high threat model (in the public eye, job is to wire money, lots of followers on social media, activist/being targeted, etc) receives a call and they're requesting sensitive info or a wire transfer, recognize that the attacker could believably use a voice clone in that call and could even build a believable deepfake for a live video call.
This is not how all attacks work but it's especially important for those with elevated threat models to recognize that AI can be leveraged in attacks to up the believability with voice clones, deepfake video, etc.
What do I mean "be politely paranoid" in this video?
I recommend verifying that people are who they say they are before taking sensitive actions.
- If you have a high threat model and someone calls you and asks for a wire transfer, use another method of communication to confirm it's them before taking action. Chat them, signal message, email, call them back to thwart spoofing using the number you have on file. This catches me 9 times out of 10 when I'm hacking! This is relevant for your work, when you're buying a house, pretty much anytime you need to send money!
- If you receive an email from a board member asking for a copy of a sensitive document, verify that board member is who they say they are with another method of communication before sending over a document with sensitive work details listed on it.
Stay politely paranoid, folks!
@tylnesh I've tried both Flatpak and Snap, and I rejected #Snap because you couldn't really change your snap repository away from Canonical's repository; that's really bad and is strictly against the Unix and Linux way.
I don't remember Snap's containerization being very versatile anyway, but this is a big step up in that regard since I last tried it. If they fix the Canonical-repo-only flaw, I'd like to try it again actually. I have to use Flatseal to edit file access permissions with Flatpak.
Latest update from @brewsterkahle: "Wayback Machine running strong (yippie!).
Still working to bring http://archive.org items & other services online safely.
@internetarchive
team spirits high, but tired."
I got top 8 at my college's monthly #SmashBros tourney! I've been competing for two years, and it is amazing to see all the practice begin to pay off. I'm Golemwire, down there. #SSBU #esports
Latest update on the DDOS attack from @brewsterkahle (Oct 11 @ 10:22am PT):
"The data is safe.
Services are offline as we examine and strengthen them. Sorry, but needed. @internetarchive staff is working hard.
Estimated Timeline: days, not weeks.
Thank you for the offers of pizza (we are set)."
Hello there!
I boost a lot of posts, but I have a few things to say every now and then.
I am largely fine with boosting posts from people I disagree with even on significant, dividing issues. I usually don't, however, if they actively advocate for these ideas... so it goes :/
#Christian #coding #HaikuOS #Linux #privacy #FOSS #Fediverse #SmashBros #SSBU #LegendOfZelda
#fedi22
Note: social.librem.one doesn't support DMs