Zalack

joined 1 year ago
[–] Zalack@startrek.website 4 points 1 year ago

The FBI and regular police have very different standards. I definitely think this should be fully investigated like any use is force, but I have more faith that the FBI handled this appropriately than of it had been a local PD department.

[–] Zalack@startrek.website 4 points 1 year ago* (last edited 1 year ago) (1 children)

Not a treasure

[–] Zalack@startrek.website 12 points 1 year ago

Thatsthejoke.jpeg.zip

[–] Zalack@startrek.website 1 points 1 year ago

In many cases it should be fine to point them all at the same server. You'll just need to make sure there aren't any collisions between schema/table names.

[–] Zalack@startrek.website 19 points 1 year ago (1 children)

I'm not saying there aren't downsides, just that it isn't a totally crazy strategy.

[–] Zalack@startrek.website 5 points 1 year ago

Same. I write FOSS software in my free time and also paid.

[–] Zalack@startrek.website 5 points 1 year ago* (last edited 1 year ago)

Man, I really think you should either saddle up, don't block ads, or use a free, non-ad-supported alternative.

Sync is made by a single dev who uses it as his main source of income. It's not made by a corporation. Taking the fruits of someone's labor, that they have priced to make it worth their time, feels kinda shitty to me.

If you really feel it's so much better than the alternatives that you won't even use them, then pay what the person making it feels they need to keep making it.

[–] Zalack@startrek.website 36 points 1 year ago (3 children)

You're being sarcastic but even small fees immediately weed out a ton of cruft.

[–] Zalack@startrek.website 2 points 1 year ago* (last edited 1 year ago) (1 children)

What about spicy food? Go for the Trifecta!

[–] Zalack@startrek.website 3 points 1 year ago* (last edited 1 year ago)

Sorry you're right that I wasn't being precise with my terminology. It's not a DDOS but it could be used to slow down targeted features, take up some HTTP connections, inflate the target's DB, and waste CPU cycles, so it shares some characteristics of one.

In general, you want to be very very careful of implementing features that allow untrusted parties to supply potentially unbounded resources to your server.

And yeah, it would be trivial to write a set of scripts that pretend to be a lemmy instance and supply an endless number of fake communities to the target server. The nice thing about this attack vector is that it's also not bound by the normal rate limiting since it's the target server making the requests. There are definitely a bunch of ways lemmy could mitigate such an attack, but the current approach of "list communities current users are subscribed to" seems like a decent first approach.

[–] Zalack@startrek.website 2 points 1 year ago (1 children)

Take me HOOOAAAAAAMMMMME

view more: ‹ prev next ›