cursed food poll (vegan, but throwing PETA a curveball)
With the rise of 'impossible' imitation food meats I would like to pose a question for the public. If the following animal meats were available as plant-based vegan alternatives, where would you draw the line?
Vegan cow (impossible/beyond burger, ground plant beef, etc) included as a control. Select as many as you would be willing to eat. Please do not vote just to show results.
Programmer Art: crude, crappy temporary graphics that you put in a game while you figure out if the mechanics are fun enough to bother finishing it and sorting out a proper artist before release
Programmer Naming: a crude, crappy temporary name that you keep forever and ever amen, twenty years later the top question on your FAQ page is NO, we will NOT change the name, in fact we consider that it is YOU SIR who art being CRINGE,
re: Cryptocurrency guide for people who justifiably hate it
@Byte it makes me sad seeing it used to bypass what are basically restrictions on charity. But that's the world we live in...
@deersyrup maybe Cromite, or if adblocking bu default is too much, then ungoogled-chromium.
re: ssh practice
@4censord @ranja yeah I'd agree with all this while also adding that preconfigured point to point VPNs with wireguard for example come with a secure configuration out of the box for LAN access, and I would expect configuration mistakes in ssh from most sysadmins (bad packaged defaults, changed incorrectly or incompletely). This is both defense in depth, reducing attack surface of open ports, and an attempt to minimize chances of human misconfiguration.
Also the benefit of both initially allowing access to, and then revoking access to all 'internal' (LAN infrastructure) at once by revoking an individual's VPN access.
I don't think I am alone in this, since I've seen more enterprise org products targeting this approach, by integrating an organization's auth system, and VPN infrastructure connecting to a shared bridged LAN for easier, more secure development or shared operations. Just look at enterprise software built on Wireguard for some examples of how far you can take this approach. I prefer things less tightly integrated for personal stuff of course, but there is a serious draw based on scaling secure access to shared infra as well.
trans anatomy knowledge expectations vs reality
The only thing I understand about Human anatomy are which muscle groups are activated by which exercises.
Cis people asking me about "the surgery" feel like I am obligated to know more... Which... I'm really not. I can spot you in the gym I'm not suddenly a surgeon because I take hormones. I imagine others don't even know that very well. Weird expectation.
Anyways I am going to start quizzing everyone cis over 30 on colonoscopies in great detail now :P
ssh practice
The latest standard for remote access should NOT be a *public* ssh port. I don't care about what method of authentication is in place, or what obfuscation is available. Honestly ssh ports should be LAN-only and behind strict firewalls. If you want remote access, setup a modern point to point VPN which gives you the modern cryptographic security as a default, then ssh from within the VPN on the relevant LAN.
Thufie
BLM
~
~ ![]()
languages: en:✔️ he:~ es:~ ru:~
Reluctant moderator on social.pixie.town
Most online member of the system
#yesbot #nobot #noarchive I'm in my 20s, as a Computer Science researcher (Not in "AI" 🙄). Also a YouTuber now apparently, making YouTube Poops.
.אין דין ואין דיין. שלום בעולם
I'm just a disoriented white girl trying her best.
![]()
Relationship Anarchist![]()
programming languages?
C++ C MIPS x86 Java Python and a few others :P