![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8f2046ae-5d2e-495f-b467-f7b14ccb4152.png)
Rights are won with blood, not money. We spent our blood and bought our rights, still waiting for America to start spending blood instead of money.
Rights are won with blood, not money. We spent our blood and bought our rights, still waiting for America to start spending blood instead of money.
Then maybe you should start using that 2nd like you’re supposed to instead of using it to keep your emotional support weapons close.
Unhealthy, people with no access to mental health services, or adequate education, shouldn’t have access to guns even in a healthy society. If you had all those maybe you can be trusted with guns.
Yes, you should get those too, not ignore gun control.
Sure, that’s why it doesn’t work that way anywhere there’s gun control. Because Americans are special snowflakes.
Keep the pithy sad sack comments on Reddit.
deleted by creator
She didn’t lose it, she just can’t see it anymore.
They haven’t turned down a job, they’re in contract negotiations for a job they want to work.
There’s always money in the banana stand.
Gun regulation doesn’t stop you having guns as tools. Educate yourself instead of spouting idiocy.
This isn’t far from reality. Spez has his head so far up Elon’s arse he’s wearing his face.
You encrypt the datastream from the text input on the client side before storing it in a variable. It’s not rocket science. I did this shit 20 years ago. Letting a plaintext password leave the user client is fucking stupid.
It’s a good thing your opinion makes no difference then isn’t it.
Yes. I agree 100% with the things I can and I defer to your experience where I can’t. I used to write proprietary networking protocols 20 years ago and that’s the knowledge and experience I’m leaning on.
As a matter of practice we would ensure to process passwords by encrypting the datasteam directly from the input, and they were never unencrypted in handling, so as to protect against various system and browser vulnerabilities. It would be a big deal to have them accessible in plaintext beyond the user client, not to mention accessible and processable by email generation methods and insecure email protocols.
It’s been hard to tell because reddit isn’t releasing user retention statistics that are easy to find for other social media sites (minutes per user per day), also due to vote obfuscation it can be difficult to know from vote counts because they could just manipulate the bias.
There’s also a lot of established communities around media/internet personalities that are largely unaffected by the changes and unlikely to move without significant fan pressure.
But people go where the content is, last time I checked the top 5 posts on Reddit were under 30k votes and were all tiktoks. That tells me that the content creators and the progressive adaptors have all moved on already, the rest is attrition over time as the service and content continues to stagnate.
The one thing reddit has propping it up artificially is it’s remaining position as a valuable information resource particularly for niche topics and especially while the fediverse doesn’t get boosted in seo yet.
25, I used to write proprietary networking protocols.
The front end to backend traffic should be encrypted, hashing occurs on the backend. The backend should never have access to a variable with a plaintext password.
I’m going to have to stop replying because I don’t have the time to run every individual through infosec 101.
You have the text input feed directly into the encryption layer without an intermediary variable. The plaintext data should never be passable to an accessible variable which it must be to send the plaintext password in the email because it’s not an asynchronous process.
I’m surprised so many people are getting hung up on basic infosec.
Pfft. Not even going to be the hottest this year.
Hottest Summer 2: Australian Boogaloo