There was an encryption system a few years ago that offered this out of the box.
I can’t remember the name of it but there was a huge vulnerability and basically made the software unusable.
Crypt box or something like that.
Due to lemmy.world blocking pirating communities, I will now be using !CosmicTurtle0@lemmy.dbzer0.com
There was an encryption system a few years ago that offered this out of the box.
I can’t remember the name of it but there was a huge vulnerability and basically made the software unusable.
Crypt box or something like that.
They don’t need to be a techie. Just someone who can click a button.
I am remembering Julian Assuage has/had a payload that was distributed via BitTorrent. The file was encrypted with a private key and his public key was posted either as a file in the package or on the site where the magnet file was downloaded.
Before he was arrested, he encouraged everyone to download the file and sit on it and to keep seeding it. He said in the event of his untimely death, the password would be released for everyone to decrypt.
That would be another option but you sort of need the notoriety to make this work.
I’ve actually given this a lot of thought over the years. The biggest issue for me is all my AWS services that no one in my family knows about.
So the idea would be to, at minimum, let my family know what services are being used.
Unfortunately there isn’t a turn-key solution. I’ve seen a number of well-meaning solutions and some that are quite novel but they all suffer from the same problems: how do you deal with false positives and how do you verify your deadness.
I imagine that the problem is similar to the Yellowstone trash can problem, in that any solution to mitigate one will make it harder on the other.
The best solution I’ve found is to have a two-person solution, similar to launching a nuke. You have automation that tests if you are active that emails a close friend or relative to verify you are indeed dead.
Ideally there would be more than one person on this list a confirmation from two people would kick off all of the automations you code.
And if he doesn’t legitimately win, he will make damn sure he wins illegitimately.
Also depends on the contributions terms.
If they were a traditional FOSS, they can’t change the terms without all contributors agreeing or removing/modifying the contributed code so that they no longer have ownership of their authored sections.
Either way, it’s a dick move.
If you ever go to r/relationship_advice and read posts where their friend T did S with P and then A (23 F) got into with G, then yeah…Alice and Bob suddenly makes a lot of sense.
The problem is companies that fully take advantage of open source, as is their right, and then fully expect the volunteer dev to provide support them when they have a Sev 1.
Sure they read the license and saw that it was free, but they didn’t read the part that it was free but offered literally no support.
The amount of money that my company has made on the backs of open source developers is probably in the literal billions. But we don’t give fuck squat to them outside of one day a year that we contribute code back to a few select libraries.
Tell me more…
SNICKERS! You aren’t EU when you’re Hungary!
Pretty sure that’s desert terrain.
Op, you may want to take this advice. You might have some level of anxiety that’s causing you to react to things in a way that’s unhealthy.
Some level of annoyance is to be expected from life but if you’re bothered by it, and it seems like you are, look into therapy. It will help you understand where your reactions are coming from and help you deal with it better.
because I’m objectively a terrible programmer.
This comment made me chuckle at 6am. I was expecting some sort of profound reason to store them at text.
I’ve gotten used to storing dates as numbers and then just using some sort of library to convert them back to human readable text.
Dates are much easier to work with when they are numbers.
God I thought it was just me!
The problem is that because the hardware is there, a determined person with physical access can change the settings to join a network you don’t control.
Ideally, you can open the TV and remove the wifi modules but I suspect that might be beyond the skills of most TV owners.
Tbh, I stopped owning a TV since college. I watch everything on my computer or phone now.
When you share your playlist or have Spotify hooked up to some other service like discord, it shows the name associated with the account.
And changing that name is not as straight forward as you might think.
Given the fact that it’s shared so easily, I wouldn’t be surprised if email addresses could be exposed with the right options.
Not necessarily shady.
I use 10 minute email if a merchant requires me enter an email account before seeing the total price on an item (including shipping). That’s the most common pattern I’ve seen. My guess is that they want to ping you to complete the purchase.
Or a website might require free registration in order to view the content.
One place I use 10-minute email is actually Spotify. I didn’t want to give them my Gmail address since your name is exposed to the world via their sharing API.
Don’t get me wrong, there are a lot of bad uses for it as well. But privacy minded people use it too.
The only correct regex for email is: .+@.+
So long as the address has a local part, the at sign, and a hostname, it’s a valid email address.
Whether it goes somewhere is the tricky part.
Doesn’t surprise me one bit. I’ve noticed that a lot of websites will only accept .com
and a few will only accept email addresses from popular providers (Gmail, Hotmail, outlook, etc.)
My guess is that it’s trying to reduce spam and fake account generation.
Is there cumin in that barbeque sauce?