steventhedev

joined 2 years ago
[–] steventhedev -2 points 1 year ago

I think it's more likely they were spread through the various Telegram "news" channels and then picked up after verifying the source or at least the video/images - checking for language/location/time/that they actually show what was claimed.

[–] steventhedev -1 points 1 year ago (1 children)

To be 100% clear: are you saying that it's a fair call that they are separate concepts, or are you saying it's a fair call that Israel should be destroyed?

[–] steventhedev -5 points 1 year ago (2 children)

The original reporting this is coming do appear to be in Gaza, but are unattributed as to who filmed them. It's also unclear if these videos were reported locally first and picked up, or if they were sent directly to N12.

[–] steventhedev 16 points 1 year ago (5 children)

Do you want the section where they declare their dedication to violence? Or perhaps the section where they use "from the river to the sea" as an explicit call for genocide?

The charter was toned down. Instead of saying they want to kill all Jews, now they only want to kill all the Jews living in Israel.

But their leaders say it best: we will repeat October 7th until Israel is destroyed.

[–] steventhedev -3 points 1 year ago (17 children)

There is a humanitarian crisis in Gaza and Hamas is causing it

[–] steventhedev -1 points 1 year ago

noun an item or story published or broadcast by only one source.

I guess no other news sources thought it was worth reporting on

Merry Christmas!

[–] steventhedev 13 points 1 year ago (2 children)

How is this "Exclusive"? it's a publicly available document, and they even say so:

An identical document appears on the Israeli government’s website.

There is legitimate criticism of Israeli military censorship, but this ain't it

[–] steventhedev 4 points 1 year ago

5 is referring to rocket attacks against Israeli infrastructure

[–] steventhedev 5 points 1 year ago* (last edited 1 year ago)

Also that in order to exploit this it requires an active man in the middle. Which requires any of the following:

  • Reverse proxy hijack/NAT hijack - from a compromised machine near the server
  • BGP hijack - stealing traffic to the real IP
  • DNS hijack - stealing traffic to send to a different IP
  • Malicious/compromised network transit
  • Local network gateway control
  • WAP poisoning - wifi roaming is designed really well so this is actually easier than it sounds.

Almost all of those have decent mitigations like 801.x and BGP monitoring. The best mitigation is that you can just change your client config to disable those ciphersuites though.

[–] steventhedev 27 points 1 year ago* (last edited 1 year ago) (1 children)

Here's the shortlist of horrors I've had to deal with in my career:

  • Mixed US/ROW short date formats - DD/MM/YY, MM/DD/YY
  • mixed timezones in the same column
  • the wrong timezone (marked as PDT but actually UTC, or sometimes the other way around)
  • clock drift
  • timezones again...because timezones suck
  • historical timezones
  • NTP configurations

Things I've read about but haven't needed to deal with personally:

  • leap seconds
  • clock slew vs skip
  • hardware clocks
  • PTP

The one thing I really don't care about is relativity

[–] steventhedev 9 points 1 year ago (5 children)

If the set of definitions contains the word set, does the English language implode in a recursive cascade of paradoxes?

view more: ‹ prev next ›