
More than any other generation, 18-24 year olds have confessed an interest in a ‘Severance’ situation where they have no memory of their nine to five. But why do Gen Z hate work so much?

More than any other generation, 18-24 year olds have confessed an interest in a ‘Severance’ situation where they have no memory of their nine to five. But why do Gen Z hate work so much?
Not my generation, but I support the message:
Some European cloud companies have seen an increase in business.
cross-posted from: https://lemmy.world/post/27408560
cross-posted from: https://lemmy.world/post/27384100
The global backlash against the second Donald Trump administration keeps on growing. Canadians have boycotted US-made products, anti–Elon Musk posters have appeared across London amid widespread Tesla protests, and European officials have drastically increased military spending as US support for Ukraine falters. Dominant US tech services may be the next focus.
There are early signs that some European companies and governments are souring on their use of American cloud services provided by the three so-called hyperscalers. Between them, Google Cloud, Microsoft Azure, and Amazon Web Services (AWS) host vast swathes of the Internet and keep thousands of businesses running. However, some organizations appear to be reconsidering their use of these companies’ cloud services—including servers, storage, and databases—citing uncertainties around privacy and data acce
A new book explores the legacy of the 'Report on Iron Mountain,' while another probes the life of the novelist and essayist Robert Anton Wilson.
Someone subscribed to Reason magazine solely for Jesse Walker's Robert Anton Wilson content, then read Hansen's "Trickster and Paranormal" book and now sees trickster archetypes in everything—including a future article called "The Conspiracy Jokers."
The trickster archetype has clearly worked its magic on this poor soul's perception.
I understand your point, but I would not imply that a backdoor has to be remote. Backdoors are essentially any alternative, often undocumented ways to access or gain privileges on systems. They don't always result from malicious intent either - many backdoors simply "happen" when developers haven't fully considered security implications. For the average user whose device contains such unintentional backdoors, the impact remains the same regardless of how they came to exist. Consider the times when vendors had default BIOS passwords - these created a nightmare for Uni IT staff (and others as well), even though they were not accessible remotely.
From security perspective, do you think the wording changes a lot here?
29 Undocumented commands found in ESP-32 microcontrollers CVE-2025-27840
cross-posted from: https://lemmy.world/post/26598539
cross-posted from: https://programming.dev/post/26664400
Tarlogic developed a new C-based USB Bluetooth driver that is hardware-independent and cross-platform, allowing direct access to the hardware without relying on OS-specific APIs.
Armed with this new tool, which enables raw access to Bluetooth traffic, Tarlogic discovered hidden vendor-specific commands (Opcode 0x3F) in the ESP32 Bluetooth firmware that allow low-level control over Bluetooth functions.
In total, they found 29 undocumented commands, collectively characterized as a "backdoor," that could be used for memory manipulation (read/write RAM and Flash), MAC address spoofing (device impersonation), and LMP/LLCP packet injection.
Espressif has not publicly documented these commands, so either they weren't meant to be accessible, or they were left in by mistake. The issue is now tracked under CVE-2025-27840.
"it's just for testing"
matrix.group.lt migration to a new server
postgresql database hits again, migrating
Putin's Miracle: When the "Craziest Idea Possible" Became Reality
Before Trump's return to office was secured, I was chatting online with a friend about Putin's strategy in Ukraine. "Putin is playing the long game," my friend observed, "he realizes he cannot win quickly, but he's patiently waiting for a miracle."
"What miracle could possibly save him?" I asked.
My friend's answer seemed absurd then: "Well, Trump could be elected." We both brushed it off as the craziest idea possible—a distant, unlikely scenario.
That dismissal has now turned to a chill of recognition. The "miracle" has materialized.
My friend also pointed out something crucial about Russian warfare that the West consistently underestimates: "Russia knows how to wage slow, grinding wars. They depend on sacrificing humans, which post-Soviet Russia has plenty of." While Western democracies measure war in weeks and political cycles, Putin measures it in years and generations. His strategic patience stems from a fundamentally different calculus of human life.
The recent White House m
Zeinabu irene Davis’s Closet Picks
Click to view this content.
Movies mentioned:
The UK’s demands are simultaneously infuriatingly offensive, mathematically ignorant (regarding the nature of end-to-end encryption), dangerous (as proven by the recent Salt Typhoon attack China successfully waged to eavesdrop on non-E2EE communications in the United States), and laughably naive reg...
Nobody seems to notice... nobody seems to care..
The Denazify Lie
Russian leaders and propagandists have at once denied the existence of a Ukrainian nation and called for purging or cleansing the Ukrainian territory, in terms that often mirror rhetoric preceding past genocides. In this report, the authors seek to shed light on how Russia's extremist, hate-peddling narratives deployed in the war have spread online through social media.
Russian propaganda is making inroads into some of the major European languages—Spanish and German, as well as French and Italian.
REMVE narratives are also finding more-receptive audiences among relatively small linguistic communities in Eastern Europe. Serbian- and Bulgarian-language communities emerge as particularly vulnerable to cross-language and cross-cultural transmission of REMVE messages on both X and Telegram.
However, Russia's ability to successfully mainstream its propaganda and mobilize its audiences against Ukrainians is limited: The most virulent REMVE conversations on these two platforms remain h
no, no and no, but you will have to find an answer if your decision to have or not to have kids was the right choice in any case.
Bypassing disk encryption on systems with automatic TPM2 unlock | oddlama's blog
oddlama's personal web page and blog
If you left alone in the office and have nothing better to do..
After the War in Ukraine, European Boots on the Ground?
The incoming Trump administration has been supportive of this European initiative. It is consistent with the president-elect's stated desire to disengage the United States from security matters on the continent, and instead have the European Union and the United Kingdom take the lead. But a deployment of European forces to Ukraine will inevitably entangle the Americans. European militaries depend on their U.S. allies for out-of-area operations. Inevitably, a large deployment to Ukraine will once again expose this dependency when they turn to the United States for help with critical tasks such as air lift, logistics, and intelligence that they cannot conduct alone.
Ukraine's military problems can no longer be ignored as mobilization failures and systemic issues lead to mounting territorial losses
The Ukrainian military faces critical challenges that demand immediate, honest evaluation:
Suggested changes:
More in the article.
Russian metallurgists, who supply their materials to manufacturers of weapons and armored vehicles, are critically dependent on foreign equipment. As The Insider discovered, products of the Italian company Danieli, a major producer of steelmaking equipment, have not been withdrawn from the Russian m...
According to the article, Danieli continues to operate in Russia despite EU sanctions, collaborating with steel giants like Severstal and MMK, both linked to military production. Danieli reportedly uses its Chinese subsidiary to bypass sanctions, enabling the supply of equipment to Russia. In 2023, its Russian subsidiary’s cash flow increased 35-fold, contradicting claims that the business is unprofitable or disconnected from the military sector. The company’s justification hinges on technicalities, but the financial and strategic realities suggest complicity in sustaining critical industries that support Russia’s war economy. At what point does this move from legal maneuvering to outright enabling?
ILA President Daggett on Automation and the Future of Work
Click to view this content.
I think automation is unavoidable, but what is next?
The CALEA system, designed in the U.S. for mass surveillance, has become a global threat. Telecom equipment with "back doors" isn't just an American issue—it's a worldwide risk. Trusting the "good guys" is naive; any end with "back doors" can be a target. Encryption is our defense, and we must be careful about what we buy. #security #technology
Long explored but infrequently embraced, base 3 computing may yet find a home in cybersecurity.
Three, as Schoolhouse Rock! told children of the 1970s, is a magic number. Three little pigs; three beds, bowls and bears for Goldilocks; three Star Wars trilogies. You need at least three legs for a stool to stand on its own, and at least three points to define a triangle.
If a three-state system is so efficient, you might imagine that a four-state or five-state system would be even more so. But the more digits you require, the more space you’ll need. It turns out that ternary is the most economical of all possible integer bases for representing big numbers.
Surprisingly, if you allow a base to be any real number, and not just an integer, then the most efficient computational base is the irrational number e.
Despite its natural advantages, bas
Agile software development can be done at scale with the use of technology like self-service APIs, infrastructure provisioning, real-time collaboration software, and distributed versioning systems. Lean can complement and scale an agile culture with techniques like obeyas, systematic problem-solving...
The first scaling crisis happened in 1996, when Linus wrote that he was "buried alive in emails". It was addressed by adopting a more modular architecture, with the introduction of loadable kernel modules, and the creation of the maintainers role, who support the contributors in ensuring that they implement the high standards of quality needed to merge their contributions.
The second scaling crisis lasted from 1998 to 2002, and was finally addressed by the adoption of BitKeeper, later replaced by Git. This distributed the job of merging contributions across the network of maintainers and contributors.
In both cases, technology was used to reduce the amount of dependencies between teams, help contributors keep a high level of autonomy, and make it easy to merge all those contributions back into the main repository, Bernhard said.
Technology can help reduce the need to communicate between teams whenever they have a dependency on another team to get their work done.
How to 10X Your Security (Without the Series D) Clint Gibler @clintgibler Watch on Youtube Hey everyone, thank you very much for coming and thank you to the organizers for having me. Over the past few years, I’ve spent 1000’s of hours studying how companies are scaling their security. Not the one...
Good slides on how to reduce risks
Būtų įdomu paskaityt tai kas ten iš tiesų įvyko ir kaip buvo tvarkoma, bet turbūt Cloudflare lygio post-mortem analizės tikėtis neverta.
What about it? ;)
The Google-owned cybersecurity firm reported that 70% of exploited vulnerabilities in 2023 were zero days.
In analyzing 138 actively exploited vulnerabilities in 2023, Google Mandiant reported Oct. 15 that 70% of them were zero-days, indicating that threat actors are getting much better at identifying vulnerabilities in software.
It’s a worrying trend in and of itself, but what caused even more concern among security analysts was that Google Mandiant also found that the time-to-exploit (TTE) — the time it takes threat actors to exploit a flaw — was down to a mere five days in 2023 compared with 63 days in 2018-19 and 32 days in 2021-22.
It’s an alternative to options from Amazon, Google, and Microsoft
Will be interesting to see how it works out
The Indian nonprofit People+ai wants to fix this by creating an open and interoperable marketplace of cloud providers of all sizes. The Open Cloud Compute (OCC) project plans to use open protocols and standards to allow cloud providers of all sizes to offer their services on the network. It also plans to make it easy for customers to shift between offerings depending on their needs. People+ai held a hackathon on 20 September at People’s Education Society University (PES University) in Bengaluru to test out an early prototype of the platform.
They cut all such scenes and pasted into The Boys, in a Mark Twain style “Sprinkle these around as you see fit!”.
I liked the book as well. The show had some similar feeling in some ways, but also had a distinct character for itself.
Reread today again, with some highlights:
The riskiness of a mitigation should scale with the severity of the outage
We, here in SRE, have had some interesting experiences in choosing a mitigation with more risks than the outage it's meant to resolve.
We learned the hard way that during an incident, we should monitor and evaluate the severity of the situation and choose a mitigation path whose riskiness is appropriate for that severity.
Recovery mechanisms should be fully tested before an emergency
An emergency fire evacuation in a tall city building is a terrible opportunity to use a ladder for the first time.
Testing recovery mechanisms has a fun side effect of reducing the risk of performing some of these actions. Since this messy outage, we've doubled down on testing.
We were pretty sure that it would not lead to anything bad. But pretty sure is not 100% sure.
A "Big Red Button" is a unique but highly practical safety feature: it should kick off a simple, easy-to-trigger action that reverts whatever triggered the undesirable state to (ideally) shut down whatever's happening.
Unit tests alone are not enough - integration testing is also needed
This lesson was learned during a Calendar outage in which our testing didn't follow the same path as real use, resulting in plenty of testing... that didn't help us assess how a change would perform in reality.
Teams were expecting to be able to use Google Hangouts and Google Meet to manage the incident. But when 350M users were logged out of their devices and services... relying on these Google services was, in retrospect, kind of a bad call.
It's easy to think of availability as either "fully up" or "fully down" ... but being able to offer a continuous minimum functionality with a degraded performance mode helps to offer a more consistent user experience.
This next lesson is a recommendation to ensure that your last-line-of-defense system works as expected in extreme scenarios, such as natural disasters or cyber attacks, that result in loss of productivity or service availability.
A useful activity can also be sitting your team down and working through how some of these scenarios could theoretically play out—tabletop game style. This can also be a fun opportunity to explore those terrifying "What Ifs", for example, "What if part of your network connectivity gets shut down unexpectedly?".
In such instances, you can reduce your mean time to resolution (MTTR), by automating mitigating measures done by hand. If there's a clear signal that a particular failure is occurring, then why can't that mitigation be kicked off in an automated way? Sometimes it is better to use an automated mitigation first and save the root-causing for after user impact has been avoided.
Having long delays between rollouts, especially in complex, multiple component systems, makes it extremely difficult to reason out the safety of a particular change. Frequent rollouts—with the proper testing in place— lead to fewer surprises from this class of failure.
Having only one particular model of device to perform a critical function can make for simpler operations and maintenance. However, it means that if that model turns out to have a problem, that critical function is no longer being performed.
Latent bugs in critical infrastructure can lurk undetected until a seemingly innocuous event triggers them. Maintaining a diverse infrastructure, while incurring costs of its own, can mean the difference between a troublesome outage and a total one.
This is what you get when are not sleeping during biology classes.
not a bug, but a feature :))
a source code of a game ;))
i am all for normalizing raiding ambassies for [put the cause you support] as well
woah, so nothing is sacred now? 😱🤔😐
thank you, actually it seems that it is https://en.m.wikipedia.org/wiki/The_Sliced-Crosswise_Only-On-Tuesday_World , which has inspired Dayworld :)
looks interesting, but not this one.
from the logs it would seem that synapse went down not due to share volume of traffic, but special malformed usernames - so it seems a different pattern was used (if it is was an attack)
I am not sure if that is related, but technically Matrix uses a different protocol from ActivityPub, so it had to be targeted specifically
Video debunking the report: https://yewtu.be/watch?v=7CD_Nl3iwhE
can do, if you could provide the link to the debunking source - would be great!