• 0 Posts
  • 7 Comments
Joined 11 months ago
cake
Cake day: August 14th, 2023

help-circle

  • A private equity firm bought them to naked short the stock

    You just like throwing around words regardless of meaning?

    They owned equity, so they were long, not short. They owned a stake so they weren’t naked.

    What they did was a simple extraction of value from something they owned, destroying it. It has nothing to do with short selling, and has nothing to do with manipulation of stock trading (after all, they took it private so that it wouldn’t be publicly traded, so there were no public traders to manipulate).


  • The typical default configuration has the ISP providing DNS services (and even if you use an external DNS provider, the default configuration there is that the DNS traffic itself isn’t encrypted from the ISP’s ability to analyze).

    So even if you visit a site that is hosted on some big service, where the IP address might not reveal what you’re looking at (like visiting a site hosted or cached by Cloudflare or AWS), the DNS lookup might at least reveal the domain you’re visiting.

    Still, the domain itself doesn’t reveal the URL that follows the domain.

    So if you do a Google search for “weird sexual fetishes,” that might cause you to visit the URL:

    https://www.google.com/search?q=weird+sexual+fetishes
    

    Your ISP can see that you visited the www.google.com domain, but can’t see what search you actually performed.

    There are different tricks and tips for keeping certain things private from certain observers, so splitting up the actual ISP from the DNS resolver from the website itself might be helpful and scattering pieces of information, but some of those pieces of information will inevitably have to be shared with someone.


  • That’s the joke.

    In the late 80’s, there was a huge consumer push for tuna fishers to change their techniques so that they didn’t kill dolphins while catching tuna. Before then, tuna fishers used to actually track dolphins, because following the dolphins generally meant being able to find the tuna faster. Then, they’d surround the tuna with their nets, indifferent to the dozens of dolphins they were drowning as part of the process.

    By the 90’s, there was legislation on how tuna cans could be labeled as “dolphin safe,” and stepped up enforcement of the existing laws that made it illegal to intentionally kill dolphins.

    During the height of this debate in the popular consciousness, of course, this comic came out joking about that link between dolphin deaths and tuna canning.



  • Things might be different by now, but when I was researching this I decided on the Yale x Nest.

    It’s more secure than a keyed lock in the following ways:

    • Can’t be picked (no physical keyhole).
    • Codes can be revoked or time-gated (for example, you can set the dog walker’s code to work only at the time of day they’re expected to come by).
    • Guest codes can be set to provide real-time notifications when used.
    • The lock keeps a detailed log of every time it’s used.
    • The lock can be set to automatically lock the door after a certain amount of time.

    It’s less secure than a physical traditional lock in the following ways:

    • Compromise of a keycode isn’t as obvious as losing a key, so you might not change a compromised keycode the same way you might change a lost key.
    • People can theoretically see a code being punched in, or intercept compromised communications to use it.
    • Compromised app or login could be used to assign new codes or remotely unlock

    It’s basically the same level of security in the following ways:

    • The deadbolt can still be defeated with the same physical weaknesses that a typical deadbolt has: blunt force, cutting with a saw, etc.
    • The windows and doors are probably just generally weak around your house, to where a determined burglar can get in no matter what lock you use.
    • Works like normal without power or network connection (just can’t be remotely unlocked or reprogrammed to add/revoke codes if not online)

    Overall, I’d say it’s more secure against real-world risk, where the weakest link tends to be the people you share your keys with.