I write bugs and sometimes features! I’m also @CoderKat@kbin.social.

  • 2 Posts
  • 431 Comments
Joined 1 year ago
cake
Cake day: June 21st, 2023

help-circle



  • You wouldn’t have 13 feats at a time, though. It’d be one at a time and you just get to choose which one. Perhaps could be further limited by only allowing changing once per short or even long rest.

    But yeah, it definitely starts stronger than it ends. I was thinking the main ways it could sorta be used is as a jack of all trades, because you could probably have proficiency in any given thing so long as there’s no combat involved.



  • CoderKat@lemm.eetoMemes@lemmy.mlJapan is on its own wavelength.
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    10 months ago

    Huh, I’ve never noticed how much bloat was in ISO 8601. I think when most people refer to it, we’re specifically referring to the date (optionally with time) format that is shared with RFC 3339, namely 2023-11-22T20:00:18-05:00 (etc). And perhaps some fuzziness for what separates date and time.


  • CoderKat@lemm.eetoMemes@lemmy.mlEvery time
    link
    fedilink
    English
    arrow-up
    12
    ·
    10 months ago

    I like the idea of having a regulated, living, backwards compatible standard. Which seems to be what USB-C is now, for phones. The EU has soon to be active regulation that will make it a requirement for many things. Yet, it’s not a single, set in stone standard, but one that’s constantly being expanded (eg, version 3.2 and PD).

    Of course, the regulation has to also be living. Eg, at some point, maybe there’ll be a strong enough reason to allow another standard (by no means do I think USB-C will always make sense). And the regulation has to very carefully choose the standard.

    That way we get the benefits of standardization (from actually everyone using the same format), but we aren’t unreasonably crippling ourselves to do it.


  • CoderKat@lemm.eetoPrivacy@lemmy.mlWhat the actual fuck?!
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    10 months ago

    Yeah. There’s literally nothing you can put on a prompt that will truly work. It’s still a good idea to prompt cause it will reduce how many people approve the prompt, but there is a significant number of people who don’t read prompts at all and just insta-confirm.

    At best, I think you could design it so there’s no way for an app to request certain permissions themselves. They’d have to be opted in from the system settings and apps could only tell you how to do it. But that’s a usability nightmare that is quite frustrating for legitimate usages. There’s already some super sensitive permissions that do this. I think the ability to install apps, ability to display over other apps, and password managers for android.










  • CoderKat@lemm.eetoMemes@lemmy.mlWhy? Are we not doing enough?
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    10 months ago

    Lol, yesterday it felt like there was at least half a dozen posts about Firefox, mostly claiming that YouTube was slowing them down. Which seemed really bad at first, till I dug into it and saw it was probably an unintended bug with ad handling.

    And why were there so many posts? Who wants to see the same post more than once?



  • CoderKat@lemm.eetolinuxmemes@lemmy.worldYou have no power here
    link
    fedilink
    English
    arrow-up
    8
    ·
    10 months ago

    There’s already a ton of such exploits. Most servers use Linux and many exploits of corporations this had to go through Linux (though many exploits aren’t related to the OS at all – eg, SQL injection is OS independent). I expect it’s more common, though, that attacks on Linux systems are either meant to target servers or were personalized attacks that you’re not gonna accidentally download.

    On that vein, I also kinda suspect that many people who use Linux may be bigger targets for their employer than their personal PC. Which is actually scary, cause personalized attacks are far harder to defend against. I expect the average Linux user is technically savvy. Not a lot of money in try to do a standard, broad attack on such types (I think most attacks on personal computers are broad attempts that mostly depend on a small fraction of technologically incompetent people falling for simple schemes). But a personalized attack that happens to infiltrate a fortune 500 company? Now that’s worth a lot of money. Using Linux won’t protect you against those kinda attacks.