• 0 Posts
  • 17 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle





  • Why would it be risky? I’m genuinely curious if you have any resources (other than Apple’s, because they’re obviously biased) that show that a third party battery is dangerous.

    As far as I know, as long as the battery meets the dimensions, nominal volatage, chemistry/max charge rate/communication to the charging circuitry, discharge rate, it will function safely.

    A battery is a battery is a battery. There’s no concievable reason I can think of that would require you use an Apple branded battery. If you have evidence to the contrary I’d love to see it. Knowing proper battery safety is important if you mess with them in any capacity (which I do), so something I may not be aware of is important to know.




  • It is arbitrary. While what classification a substance is may have some grounding in research, it’s mostly up to what interest group has either lobbied to get something under or whatever group law enforcement wants to be able to get easy charges for. Cannabis was Sched I because it made it easy for law enforcement to get big sentences for minorities and the counter culture participants of the day. Same thing with LSD and psilocybin.

    All the DEA scheduling is just pick and choose your charge for whatever ideological ax they want to grind. Hence why things don’t line up with reality





  • It’s been hacked, the light bulb is likely part of some botnet or under an attacker’s control directly. Which is why it’s sending that much data continuously. IoT/smart devices don’t send a lot of data in this sort of volume as most of the time they’re idle and maybe send a heartbeat or status update every once in a while to prove they’re alive.

    This is what is called an indicator of compromise or IoC, it’s some behavior or pattern that can be used to determine what is happening or who is the one doing the attacking.

    Likely OP would need to do some analysis to be able to get attribution unless it’s a very well known botnet actor in which case attribution is fairly straightforward.





  • Yes there is! Great you have a strong, randomly generated password. There’s no collateral damage (you’re having your password manager generate the passwords right?) So your other accounts are safe, you only have to rotate one password.

    Well what happens for instance if someone really wanted access to your account? Say it’s a bank, a social media account, or maybe it’s just a game account for an MMO that’s super high value, you have a long and strong password, but let’s say the service’s security wasn’t quite up to snuff or you got phished and gave your password by accident (these things happen, it’s not your fault).

    This is where 2FA comes in, if someone manages to break your password the attacker needs your phone, your security key, your fingerprint, etc… To prove to the service they’re you. By having 2FA on the account you’re increasing your defense in depth for your account. If you didn’t have it your account is as good as gone as soon as an attacker cracks or gets your password.

    It acts as a second lock that needs to be picked in order to take over your account.

    I personally add 2FA to all of my accounts I can, the highest security ones get added to my hardware token. The ones I don’t need as high security go into my password manager (which has 2FA enabled but only available via my hardware key).

    Additionally as often as possible I try to use a unique email address for each service (simplelogin, addy.io, or similar, + based email addresses are easily bypassed) they all forward to my email but now you have to guess my email for the service (my own private domains, so not shared with anyone else) and what mailbox it ends up in. As a bonus you can disable emails that are sending spam or see who got breached based on the email.

    Again defense in depth, a long secure password is great but that’s only relying on a single lock. By having 2FA you’re doubling your security so to speak by requiring that extra key in order to access your accounts.


  • jeansburger@lemmy.worldto3DPrinting@lemmy.worldClean finish while ironing
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    2
    ·
    1 year ago

    It’s because your nozzle is ever so slightly too low when you’re printing. I’d adjust your Z offset by one click upwards.

    Reprint the cube, and see if that resolved it. If not adjust upwards by another click.

    If after a handful of times you can’t get a decent ironing pass, I’d take a look at your extrusion multiplier. Drop it down by 0.01 and recalibrate and retry doing the above ironing calibration sequence again.