• 9 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle










  • I’m honestly curious. Have you ever heard of a single Palestinian accusing Hamas of using someone they know as a human shield? Has anyone ever, really?

    The only “sources” backing these “well-known facts” are western media and Israeli-say-so. I’ve dealt with many Palestinians personally (I live in Egypt and we have a lot of them living here), and none of them ever complained about their families being used as human shields. Ever. You’d think some Palestinians would speak up about this by now if it were real.

    You know who they unanimously consider unnecessarily brutal and cruel though? The IDF which treats them like less than dirt on a good day.










  • Legacy hardware and operating systems are battle tested, having been extensively probed and patched during their heyday. The same can be said for software written for these platforms – they have been refined to the point that they can execute their intended tasks without incident. If it is ain’t broke, don’t fix it. One could also argue that dated platforms are less likely to be targeted by modern cybercriminals. Learning the ins and outs of a legacy system does not make sense when there are so few targets still using them. A hacker would be far better off to master something newer that millions of systems still use.

    Tell me you know nothing about cybersecurity without telling me you know nothing about cybersecurity. Wtf is this drivel?