• 0 Posts
  • 55 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle
  • Bilingualism is a bit overloaded nowadays, which I find kinda annoying given that word “polyglot” exists.

    Anyways, if you can freely use another language in an informal exchange with a few people of different sobriety levels while failing to remember key words and recovering from that - you’re a fluent polyglot. Ability to exchange information is a key part of what language is, and that’s how you measures your proficiency.

    Bilingual can also mean “natively proficient in two languages”. And if you’re older than three years old and are not native speakers of multiple languages already, the chances of you becoming one are slim.

    Native proficiency is a result of a language acquisition ability that is not well understood and disappears early into child development. It results in a level of effortless mastery that seems to be impossible to achieve as an adult, i.e. a dedicated or merely attentive native speaker will be able to recognize that you are not one.


  • It’s not “people vs persons” but “those people vs they”.

    Conversationally, “those/these” distances you from the group you are talking about, which is humorously weird when it’s your family you’re talking about.

    It’s not the meaning of the words, but habitual (and often fleeting) attribution around them that tripped you up.

    PS: “People” are uncountable, “persons” are countable. That’s basically the whole difference between the two plurals. Although it’s rapidly disappearing, as “ten people” won’t raise a single eyebrow in a conversation.








  • Teeth cannot produce enamel. Enamel is not a living tissue and it was produced by cells outside of the tooth in a coral-like manner. In order to grow a new tooth, you need it to be fully surrounded by specialized living tissue for the whole growth cycle.

    PS: I honestly expected something like this to come out of bioelectric computation research, but progress seems slower there. Or rather knowledge and techniques in other fields is reaching critical mass, giving us these advances.




  • If you use HTTPS, the attacker can still see what websites you connect to, they just can’t see what you are sending or receiving. So basically they can steal your browsing history, which defeats the purpose of a commercial VPN for many users.

    This is blatantly false. They can see IP addresses and ports of you connect to from IP packets, and hostnames from TLS negotiation phase (and DNS requests if you don’t use custom DNS settings). HTTP data is fully encrypted when using HTTPS.

    If exposing hostnames and IP addresses is dangerous, chances are that establishing a VPN connection is as dangerous.


  • Control of the DHCP server in the victim’s network is required for the attack to work.

    This is not a VPN vulnerability, but a lower level networking setup manipulation that negates naive VPN setups by instructing your OS to send traffic outside of VPN tunnel.

    In conclusion, if your VPN setup doesn’t include routing guards or an indirection layer, ISP controlled routers and public WiFis will make you drop out of the tunnel now that there’s a simple video instruction out there.







  • Please correct me if I’m wrong, but doesn’t this allow one to represent virtually any resource as a mail inbox/outbox with access through a generic mail app?

    I’m working with a specialized healthcare company right now, and this looks like a way to represent patient treatments data as an intuitive timeline of messages. With a local offline cache in case of outages. Security of local workstations is a weak point of course, but when is it not…