• 0 Posts
  • 4 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle

  • Point is, a hash isn’t a password. giving the most you don’t need tech knowledge analogy, it’s like the passwords fingerprint.

    The police station may keep your daughters fingerprint so that if they find a lost child they can recognize it is your daughter beyond any doubt. Your daughters fingerprints, is like a hash, your daughter is a password.

    The police should not store your daughter… that’s bad practice. The fingerprints are all they should store, and needless to say the fingerprints aren’t your daughter, just as a hash isn’t a password.


  • TheFogan@lemmy.worldtoMemes@lemmy.mlX gon give it to ya
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    The any publicity is good publicity mindset really is gone after you are already a household name. Twitter was already in the news daily, Journalism was replaced with 300 “Celebrity/politician tweeted ______”, and half the time all research and studies being replaced with 10 random tweets. “People are outraged about X, here’s 10 tweets from random people to prove it”.


  • I mean short and long term there’s pros and cons to that. however there’s a reason why that started to fall appart with e-mail. In short if it gets popular, than hosting servers with no throttling or post limits means spammers are going to go crazy, and rather than play the never ending unwinnable whack a mole game as bad actors create thousands of instances a day, hosts of any instances worth targetting will have to do a “instances are assumed malicious until proven benign”, (IE a whitelist method)