![]() steemit's idea of monetization via crypto of good content is another approach. I also think exclusivity can be a boon, so for example invite-only forums or some other exclusion method can naturally curate conversations, but on the flip side you will tend to keep otherwise good commentators silent that way. ![]() I tend to gravitate towards some mishmash of past techniques, for example, I really liked Slashdot mod system, where random users were given mod ability, and instead of just points, you could label something informative, funny, etc. Its something I think about often, and I'm yet to find some silver bullet. ![]() It would require a public shift in forum management style that openly acknowledges it's issues, which especially in a place like this would be hard because for the most part dang et al actually do a great job and the issues we are talking about are very nuanced.Ģa) If you come to some conclusions on this I'd like to hear them too. 4) As a greybeard sysadmin type, I think many users suffer from Stockholm syndrome, and will blindly downvote (usually with no comment) attacks against their kidnappers, even if truthful.Ģ) I do think it is possible, but it is much more difficult to gain those users back who have fled due to those issues. Hence why I say HN seems to me to have become much More than ever before, MBAs who pretend to be hackers, instead of the other way around. in particular, since the user protested and ignored rule change to "don't be negative", where heated debates between truth to power speakers and status quo speakers tend to bring the hammer down on those against the status quo. 3) HN has some extremely good commentators, some who have been around for a long time, but I have noticed a large careening away from the type of hackeristic dogged pursuit of truth and lack of fear of attacking power that seemed to be the core of HN in its earlier days. 2) from those same types of companies, sockpuppetry has become a pervasive and powerful item in their toolbelt, accomplishing the same as above but with inorganic users and on a large scale. 1) Many industry titans such as MS, Apple and Monsanto, just as examples, have encouraged employees to participate in forums like this in order to affect conversations and influence debates, so real users of a strong bias against uncomfortable truths/facts use down votes in a way not intended. There is not just a single explanation, but I'll give it a go. THIS instance is Windows only because that is what it was targeted at. This is a vicious level of access for malicious software, and it is OS agnostic as far as the attack goes. Oh you use an external drive for your unencrypted boot partition? That can be modified as it is read off disk, before you're ever prompted for a disk passphrase, and it will report the correct checksum before it gets loaded. It can return TPM approved checksums to your kernel and continue a secure boot as long as it knew what those checksums were before it modified them. It doesn't matter what the operating system is, it just has to be designed for it. ![]() ![]() If software at this level is malicious, it has equal privileges as your BIOS before any kernel gets loaded. UEFI is the bootloader that loads your bootloader and is stored not on your hard drive. This isn't firmware, but it is pre-bootloader. This is an attack against the UEFI part, not the agent. You're talking about an attack against the agent this is designed to download, or you don't understand what a UEFI attack is. ![]()
0 Comments
Leave a Reply. |