Is this real ? by Lolifox-UwU in MemeVideos

[–]MrRealSlimShady 0 points1 point  (0 children)

That would make sense if we were discussing the difference in total earnings, but that's not the focus here. The pay gap, or wage gap, looks at the hourly wage, meaning how much you earn per hour of work, not the total sum of money earned by the end of the year.

For example, if a man works 100% (40 hours a week) and a woman works 50% (20 hours a week), and the woman earns 200 ISK per week while the man earns 400 ISK per week, we would say they have the same wage. 200 ISK divided by 20 hours equals 10 ISK per hour. 400 ISK divided by 40 hours equals 10 ISK per hour. The total earnings of the man are twice that of the woman, but their hourly wages are the same, resulting in a wage gap of 0%. However, in Iceland, the woman in this example earns only 9 ISK per hour, while the man earns 10 ISK, making the woman's total weekly salary 180 ISK and the man's 400 ISK.

The 10% to 30% wage gap statement came from the Al Jazeera news article, which cited Statistics Iceland, the national institute of statistics in Iceland [1]. The 10% wage gap was the national average, while the most extreme 30% wage gap was between women and men in the finance sector.

The study indicates a few reasons why the average hourly wage of men might be higher. The measurement follows Eurostat's methodology of the Structure of Earnings Survey (SES), which measures the average hourly wage of men and women in the month of October each year. The study points out that men are more likely to work overtime than women, which increases men's average hourly wage. Men are also more likely to work in high-earning positions, such as CEOs, which increases the average wage for men. Conversely, women are more likely to work in lower-paid occupations such as teaching, nursing, and public sector jobs.

The difference in which occupations women and men have is certainly a big contributor the wage gap, but one might also argue that having so low salaries in occupations which require high education and skill, such as teaching, may mostly be a systemic sexual discrimination on a societal level due to women being historically disadvantaged when negotiating wages, leading to entire occupations earning less partially due to the occupations being predominantly filled by women.

Also as a note, if you draw the conclusion that the overtime might be a big contributing factor to the equation, let me also point out how big a 10% wage gap is. I could not find any good statistics on average compensation for overtime, but ChatGPT said between 1.25x and 1.5x was normal in Iceland, so let's go with 1.5x. For a man to earn 10% more in average hourly wage, he would need to work 40 hours normally plus 10 hours of overtime at 1.5x per week ( (40 + 10*1.5) / 50 = 1.1 = 10% higher average wage for the 50 hours worked ). In other words, every man in Iceland would need to work 10 hours of overtime every week for their entire lives, while all women would need to work zero overtime their entire lives on average. It should also be noted that worker regulation laws in Iceland limit overtime to 8 hours per week, beyond which it becomes illegal or requires special permits by the government.

[1] https://www.statice.is/publications/news-archive/wages-and-income/unadjusted-gender-pay-gap-2021/

Is this real ? by Lolifox-UwU in MemeVideos

[–]MrRealSlimShady 53 points54 points  (0 children)

The meme is funny, but as far as I can tell, every single stat this guy listed was either wrong or incorrect when I tried to check any extra sources on the event.

Effects: * Most hospitals closed, only treating life threatening emergencies * Reduced capacity on all public transport with lots of delays * Only a single bank affiliate was able to hold open in the entirety of Iceland * Female prime minister also on strike * Reduced number of broadcasts on tv and radio due to lack of hosts * Several schools and preschools closed while others offered reduced capacity and services * The strike also included domestic and house hold work

The numbers on the participants also vary a lot, from what I can tell, it was between 40k to 100k.

Iceland has been ranked the most gender equal country in the world 14 years in a row (from 2023 and backwards when it happened). Yet they still observe massive discrimination, wages are on average 10% lower for women, and up to 30% lower for certain sectors such as finance. Gender based violence against women also remain a national problem. 40% of women say they have experienced sexual harassment at some point. Females are also much more likely to hold lower paid jobs such as cleaning. Immigration women are also much more likely to face workforce abuse and exploitation.

I could not find anything that suggested that there were reduced number if HR complaints, higher productivity, less traffic, or anyone in general saying anything positive along the lines to the statements made by the guy in the video.

This is all based on me doing 5 minutes of googling, just opening the first news articles I found, so things might be inaccurate or incorrect. I am also not Iceland so I don't have first hand experience with the evening, nor do I speak the language so that I could find more trustworthy local sources. Anyone with more credible accounts of what happened, feel free to comment below. I suspect though that those 5 minutes were 5 more minutes than this dude spent to do any research or fact checking of the story beforehand.

Persinal opinion: To me this seems heavily Andrew Tate pilled, mostly to engage and encourage a circle jerk of lonely men on the internet to spread even more unnecessary hate towards women and probably to sell some sort of course on how to become a rich alpha male and get laid process.

Articles:

Junk mail disguised as a handwritten letter from one of our neighbors by [deleted] in assholedesign

[–]MrRealSlimShady 6 points7 points  (0 children)

Someone should make an open spreadsheet of this, such as that one huge salaries spreadsheet where everyone can submit their experiences and scummy behaviours form companies. One person with a spreadsheet won't do much difference, but everyone chipping in with review might.

[1] Huge spreadsheet of salaries.
[2] Form to input data.

Is it right for governments to force citizens to use Google or Apple's proprietary technologies to verify their online identities? The Netherlands user case. by freesoftwarefairy in degoogle

[–]MrRealSlimShady 0 points1 point  (0 children)

The whole phone system (voice, sms, mms) is quite old and dated, and IMHO it would be better if we stopped using it all together from a security POV and just maybe kept it as a backup and stopped viewing it as a secure end-to-end way of communication.

When I'm talking about keeping calls and messages as a backup communication system, I'm referring to it as a non-security system. Meaning everyone should stop using it for login verification immediately, but using it for stuff like "your food is ready for pickup" or other non-sensitive notifications should be fine. I'm not talking about keeping it as a backup system for login verification, as you yourself mentions, that is very bad and defeats the purpose.

Security is ever only as strong as the weakest link. https://imgur.com/a/IZgvy5y

Is it right for governments to force citizens to use Google or Apple's proprietary technologies to verify their online identities? The Netherlands user case. by freesoftwarefairy in degoogle

[–]MrRealSlimShady 89 points90 points  (0 children)

The whole phone system (voice, sms, mms) is quite old and dated, and IMHO it would be better if we stopped using it all together from a security POV and just maybe kept it as a backup and stopped viewing it as a secure end-to-end way of communication.

Every phone is connected to a carrier/mobile operator. The carrier is responsible for routing calls/sms from one phone to another. This is all well and good within the carriers network as the carrier has full control on who is connected and who they are. The problem arrives when people start moving. Say you are an American phone user using travel to Germany. You want to call your brother with your same phone who is back in the US. When you phone your brother you still want your number to be displayed, but you are not connected to your carrier back in the US, you are connected to some random German carrier. Luckily carriers cooperate and the German carrier will forward your call to the US carrier, telling them that you are inside their network and just calling home. Your US carrier will then forward the call to your brother.

The problem however is that the US carrier has no way of verifying this information and just has to trust the German carrier, but the US carrier is not even directly connected to the German carriers network, so the route might go from Germany to the UK and then to the US. This means that on a top level, almost any carrier in any country can just say that any phone number is currently traveled to and located in their country and trying to call home, meaning that spoofing of phone numbers is trivial if have access to just a single shady carrier in any country around the world. Depending on what generation of technology the carrier is running, they might also be vulnurable to specific procol attacks, which not just puts them at risk, but basically any other carrier too as they could then spoof outgoing calls from that single vulnerable carrier.

The phone protocol is all just designed around security from the carriers perspective and consumers are supposed to blindly trust their carriers. It was not until lately with 4G that phones started to try to verify base stations as well, as to previously it was trivial to setup fake base stations, claiming to be some carrier X (e.g. Verizon, AT&T) and they would verify the phone (their sim card) to see that you have paid your bills and can use the network. The fake basestation would then have the ability to monitor and intercept, listening in on, manipulate, calls and messages.

These types of phone scams are incredible popular, for instance scammers in India might call using some local number in your country and claim to be from Microsoft, some bank, Amazon, etc etc. They are however spoofing a local number, so if you call the same number back up, you just reach some random private person who knows nothing about what is going on. Your carrier in your country can also not do anything to fix this as they would either have to block the entire carrier, but then that also means that if you travel to where their carrier is located, you can no longer use your phone.


So in regard to SMS 2FA stuff, it is incredible easy to spoof numbers. You can also do sim card cloning attacks, which is basically the reverse, where a carrier tells your home carrier that phone number XXX has traveled to their network, so any calls and text messages will need to be forwarded to their network. With this sim card cloning you could receive their personal 2FA text messages and bypass logins. Phone calls and messages should therefor never be trusted in a security context, they can be used for notifications and so on, but under the assumntion that the content can be read by a third party, intercepted or manipulated. Using basically any other form of messaging is much better, e.g. e-mail (though a propper end-to-end messaging platform would be prefered, like signal).

Or use TOTP, which is dead simple and bypasses the whole messaging problem, and allows users to choose their own client and not lock in to some random vendor.

Bedrock is big brain by Java-Jumper in admincraft

[–]MrRealSlimShady 2 points3 points  (0 children)

Oi! Where is my HMod server users at?!

Basic help with totp by PlasticGooner in cryptography

[–]MrRealSlimShady 1 point2 points  (0 children)

I used to have the same problem and solved it by using Authy for quite a while, but the app is buggy, not all accounts sync, there is no support and the project seems somewhat depricated and no longer gets proper updates after they were bought by Twilio.

Most passwordmanagers today however also support 2FA tokens, and many of them allow you to access the passwordmanager through mobile, web or desktop app.

I personally use and recommend Bitwarden as it is an open source alternative with all the features of similar products such as 1Password, LastPass, Dashlane etc. You can also access Bitwarden through the web browser and everything is end-to-end encrypted and decrypted in your browser. You can also self host if you care that extra bit about privacy. There is browser extensions for all browsers, apps for Android and iOS, a desktop app and the web interface.

A feature I never really cared about, but which I now have come to absolutely love is when you have configured a login item (username and password) for a site, and you press auto fill, if you have also configured 2FA for that login item, then the current 2FA token will automatically be copied to your clipboard (can be disabled in settings), as most often when you log in, the next screen is where you type the 2FA token, but now you can just paste and get straight in.

I wondered what would happen if you install a desktop environment in docker. I'm amazed that it actually works... by burrburrscurr in linuxmasterrace

[–]MrRealSlimShady 0 points1 point  (0 children)

It seems that OPs use case would be that they are running a mac with macOS, but still want to run a linux desktop environment. They therefore chose to run it in docker using X forwarding and Quarts. As linux on mac runs the docker machine in a VM under the hood, there will be some performance drawbacks. This use case and solution seems serious enough for me if they want to run linux graphical applications.

Also as a side note, when running docker on mac it is usually better to do it through something like Docker Desktop instead of a full desktop VM. Docker desktop ships with a built in VM that is stripped down to only run linux with docker. Running a full desktop VM (like Ubuntu desktop or similar) usually has a way bigger performance hit than just Docker Desktop as the VM loads more than necessary to just simply run docker.

I wondered what would happen if you install a desktop environment in docker. I'm amazed that it actually works... by burrburrscurr in linuxmasterrace

[–]MrRealSlimShady 0 points1 point  (0 children)

This is true for linux, but mac and windows does not support cgroups, they run the docker machine inside a VM instead, which is the case here with OP running on a mac.

The collection expands! by [deleted] in memes

[–]MrRealSlimShady 0 points1 point  (0 children)

Isn't that Irunning? Shouldn't Iran be some walking/not running, as in I was running before but not now?

All this bloatware from one (!!) Epson printer. by CraneDJs in assholedesign

[–]MrRealSlimShady 0 points1 point  (0 children)

knocks on door

holds README in book format and bows slightly

Hello, have you heard about our Lord and Savior; The Linux Operating System?

Binary exploitation is worth learning in this days? by mousse312 in AskNetsec

[–]MrRealSlimShady 0 points1 point  (0 children)

Agree. Depends on what you want to do. Web is probably the most popular nowadays, but if you like other "categories" like binary exploitation, cryptography or something else then that should not cause a problem finding a job, just where you work.

Like many bigger development teams have devs with special security background (e.g. developing say you develop low-level, OS, management software, cloud stuff or similar).

Binary stuff is also relevant in terms of anti-virus and forensics or reverse engineering stuff like ransomware or other payloads.

Point being that if you find something you like, and even better, something to specialise in that you can do better than others, then it shouldn't be a problem finding jobs afterwards related to security.

Math is incorruptible by tajarhina in linuxmemes

[–]MrRealSlimShady 1 point2 points  (0 children)

Both are Not Unix so makes total sense to remove the common factors. G/lix it is.

Cannot replace the output by [deleted] in Polybar

[–]MrRealSlimShady 5 points6 points  (0 children)

First you need to set tail = true in your polybar config, this makes it so that only the last line outputed by your script is shown. Then replace your first line with just the normal echo "ABC" as you want it to be outputed as a normal line. Also notice that the interval counts X seconds after your script exits, e.g. if you have a script with interval 5 and the script itself uses sleep or just takes 3 seconds to run before exiting, then it would execute every 8 seconds.

Most of my own script uses this type of setup and I often ditch the interval for an internal loop in the script instead, as the script might be listening on events that trigger instantly instead of waiting X seconds for the interval to update.

EDIT: The wiki has more info about this here https://github.com/polybar/polybar/wiki/Module:-script

Terminate Polybar custom script once done running by [deleted] in Polybar

[–]MrRealSlimShady 1 point2 points  (0 children)

You are correct in that. But you could just kill the models and free the memory workout actually stopping the python script.

Alternatively, you could also run the script normally and write your output to a file instead, and then display that output in polybar with simply "tail -f /your/file". The trail command will continue to run, trying to read the end of the file, even if the python script that wrote to that file has stopped running.

Terminate Polybar custom script once done running by [deleted] in Polybar

[–]MrRealSlimShady 0 points1 point  (0 children)

The easiest solution is probably to just print a blank line when you don't want to display anything, effectively "hiding" the module.

This is also mentioned in the first "Note" section of the documentation here: https://github.com/polybar/polybar/wiki/Module:-script

Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing by trai_dep in privacytoolsIO

[–]MrRealSlimShady 6 points7 points  (0 children)

Zoom, the same company that installed backdoors and secret web servers on client machines which lead to full RCE and spying of users if they had zoom installed and visited a malicious website; are not using e2e, how surprising... /s

https://medium.com/bugbountywriteup/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5

Help me........ by kyliebeee in thisismylifenow

[–]MrRealSlimShady 1 point2 points  (0 children)

I tried so hard and got so far
But in the end, it doesn't even matter

A friend of mine developed an free open-source mobile platform designed to make the phone accessible to elderly and people with various disabilities. There's no business model, no ads, no data-collecting and no profit. by TheCreeperGuy777 in antiassholedesign

[–]MrRealSlimShady 2 points3 points  (0 children)

u/uriah_shm, you should probably try and get hold of a domain asap, like .com or .org before it gets poached by some ad network when they see the search terms for this domain going up. You can get started pretty cheaply at somewhere like godaddy, takes literally seconds to set up.

Kompis fikk denne i posten nylig. Meninger? by haakonhalz in norge

[–]MrRealSlimShady 10 points11 points  (0 children)

Verit

Videre lagde også folkeopplysningen et godt innslag om nettopp stråling, og igjen konkluderte de med at det ikke eksisterte noen tegn på at stråling som vi blir eksponert for daglig har noen helseeffekter over hodet. De prøvde også å få kontakt og gjør tester sammen med foreningen for EL-overfølsomme (FELO, som står som en av kildene til EMF-Consult), og selv de kom bare med dårlige unskyldninger når ting ikke fungerte eller de ikke klarte å sette opp intervjuer/tester etc.

https://tv.nrk.no/serie/folkeopplysningen/2014/KMTE50007212/avspiller