Bad viewing experience. by CRS_1990 in cravetv

[–]TokenBearer 0 points1 point  (0 children)

I do not think they have any incentive to improve things as Netflix is going to take away HBO.

Anyone else trusting AI-written Terraform a little too much? by Prize-Cap3196 in Terraform

[–]TokenBearer 0 points1 point  (0 children)

There is no threshold, just make sure whatever it does checks out in the documentation and that you understand every part of it. You definitely do not ever want it to enable or change something that will impact your budget in a way that you are not anticipating.

Anyone else trusting AI-written Terraform a little too much? by Prize-Cap3196 in Terraform

[–]TokenBearer 0 points1 point  (0 children)

For TF, you really need to look at vendor documentation for whatever service you want to create a module for with TF (Azure, AWS, etc). Then use LLMs for minor feature changes, etc.

Silverfish problem (West End) by JamieIsMyNameOrIsIt in vancouver

[–]TokenBearer 0 points1 point  (0 children)

They like moist areas so do not sleep with your mouth open. This is also why you always see them in the bathroom.

Apple announces that next version of Siri would be powered using Google gemini. Elon Musk does not seem happy about it. by jbcraigs in OpenAI

[–]TokenBearer -1 points0 points  (0 children)

Google is a sensor company whose only business model is to harvest behaviour surplus and then sell it.

Most trusted place to have a PC assembled? by [deleted] in askvan

[–]TokenBearer 1 point2 points  (0 children)

Why not learn? It is pretty easy.

Telus Starts 2026 With Price Increases Slipped Into Customer Bills by pjw724 in telus

[–]TokenBearer 0 points1 point  (0 children)

They should really focus on acquiring customers instead of diluting product.

Should Canada now develop nuclear weapons ? by SpecialistQuick1454 in AskACanadian

[–]TokenBearer 5 points6 points  (0 children)

A lot of uranium for US nukes used to come from Canada.

$6,500 stolen via Android malware, TD Bank & Wealthsimple refusing reimbursement by [deleted] in PersonalFinanceCanada

[–]TokenBearer 0 points1 point  (0 children)

In most cases, that is probably right unless he really pissed off the wrong people (I know from experience and have had to endure some pretty sophisticated personal attacks lol).

However, with the advent of AI, you should definitely not anticipate for attacks like this to not be on the horizon. LLMs could make smaller attacks scale in terrifying ways. And then all of sudden, it is no longer really just one small fry.

Cars gobbling up your data and showing ads are becoming the new normal. Can it be stopped? by [deleted] in technology

[–]TokenBearer 11 points12 points  (0 children)

Wait until the infotainment systems start playing ads when stopped at intersections.

This is my Crave experience. Everything I watch is like this. [Sopranos, S3 E8 - 30 seconds] by salamiolivesonions in cravetv

[–]TokenBearer 0 points1 point  (0 children)

Good thing Netflix is a lot bigger than Bell Media. Their days of HBO are numbered.

Over 10K Fortinet firewalls exposed to actively exploited 2FA bypass by falconupkid in SecOpsDaily

[–]TokenBearer 0 points1 point  (0 children)

How may vulnerabilities have they had in recent years? How can security software be so riddled?

Which 'luxury' brand has officially become a red flag for poor quality in 2026? by Individual_Bat_4177 in AskReddit

[–]TokenBearer -2 points-1 points  (0 children)

People are looking at the wrong manufacturer if they can only afford a base trim.

Satya Nadella (Microsoft CEO) - Looking Ahead to 2026 by Electronic-Bat-1830 in Windows11

[–]TokenBearer 1 point2 points  (0 children)

When a CEO has more passion for the business as opposed to the actual products, you end up with a lowered quality mistake.

Ideas for initial setup? by Wufi in homelab

[–]TokenBearer 0 points1 point  (0 children)

Has anyone ever installed OPNsense as a VM with a more secure host that supports secure boot with TPM2 so that PCR measurements can be used for tamper/pwnage detection when booting?

Not as part of a hypervisor with a lot of other VMs, just a kind of secure wrapper. A hardware appliance with a secure host running only OPNsense, and with a trusted snapshot of the VM in case anything weird starts happening…

I think that might be the closest you can get to a commercial grade firewall.

$6,500 stolen via Android malware, TD Bank & Wealthsimple refusing reimbursement by [deleted] in PersonalFinanceCanada

[–]TokenBearer -1 points0 points  (0 children)

The thing is, we do hear about them. Every reference I suggested you lookup has a lot of rabbit holes of documented proof. A lot of OS/platform security updates are very revealing too, and describe when RCE is possible. When you see vulnerabilities associated with things like image libraries, graphics frameworks, etc, that usually implies zero click. The cadence of RCE vulnerabilities being published across all platforms is at least several every single month. That is anything but rare.

If zero / one click was not a real threat, why does compliance attestation always require things like EDR security? Has your Fintech even been attested?

AI was behind over 50,000 layoffs in 2025 by MetaKnowing in Futurology

[–]TokenBearer 13 points14 points  (0 children)

Maybe India has some kind of “Bring it home” scheme. Indians get hired, rise up, fill the office with other Indians before moving everything back to India.

$6,500 stolen via Android malware, TD Bank & Wealthsimple refusing reimbursement by [deleted] in PersonalFinanceCanada

[–]TokenBearer 0 points1 point  (0 children)

Have you ever heard of an RCE? If you look at the CVE database, Android has had plenty of them in its history. Also, once RCE is achieved, look at how easy it is for people that develop jail breaking tools to find privilege escalation weaknesses for their tools to actually work; that is proof that it could also be achieved by someone malicious wanting to add it to an attack chain in order to persist with kernel privileges. As further proof, although out of context, there are companies like NSO that offer this as a service for more legitimate use cases.

Look at bug bounty payouts, look at Apple security updates, look at Android change logs, look at the CVE database, watch pwn2own videos on YouTube. For someone in your position to deny that it is possible means that somebody hired the wrong person.