• 1 Post
  • 17 Comments
Joined 2 months ago
cake
Cake day: October 3rd, 2025

help-circle




  • I had an ex that asked me to show her how to cook and then proceeded to have a complete mental breakdown while screaming about how judgy I was being.

    Turns out she lived off of turkey on flatbread, plain, every.single.night. We didn’t make it more than a month. My (now) wife went from only being able to bake, to a full on Sous Chef. Most nights I don’t have to say a word, we’re just on a mission to get dinner for 5 ready.




  • Woah, core memory unlocked! As kids, we put DSL on business card shaped DVDRWs and kept them in our wallets. We could take them to the library and boot into DSL, bypassing the software security.

    At the time, libraries had outrageously fast internet compared to home. I would plug in my ORB drive and write as much Napster to the tape drive as I could (2.2GB @ 5-8MB/second). I’m sure everyone there had the worst connections because of me.

    Great memory for me, thanks! 🙏



  • I’m speaking from the point of view of the app you gave permissions to collect your hardware data. Y’all are talking like I think a MAC is transmitted over tcp. I don’t need an intro to OSI. Those apps use the hardware data to know if you’re using Samsung, LG, Apple, etc and they store large databases of MAC addresses on individuals. They can even build a local hardware profile to see if you sold your device, to whom, and what device you replaced it with.



  • Unless they’re spoofing their MAC address, hardware fingerprinting is much more reliable and predictable. It’s easy to watch a MAC bounce all over the country/world in a matter of minutes.

    At this point in history, it’s too late to implement identity protections. Your profile is already built, stored, and backed up. They even know your deleted edgelord MySpace account and that you unfriended Tom (you monster). I guess if you were born in a ditch without a SSN, and never signed up for anything, not even a house/apartment, you could go under the radar.


  • Took me an hour and a half of my own time to get ready and commute 30 miles in heavy traffic.

    Once at work, I would get invited to the cafeteria to get coffee with the boss, which also turned into a breakfast burrito. As I sat there getting fatter, my boss would mostly talk about his personal life and we’d wander back to my cube.

    Other people would congregate around our area catching up on sports ball, check out the women walking through the parking lot.

    When things broke the executive IT support guys sat in your lap until you fixed it. Then lunch… some place fatty because their spouses weren’t there to discourage them from the double bbq burger with fries and a few beers.

    At this point I’ve done about an hour behind the keyboard. Stay on hold with a vendor for an hour. Then pack up and head 42 minutes home.

    NOW, I roll out of bed, get my bowl of yogurt and granola walk over to my office, and I’m heads down and able to concentrate for the next 6 hours. Since the lock downs I’ve increased my work performance and received multiple raises for my efforts. I have more flexibility to watch my kids if they’re sick or on break, and I can get a quickie on my lunch hour… or grocery shop. Thriving indeed.



  • In the 90’s, companies were super lax on data security, retention, and destruction. In my city we had major IT players like INTEL, HP, Motorola, etc. We would dumpster dive and find whole computers full of data and no passwords. We were after the hardware so all our friends could play Doom MP, Quake, or later Unreal Tournament… so we usually wiped them but who knows what was in those things. It was a lot of e-waste and because of divers with bad intentions, now there’s incredibly strict corporate rules about data security/destruction.