• 0 Posts
  • 164 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle
  • Corporations hide crimes all the time, even when they are the victims. If the crime will lose them money in any way, either directly or from a reputation hit, it’s very likely a company will not report it.

    It only because the employees involved had their NDAs expire and confirmed they saw some very fucked up things that we know what he did.

    Twitch fired him publicly when he was one of their biggest streamers. It’s fully possible the explicitly sexual messages are a crime, but the parties involved, including the minor victim, did not want it reported.

    You can argue amazon should have reported it anyway if it rose to that level, but with none of the involved parties forcing the issue, it makes sense from a buisness stance not to.




  • Yeah, this is the normal price of a house in many large cities. It’s a lot mind you, but an adult in a high paying field can get a mortgage that covers that.

    You don’t need a million dollars to buy a million dollar house. You need to be able to make a million dollars and enough to live on in 30yrs, or whatever the length of the mortgage is. Someone in their 30s-40s can fit that bill, so just be yourself.

    If they ask if you have financing, say yes. If they ask more questions, say you will be glad to discuss that after the tour. Afterwards, just politely say you’re not interested and leave.



  • mosiacmango@lemm.eetoSelfhosted@lemmy.worldZeroTrust Your Home
    link
    fedilink
    English
    arrow-up
    50
    ·
    edit-2
    10 days ago

    ZeroTrust is a specific type of network security where every network device has its access to other devices validated and controlled, not a statement on the trustworthiness of vendors.

    Instead of every device on a LAN seeing every other device, or even every device on a VLAN seeing other devices on a VLAN, each device can only connect with the other devices it needs to work, and those connections need to be encrypted. These connectioms are all monitored, logged and alerted on to make sure the system is working as intended.

    You do need to trust or validate the tooling that does the above, regardless of what you’re using.