• 0 Posts
  • 52 Comments
Joined 1 year ago
cake
Cake day: June 2nd, 2023

help-circle
  • On day one, do one push up. Day two, two. Sounds a bit ridiculous, but it gradually builds difficulty.

    Crucially, it is not all in one sitting. On day 10, if needed, do five when you wake up, and five before bed.

    Break it up into something achievable. And if you miss a day, don’t sweat it. Again, the idea is to start to build, or rebuild strength and flexibility, the exercises themselves barely matter; you could do planks instead, for example.


  • So to correct one thing:

    Poor posture is a symptom of poor core strength, particularly, your rhomboids and lower back. If your muscles are both stronger and more flexible, they will literally pull your bones into the correct alignment, without any conscious thought towards sitting straighter.

    Start by taking a short walk once a day (free). A 100 day pushup challenge (free) or starting Yoga classes (can be free on YouTube, but in-person has several benefits, including having someone correcting your form, and some social structures to help provide extra motivation) would be a great next step. Longer term, maybe light weights and rows alongside using a treadmill or stationary bike.

    If you choose to look into weight training, “Starting strength” is a decent program by Mark Rippetoe that I would recommend.








  • Even as a power user… You can’t.

    And, in the 21st century, nothing on your computer is safe and private, least of all, browser extensions.

    Even if an extension is safe today, with a tiny handful of notable exceptions, it will be”monetized”, or bought and sold to someone that will use it to install adware on your system, train their AI model, or steal your personal information.

    There is no feasible defense to this for a layperson, other than absolute transparency in FOSS, and even that is under attack via flaws in the software supply chain.

    The best a layperson can hope for is that major vendors care more about exclusivity and locking others out of their ecosystem, such that they are the only ones who have full control of your data (Apple, Google, Microsoft).











  • It does when you have physical access to the RAM and storage, and a disassembly lab expressly configured for this purpose.

    This is the backbone for a number of forensic services offered to law enforcement, and an entire cottage industry. I know with certainty it was still feasible as of the iPhone 12, which is well inside of 15 years. I don’t believe the architecture in the 13 or 14 has changed significantly to make this impossible.

    With slightly earlier phones, tethered jailbreaks are often good enough, though law enforcement would more likely outsource to a firm leveraging Cellebrite or Axiom as the first step.