Wow Matt really looking bad on this one. This just reeks of trying to push out a major business competitor to wordpress.com and abusing control over wordpress.org to do it.
Ah, I remember this controversy when the game launched. That person later admitted to modifying the meshes to make them fit better because they hated Palworld for “glorifying animal abuse”.
They raised the bridge a handful of years back due to all the crashes.
Didn’t stop the crashes.
The bridge is on S Pennsylvania Ave in Lansing, MI, hence “Penny”. Construction has routed more people through there than normal lately increasing the bridge’s hunger.
If there’s one thing people that rent trucks or RVs never learn, it’s the height of their vehicle (and that yes the flashing overheight lights are in fact for you).
Source: Used to live near there.
Not to mention that ads are a prime vector for malware and spyware (well, more spyware on top of the ad vendor itself).
I thought NPR left Twitter when Musk had them labeled as “state controlled media”
I get that it’s not the point of the article or really an argument being made but this annoys me:
We could blame United or Delta that decided to run EDR software on a machine that was supposed to display flight details at a check-in counter. Sure, it makes sense to run EDR on a mission-critical machine, but on a dumb display of information?
I mean yea that’s like running EDR on your HVAC controllers. Oh no, what’s a hacker going to do, turn off the AC? Try asking Target about that one.
You’ve got displays showing live data and I haven’t seen an army of staff running USB drives to every TV when a flight gets delayed. Those displays have at least some connection into your network, and an unlocked door doesn’t care who it lets in. Sure you can firewall off those machines to only what they need, unless your firewall has a 0-day that lets them bypass it, or the system they pull data from does. Or maybe they just hijack all the displays to show porn for a laugh, or falsified gate and time info to chaos for the staff.
Security works in layers because, as clearly shown in this incident, individual systems and people are fallible. “It’s not like I need to secure this” is the attitude that leads to things like our joke of an IoT ecosystem. And to why things like CrowdStrike are even made in the first place.
Seeing “the source is available here on GitHub”, “the project was forked and is now maintained as (other name)”, etc. after most of these really helps show the difference with Google. Well that and the length of the article, Google has far more deaths under their belt.