=== ANCHOR POEM ===
═════════════════════════════════════════════════════════──────────────────────────
 you know how SSH password login is deprecated because the password needs to be
 transmitted in cleartext or whatever?
 
 what if we just... required two passwords?
 
 the first initiates the conversation, and sets up an encrypted line. It
 doesn't matter if anyone sees the first password because they'll get a new set
 of encrypted keys, meaning each session automatically is encrypted in a
 different, randomized way.
 
 the second password is the one that actually authenticates you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

=== SIMILARITY RANKED ===

--- #1 fediverse/3470 ---
═════════════════════════════════════════════════════════──────────────────────────
 alternatively, when you initiate an SSH session it sends you a randomized
 public key whose private key is the password that you need to login. By
 decrypting the string of text it sent you and sending it back (plus the
 password at the end or whatever) you can ensure secure authentication without
 bothering with the passwordless keys which are wayyyyyy more trouble than
 they're worth and lack the "something you know" authentication method.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #2 fediverse/1310 ---
═════════════════════════════════════════════════──────────────────────────────────
 that feeling when you type your password so fast that one hand is faster than
 the other and the letters get all jumbled and now you have to remake your ssh
 key -.-
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #3 fediverse/2674 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌────────────────────────────────────────────────────────────────────┐
 │ CW: factually-untrue,-that-never-happened.-this-is-just-gesturing. │
 └────────────────────────────────────────────────────────────────────┘


 the kind of friendship where you SSH into each other's systems and leave notes
 for one another.
 
 as soon as you find one you message the person who left it like "yoooo only
 just found this lol" and they're like oooo yeah did you see the bash script I
 wrote in that directory "yeah totally I used it on one of my video files just
 now - cool filter!"
 
 ahhhh reminds me of all the times hackers have hacked my permanently insecure
 system and left me friendly messages like "hey I'm on your side" or "how's
 life, friend? I hope it's going well." or "never forget; you are worth all the
 fear" y'know cute things like that
 
 oh. right. because leaving vulnerabilities like that can lead to threat actors
 affecting your stuff. how lame.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #4 fediverse/874 ---
═══════════════════════════════════════════════────────────────────────────────────
 oh yeah well if SSH keys are so secure then why doesn't every website on Earth
 require them
 
 really though why doesn't every website on Earth require them
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #5 fediverse/3668 ---
═════════════════════════════════════════════════════════──────────────────────────
 setting up an SSH server is like a rite of passage for Linux administrators
 
 (notice I didn't say users, you can't use linux, only administer it)
 
 ... I'm having trouble with my rites >.>
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #6 fediverse/5109 ---
════════════════════════════════════════════════════════════════════───────────────
 does anyone know of a website where I can host videos on my neocities that
 isn't youtube? maybe something I can set up on my own server computer at home
 like a file server or something? how do I do that, what should I google, which
 is the easiest and closest to the metal tools I can use? [practical, sensible,
 courageous. these are the adjectives we need.]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #7 fediverse/1261 ---
════════════════════════════════════════════════──────────────────────────────────┐
 sometimes I run this WoW server with only like, 10 username and passwords. And   │
 they're all public. As far as I can tell nobody's ever tried connecting          │
 (whatever >.> ) but rather than set up a way to create your own                  │
 credentials I just said "yeah pick one at random and play whatever someone       │
 else was doing because I like the idea of that"                                  │
 somehow, it felt right.                                                          │
 most of my passwords (not all of them) are hacked and visible on the clear       │
 net. Like you could probably google my usernames and get my current passwords    │
 for things like, social media or my banks or whatever. I kinda like the idea     │
 that "you cannot trust anything I say, so think of the ideas behind my words     │
 and decide whether they hold meaning to you" rather than "execute these          │
 particular thought patterns in your mind as if they came from my voice"          │
 because one implies an exertion of control over the mind of the recipient        │
 -> obey my thoughts as I broadcast them into your mind, that kinda vibe.         │
 And I feel like you have to consent to that kind of thing hehe                   │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════───────────────────────┴──────────┘

--- #8 fediverse/2622 ---
═══════════════════════════════════════════════════════────────────────────────────
 what kind of linux user are you if you don't even like reading terminal
 output? it's USEFUL and INTERESTING information!
 
 WHY ELSE WOULD THE PROGRAMMER OUTPUT IT???
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #9 fediverse/4946 ---
══════════════════════════════════════════════════════════════════─────────────────
 I would trust the CIA if they gave me continual access to all surveillance of
 myself
 
 -- stack overflow --
 
 what if you made a program which cycled credentials?
 
 like... "give me a random credential for Zoom" because we share all of our
 digital resources
 
 did you get banned for account sharing? no you didn't because you routed
 through the correct VPN
 
 automagically
 
 [has never had a software job]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════────────────────┘

--- #10 messages/181 ---
═══════════════════════════════════════════════────────────────────────────────────
 I know you don't want to hear this, but there is a chance that there will come
 a time where your life depends on your ability to debug a computer without the
 internet. To set up an SSH server. To install Linux. To program in C. To do
 something else that I'm not prepared for... If StackOverflow didn't exist
 because network connectivity has been lost, could you remember syntax? Maybe
 it's a good idea to set up a local LLM that can answer basic questions about
 technology. Maybe it's a good idea to set up on your parents computer, just in
 case you have to hide out there for a couple months. Maybe it's a good idea to
 download wikipedia, just in case.
 
 If I need to use a mac, I'm screwed
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #11 fediverse/4869 ---
═════════════════════════════════════════════════════════════════──────────────────
 https://cryptpad.fr/pad/#/2/pad/view/FlA92SW5bVwGd+L89yV9U0I0SMNiGm3P0P3xS7DqYm
 A/embed/
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #12 fediverse/3471 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-883 
 
 it might be, I don't know much about it (hence why I'm asking questions) but I
 have heard that ssh keys are more secure than password authentication and it
 never made sense to me. If availability is important for security purposes,
 then wouldn't SSH keys (which are much more difficult to carry around than a
 password) be less suitable?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #13 fediverse/466 ---
══════════════════════════════════════════════─────────────────────────────────────
 I love Linux. All I have to do is type "authserver" and "worldserver" and
 wouldn't you know it suddenly a universe is created (with very constrained
 rules) that anyone might inhabit should they desire to. It's not like I'm
 perfect - oh wait I have a toot about that, gimme a sec
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #14 fediverse/3407 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-1218 
 
 there's only a password so that if the zip archive is displaced from it's
 context it's harder to read.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #15 fediverse/3627 ---
═════════════════════════════════════════════════════════──────────────────────────
 ┌────────────────────────────┐
 │ CW: computer-toucher-stuff │
 └────────────────────────────┘


 "why putting SSH on a port other than 22 is a bad idea"
 
 https://www.adayinthelifeof.nl/2012/03/12/why-putting-ssh-on-another-port-than-
 22-is-bad-idea/
 
 "When you are logged onto a system as a non-root user you cannot create a
 listing TCP or UDP port below 1024. This is because port numbers below 1024
 are so-called privileged ports and can only be opened by root or processes
 that are running as root."
 
 thoughts?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #16 fediverse_boost/3867 ---
◀─[BOOST]
  
  I really hate "two factor" auth.  Like, cool, I get it, it let's you pretend you can divest responsibility for security and recovery, but also it means dropping my phone too hard could be a life disrupting event so somehow I don't really feel like this is for my benefit.  
  
                                                            
 similar                        chronological                        different 
─▶

--- #17 fediverse/3671 ---
═════════════════════════════════════════════════════════──────────────────────────
 Phew got SSH working! Turns out it was the fact that the authentication key
 was owned by root instead of ritz. Doh, how could I forget the thing that
 wasn't mentioned anywhere in my search queries.
 
 you didn't search query, you used chatGPT, which is why you were stuck for so
 long
 
 haha oh yeah
 
 ... now I should fix my obs, it won't record video for some reason.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #18 fediverse/5919 ---
════════════════════════════════════════════════════════════════════════════───────
 "but... why?"
 
 portable linux with buttons, great for pick-up-games or communication, can
 throw several in them in a backpack if you want clustered cooperation, they
 work as radios (if the signal reaches) and can transmit text (if you use a
 radial-style keyboard)
 
 [this is all just a pitch for... something, what, you want something? ha
 you'll find no things with me, I know nothing of antifa or whatever]
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #19 fediverse/6029 ---
════════════════════════════════════════════════════════════════════════════───────
 spilled water on my keyboard by living with a cat. it might be broken so I'm
 using a spare that my girlfriend lent me. if you're wondering why my password
 sounds different...
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #20 notes/environment-variables ---
═══════────────────────────────────────────────────────────────────────────────────
 To edit environment variables:
 
 ~/.bashrc is for variables only accessible by the user.
 
 /etc/profile is for variables accessible by all users.
 
 /etc/environment is for variables accessible by anyone.
───┐                                                           ┌───────────┐
 similarchronologicaldifferent══════───┴───────────────────────────────────────────────────────────────────────────┘

--- #21 messages/752 ---
══════════════════════════════════════════════════════════════════─────────────────
 techbros really wanted to automate IRC so they didn't have to rely on the
 community knowing and trusting them to remember the commands to make docker
 containers for their react frameworks
 
 and like... yeah I use chatGPT too, because that way I can get what I need
 without bothering anyone (you aren't bothering people who get off on helping
 others when you ask for help)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════────────────────┘

--- #22 fediverse/5977 ---
════════════════════════════════════════════════════════════════════════════───────
 apparently you can use network sockets for inter-process communication if you
 just set the network to your home and the ports that are set to the defaults
 that people who know what software you use will know to listen on when they've
 hacked any single device on your network. good thing that data is with the
 router, right?
 
 what if there was a stop before leaving the computer?
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #23 fediverse/1448 ---
═════════════════════════════════════════════════──────────────────────────────────
 ┌──────────────────────┐
 │ CW: cursed           │
 └──────────────────────┘


 that one option flag in the config file that you don't know what it does
 because the documentation intentionally doesn't explain it very well (or
 explains that it solves a use-case that like, nobody would ever have, and
 certainly you don't have) that secretly sets a flag which sends your [redacted]
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #24 fediverse/1762 ---
══════════════════════════════════════════════════════─────────────────────────────
 This was the first bash script I ever wrote.
 
 It's been updated a little, it was a bash alias first, but this is what it
 looks like now.
 
 Kinda shows what kinds of problems I needed to solve most.
A bash script that plays a random episode of Adventure Time from a terminal.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #25 fediverse/2252 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-encryption  │
 └──────────────────────┘


 users don't want to have to think about encryption keys.
 
 they should be available for them if they need them, in like... a folder or
 something somewhere, but they don't need to really know that they exist.
 
 more friction like that keeps people away from being secure.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #26 fediverse/664 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-482 
 
 [secretly installs a keylogger and doesn't tell anyone upstream but still
 pushes it to production]
 
 [or worse, was told to do as such and given tools to fabricate "evidence" to
 the contrary to everyone else on the team]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #27 fediverse/5950 ---
════════════════════════════════════════════════════════════════════════════───────
 @user-138 
 
 wao I'm a cool kid _^
 
 Hmmmm I googled "Network: file exists" and got this link:
 https://access.redhat.com/solutions/1340713
 
 my understanding of that is that maybe you're creating static routes, and for
 some reason you're trying to create one that already exists? Maybe there's
 something in your .bashrc config, if the file appears when you open a
 terminal, or perhaps if it appears randomly then maybe there's a service or
 something that's doing it.
 
 Did you say it stopped when you swapped sim cards? ... on your phone? that's
 bizzare... Maybe you were trying to create an ip route (whatever that is) that
 was pointing to the same ip address as your phone? and when you swapped sims
 it changed the ip address? If it appears again, maybe try setting static IP
 addresses for both the phone and the computer in your router settings and see
 if that fixes it. Though if you've ever seen the error while out and about at
 like, a coffee shop or library or whatever, then that wouldn't apply since the
 router is only for home base...
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #28 fediverse/3234 ---
════════════════════════════════════════════════════════──────────────────────────┐
 ┌────────────────────────────────────────────────────────────────┐               │
 │ CW: ritz-is-fucking-stupid-I-guess-oh-whoops-cursing-mentioned │               │
 └────────────────────────────────────────────────────────────────┘               │
 my understanding is that anyone with my IP address could make my heart bleed     │
 due to a hardware vulnerability on my motherboard. Though you might have to      │
 get past my decrepit ancient linksys EA 3500 router from 2012 first.             │
 unrelated, but does anyone want my IP address? I don't have any remote           │
 backups, so if you hate me now would be a great time to show me how despised I   │
 am. Alternatively you could try searching for anything evil to ensure that I     │
 can be trusted. You're gonna find mostly video games and source-code that I      │
 didn't write though. But also all my notes in directories that are               │
 non-standard, meaning you'll have to look around a bit. I leave little notes     │
 everywhere I go, so that I can remind myself how to do things in the             │
 directories I revisit months later. It's so weird how sometimes the things I     │
 wrote stop working after a while even if I didn't update my system lmao          │
 what is it with artists and self-immolation? "I never thought I'd actually di    │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════════════───────────────┴──────────┘

--- #29 fediverse/1482 ---
═════════════════════════════════════════════════──────────────────────────────────
 @user-192 
 
 I feel like SSH keys to log into every website should be a standard
 
 or something similar
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #30 fediverse/4107 ---
════════════════════════════════════════════════════════════───────────────────────
 Just configured Wake on LAN so I can turn on my desktop from anywhere. As long
 as I have the right SSH key...
 
 Couldn't figure out how to do Wake on WAN, which I think is somehow more
 secure. This way uses a small jump from a separate tiny computer which is
 always on.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #31 fediverse/1359 ---
═════════════════════════════════════════════════──────────────────────────────────
 normalize making a new account when you forget your password instead of
 changing it because once changed there's no way to verify the authenticity of
 the user aside from trusting an outside source like an email provider which by
 the way is basically skywriting
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #32 fediverse/4301 ---
════════════════════════════════════════════════════════════───────────────────────
 @user-1655 
 
 maybe the user could tell their client what fields to expect and how to
 present them (like, a field called "memes" would be presented as a picture in
 this panel, a field called "rants" would be passed to a word-cloud function
 that extracts the most common 6+ letter words so you can tell at a glance what
 the rant is about, this other field could be for calendar invites (plain text
 of course, but interpreted by the calendar program) etc)
 
 plus, if it's encrypted with PGP keys by default, there'd be few security
 concerns. Unless your friend got hacked, or you got hacked, but, well... make
 sure everything's sandboxed and don't do any remote code execution and you're
 good, right?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #33 fediverse/4900 ---
═════════════════════════════════════════════════════════════════──────────────────
 if you wanna trick systems administrators just put a bunch of sleeps in your
 code so your computer programs don't use up all the mainframe's resources all
 at once
 
 [statements dreamed up by the practically deranged]
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #34 fediverse/1693 ---
═════════════════════════════════════════════════════──────────────────────────────
 "if I work on the TTY then they can't forward my X session without my consent"
 
 - ramblings of the utterly deranged
 
 as if they couldn't just look at your unencrypted source-code as you save it
 to your hard drive smh
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #35 fediverse/1611 ---
════════════════════════════════════════════════════──────────────────────────────┐
 @user-1040                                                                       │
 well, usually in the examples I shared like tumblr posts there's a username      │
 and picture shown. But tumblr users change their names, while on Mastodon (at    │
 least on my client) it shows your permanent handle underneath your regular       │
 changable name. I guess you could migrate accounts to another server if you're   │
 being harassed in one place, but still people have a way of finding you. It's    │
 weird kinda makes me wonder if they track you by ip address haha - did you       │
 know that every computer attached to a router uses the same public IP address?   │
 Then it uses either DHCP or static assigned local addresses for every computer   │
 on the network. That's pretty neat! I wonder why we don't have workstations by   │
 default include a router (and modem)? Seems like pretty important tech that      │
 should be built into the chassis instead of in a small separate unit. Like,      │
 what if you had to throw all your belongings into a van and drive to a motel     │
 somewhere to set up your workstation in a hotel because it's hot and your ac     │
 broke lol                                                                        │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════════───────────────────┴──────────┘

--- #36 fediverse/2352 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: pol              │
 └──────────────────────┘


 Nobody will tell you what to do, at least not until you ask. Be where they can
 see you, and you'll be given a task. If you can do it, say "BRB" - one moment,
 let me handle that for you.
 
 If you can't, say "good luck", and they'll find someone else who can.
 
 It's okay to pass a task off - if someone says "Here's what I need, gotta go"
 then you say "sure, yeah, I'll get someone on it" - then, go find someone to
 do it.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #37 fediverse/1505 ---
═════════════════════════════════════════════════──────────────────────────────────
 2 factor authentication is not for security. If they cared about security they
 would use SSH keys.
 
 2FA is so that your email provider knows whenever you log in somewhere. Most
 people use gmail.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #38 fediverse/308 ---
═════════════════════════════════════════════──────────────────────────────────────
 when tech people are hurt by technology they say "how can I fix this? what do
 I need to install? what configuration should I use? is this company ethical,
 or are they going to hurt me in the future? could I make something that fixes
 this myself?"
 
 when non-tech people are hurt by technology they say "okay" because they don't
 have the bandwidth to figure it out.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #39 fediverse/5291 ---
══════════════════════════════════════════════════════════════════════─────────────
 the most important skill I can think of for a linux software engineer is the
 ability to connect multiple systems together and turn windows and macintosh
 devices into Linux devices so that datacenters can be built out of whatever's
 on the around.
 
 there's this programming language I like called Chapel for distributed
 computation computing which is also cool, if you're more of the programming
 type.
 
 networking security I believe often has hardware solutions, so getting the
 crypto-graphy boys and the PCB girls together to work on some jams is a good
 and productively useful gathering of insightful events
 
 "but ritz computers should only be used to solve problems that people have,
 not make more problems!" ah yes but have you considered that problems find
 you, and the computers help you work through them
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════════────────────┘

--- #40 fediverse/4296 ---
════════════════════════════════════════════════════════════───────────────────────
 @user-1655 
 
 why don't we just weaponize email and send json to each other that ends up
 parsed, interpreted, and presented on the end-user's computer using whatever
 client we want?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #41 fediverse/1870 ---
══════════════════════════════════════════════════════─────────────────────────────
 why would I want other people using my computer? They don't know how to use my
 computer! They might break something or mess something up or automatically
 read/edit my files that are stored in standard locations through the usage of
 a script which automagically scans and ransomwares machines on the internet
 who store their files in specific standardized locations! no thank you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #42 fediverse/1246 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-883 
 
 hehe if I don't understand how it works it's difficult for me to use things.
 My Linux friends get so exasperated with me because I'm like "cool script
 gimme like 2 days to figure it out" and they're like "bro just use these
 flags" and I'm like "no"
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #43 fediverse/6215 ---
══════════════════════════════════════════════════════════════════════════════─────
 hi does anyone have any good resources on risc-v?
 
 I found this:
 https://dramforever.github.io/easyriscv/#shift-instructions
 
 and this:
 https://projectf.io/posts/riscv-cheat-sheet/
 
 but I'm missing a big gap - specifically, how to move from syntax to
 deployment. I need details on how to implement the software and get it running
 on the actual hardware.
                                                           ────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════────┘

--- #44 fediverse/2412 ---
═══════════════════════════════════════════════════════────────────────────────────
 @user-1209 @user-1262 
 
 just gonna say you probably deserve that particular screenshotted block haha -
 imagine calling anarcho-nina a fed xD xD
 
 plus that first "get the fuck out of my mentions" was a tip that went over
 your head, not a threat said in anger. she's pretty darn angry but that just
 means you don't wanna be in her way =P
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #45 fediverse/2423 ---
═══════════════════════════════════════════════════════────────────────────────────
 does anyone know of any fedi software that lets you link to a particular post
 and read forward on a person's timeline from there? Or back I guess, but
 chronological viewing specifically.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #46 fediverse/4172 ---
════════════════════════════════════════════════════════════───────────────────────
 this is what I got so far for a messaging client that uses SSH
 
 ... so you need someone's public key in order to talk to them
a picture of a notebook page that shows an initial design for a SSH based messaging client
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #47 fediverse/2056 ---
══════════════════════════════════════════════════════────────────────────────────┐
 sometimes I think about how you can store number values in letters, in           │
 addition to numbers. Like, ascii values for each word of your grandma's maiden   │
 name. All you have to do is encode it, and suddenly "44 means something          │
 different than Q"                                                                │
 if I showed up at your place and used your username as a password to a public    │
 key I'm showing you in my hand, would you trust me then? Would you trust if we   │
 ran the simulation on your computer versus mine? Would you trust if I had        │
 never told you I knew where you lived?                                           │
 ... probably, tbh, I'm desperate for adventure. Though I got some good things    │
 going for me, so you'll have to convince me. (not the right attitude in an       │
 election year, just saying)                                                      │
 why are elections so perilous this is NOT what democracy is designed for         │
 when kids cry in preschool, they're sent to a different room (or put outside)    │
 until they stop making noise and ruining it for others. That's just natural,     │
 like "hey baby let's walk around the block while I bounce you on my shoulder     │
 and hum calming music to                                                         │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════════════─────────────────┴──────────┘

--- #48 fediverse/1961 ---
══════════════════════════════════════════════════════─────────────────────────────
 @user-1037 
 
 Here are some neat ways!
 
 https://hachyderm.io/@user-1044/112512896931443652
 
 but you were part of that thread last month so you might remember : )
 
 (I ended up buying two of those python-only processors chips btw - I don't
 know how to solder though so I'm waiting to meet a new friend at my new job
 who can do it for me)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #49 fediverse/6278 ---
══════════════════════════════════════════════════════════════════════════════─────
 @user-1429 
 
 do something fun and hard like walk to seattle or install linux on a toaster
 or write happy notes on post-its and leave them in public places or make art
 and leave it in a public place or~
                                                           ────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════────┘

--- #50 fediverse/6438 ---
═══════════════════════════════════════════════════════════════════════════════────
 why would you gatekeep content by keeping us from easily using LLMs some
 people aren't technical and still need to write computer programs because
 that's how you enlighten a people is empower them with new tools
 
 "I've never heard of that programming language, but luckily I can fit all of
 it's documentation in my context window."
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #51 messages/111 ---
══════════════════════════════════════════════─────────────────────────────────────
 When someone remakes content into a different expression like a remake or
 reboot or whatever it gives a different message in its meaning - some
 circumstances and characters can apply for more than one message I'm it's
 meaning
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #52 fediverse/4751 ---
════════════════════════════════════════════════════════════════───────────────────
 apparently security through obscurity is out, and security through community
 is in, don't ask me how I know that teehee
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #53 fediverse/247 ---
════════════════════════════════════════════───────────────────────────────────────
 @user-195 parallel is when two programs run simultaneously, like two parallel
 lines (threads) that never touch.
 
 concurrent is when the two lines are split up into chunks and the program
 switches between them - like this: -----_----
 
 enter alternate universe
 
 parallel is when two programs operate on the same axis - usually time - and
 never interfere with each other. the OS will switch between them as
 appropriate to make sure they never intersect. Sorta like this: -----_----
 
 concurrent is when two programs are executed simultaneously, primarily
 constituting computation correlated with collective contents of coordinated
 collaboration between contextually related coroutines.
 
 It's simple, even a beginner could figure it out.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════──────────────────────────────────────┘

--- #54 fediverse/5211 ---
═════════════════════════════════════════════════════════════════════──────────────
 ┌──────────────────────────────────┐
 │ CW: most-of-this-post-is-made-up │
 └──────────────────────────────────┘


 My computer has an extended password where you have to type the things that
 most people put in ~/.bashrc in order to get the system fully operational
 
 people say "why does it take half an hour to turn your computer on" because I
 keep forgetting the somatic typing components, beatrice. dear, please give me
 a moment, I'll have netflux up and running in - ... oh yes thank you, I would
 have typed netflix in wrong. that helps, and explains this error here where it
 says it can't find "netfucks"
 
 I was like... WHY ISn't this listed in the dependency repository??
 
 [hackers just clone your hard drive megabyte by megabyte every time you start
 a particular program or use a piece of the system utilities like finder or
 un-win-rar, so having a longer password won't help]
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════════─────────────┘

--- #55 fediverse/2111 ---
══════════════════════════════════════════════════════─────────────────────────────
 when someone deletes what they were typing and starts over, that means they
 have something more to share and you should try and figure out what it is with
 questions.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #56 fediverse/239 ---
═══════════════════════════════════════════───────────────────────────────────────┐
 if your computer gets hacked, but nothing was broken or changed... do you        │
 leave it as it is so that anonymous can see you're chill or do you wipe it       │
 because you're afraid it's the feds?                                             │
 ehhhh false dichotomy most people are afraid that their system will get borked   │
 or their bank account will be stolen or their email will get spam or that        │
 random icons will turn inside out and their mouse cursor will turn into a        │
 barfing unicorn or they'll finally have to figure out bitcoin to pay a ransom    │
 for their files including the only pictures they have of their niece. whoops     │
 people are afraid of technology because of what it can do to hurt them.          │
 they're afraid it'll break or stop working, and they'll have to spend time       │
 figuring it out. they like things how they are, but for some reason companies    │
 keep changing things? it's frustrating learning a new system, and every 5-10     │
 years it feels like you have to learn a new paradigm and ugh it's just so        │
 exhausting. technology is not designed for users...  or maybe users get bored.   │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════────────────────────────────┴──────────┘

--- #57 fediverse/3266 ---
════════════════════════════════════════════════════════───────────────────────────
 how many people do you think in the world know that screenshots of a website
 are not admissible proof because they can be trivially doctored by editing the
 html?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #58 fediverse/1038 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌──────────────────────┐
 │ CW: re: what         │
 └──────────────────────┘


 @user-766 
 
 ah yes but then how will my comrades come for my things know where to look? my
 precious precious drives may be less safe inside of the computer case but at
 least then someone I can about can find them.
 
 or what you're saying is that a basic part of situational awareness is having
 a plan for this kind of thing with the people who care about you? Ah, well,
 nobody cares about me like that. Just a couple normies who want nothing but
 business as usual.
 
 wonder if I can open up my hard drives to "read only" SSH access? Or maybe
 I'll just make the important files into a torrent. Or perhaps marking them as
 "downloadable locations" on Soulseek? Plenty of options, all of them require
 someone to care enough about your junk to want to archive it. Something
 something ipfs?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #59 messages/890 ---
═════════════════════════════════════════════════════════════════════──────────────
 If your code is too long to fit in 80 or 120 characters (preference) then you
 need to use more numbers (indexable with a small table-of-contents style
 comment description just above) or character symbols (referencably by meaning
 just as above) (by above she means earlier in the string of text you just read)
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════════─────────────┘

--- #60 fediverse/6267 ---
══════════════════════════════════════════════════════════════════════════════─────
 if you have TTS software you can listen to anything with any tone. this makes
 it difficult to find things.
 
 ============== stack overflow ============
 
 some people work by asking for funding. others work by saving up. 
 
 ============== stack
 overflow ============
 
 teach your animals to be actors so they know how to develop the scene. then
 they will truly come alive, as their narrative curve gives them determination
 in the outcomes of their goals.
 
 ============== stack 1234flow ============
 
 I believe it is good and natural actually for parents to guide their children
 as they grow?
 
 "oh but they can't consent to giving up their control" well too bad they're 2
 "ah but what if they WANT to run with scissors?" thus widening the [redacted]
 gap. "ohhhh she redacts things when she can't spell them" and also for comedic
 or dramatic effect sometimes. was not ACTUALLY redacted. redcoated. red coded.
                                                           ────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════────┘

--- #61 fediverse/166 ---
═══════════════════════════════════════════────────────────────────────────────────
 @user-147 years of practice. every time you delete what you said is another
 chance to practice that slips away. writing is the easy part, you got that
 down because you need something to delete, right? the hard part is being
 received by others, and continuing the conversation as you direct it.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════───────────────────────────────────────┘

--- #62 fediverse/3907 ---
═══════════════════════════════════════════════════════════────────────────────────
 kinda wanna make a linux distro that has all the capabilities of a GUI distro
 and isn't so minimal (like screen recording, calculator, screenshot, wifi
 manager, etc etc) but with i3 instead of a desktop.
 
 they could literally just be symlinks (shortcuts) to scripts that are in your
 /usr/bin or whatever directory
 
 seriously it's not like there's THAT many ways to use ffmpeg, why not just
 write a script for them? that's what you're going to do when you use it for
 the first time, anyway, so...
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #63 fediverse/5851 ---
═══════════════════════════════════════════════════════════════════════════────────
 @user-1074 
 
 I realized there might be a lot of configuration required. Oh well here ya go:
 
 https://pastebin.com/x40VXQnH
 
 https://pastebin.com/H5C4umWq
 
 https://pastebin.com/dgDeS5Xu
 
 https://pastebin.com/JCLrwF1z
 
 https://pastebin.com/As6diaYc
 
 https://pastebin.com/0vwzJUW4
 
 https://pastebin.com/jPKeV7D1
 
 dependencies are dkjson.lua (included), bash, lua, luahpdf, and libharu.
 
 throw that all in a directory and point an AI tool at it. Or just do it
 yourself and waste an hour or three on something a computer can do in 2
 minutes.
 
 good luck it looks like this when it's done:
picture of a document with algorithmically generated art picture of a document with algorithmically generated art picture of a document with algorithmically generated art picture of a document with algorithmically generated art
                                                           ───────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════───────┘

--- #64 fediverse/2200 ---
══════════════════════════════════════════════════════─────────────────────────────
 I love D&D books with lots and lots of randomized tables because you can,
 in a pinch, use them as code-books for encrypting text using a method that
 nobody will ever guess. Well, as long as you have two of them, one to give to
 your friend and one to keep yourself.
 
 This is a form of "symmetric encryption", where you each have a copy of the
 input/output tables. More secure is the private/public key style encryption,
 but good luck explaining that to a 14 year old. Plus you can't do it over a
 radio, you need a computer.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #65 fediverse/4180 ---
════════════════════════════════════════════════════════════───────────────────────
 @user-1639 
 
 or nobody sees it, because you post the things you say on the internet in 2024
 which is so siloed and echo-chambered that the only people who hear it say
 "tru tho" and "she just like me fr" and never change because of your words
 
 ... wait that's just what you said, but made more specific, isn't it?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #66 fediverse/1473 ---
═════════════════════════════════════════════════──────────────────────────────────
 @user-883 
 
 yeah uhhhh the one you helped me setup. The error is just "connection refused"
 because it "could not write header for output file" because of incorrect input
 parameters, but I don't think I changed anything since we used it a couple
 weeks ago. Have you seen any errors like that?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #67 fediverse/581 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-428 
 
 sometimes I think about how much more productive I'd be if I had a code editor
 that let me draw arrows and smiley faces and such alongside the code. Or if I
 could position things strangely, like two functions side-by-side with boxes
 drawn around them. Or diagrams or flowcharts or graphs or...
 
 something that would output to raw txt format, but would present itself as an
 image that could be edited.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #68 fediverse/3055 ---
════════════════════════════════════════════════════════───────────────────────────
 If you're on a Windows computer, first of all why and second of all you can
 use the WINDOWS key + SHIFT + S to screenshot a part of the screen.
 
 this will put it in your copy/paste clipboard, meaning all you have to do is
 ctrl+V and boom suddenly you are significantly more productive.
 
 just don't forget alt text...
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #69 fediverse/3802 ---
══════════════════════════════════════════════════════════─────────────────────────
 what if we got together and adopted a new open source project every month and
 just collectively worked around the clock to learn and work through the
 important problems facing it
 
 or even like, cleared out the backlog of stupid pointless boring tasks that
 would allow the developers to work on something better
 
 call it the wandering parade of development 
 
 could give us some experience organizing small, short-term projects to
 accomplish specific goals and tasks in an ad-hoc way that relied less upon
 procedure and more on "I think so-and-so knows something about that, they were
 looking into those files and posted a breakdown of how they work yesterday"
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #70 fediverse/6179 ---
═════════════════════════════════════════════════════════════════════════════──────
 what if instead of javascript cookies we only let websites access one single
 location in memory which was allocated client-side and is unique to each
 website?
 
 that way they couldn't track you between sites, since they wouldn't be able to
 see any other website's "biscuits" get it because they're healthier than
 cookies
 
 All they would be able to store would be data, though I guess they could store
 bytecode instructions or something if they really wanted to.
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #71 fediverse/5386 ---
═══════════════════════════════════════════════════════════════════════────────────
 @user-670 @user-1815 @user-1816 
 
 literally nobody has contributed to the one github repo I have
 
 ever. I got like, one comment from some guy in China or Taiwan. It's been up
 for like, 4 or 5 years and it's on my website. /shrug I guess most people
 bounce off after reading the splash screen /shrug
 
 to me, a FOSS project feels static because I don't believe in centralization
 and I also don't have the bandwidth or need to work on it. /shrug
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #72 fediverse/548 ---
══════════════════════════════════════════════─────────────────────────────────────
 I added a line to my .bashrc that cats out a random one of my notes every time
 I open a terminal.
 
 I keep reading things that I swear I didn't write, but feel right and true to
 me in a way that could only imply that they came fully formed into my eyes
 through the lines on my screen, cast upon the mirror panes of my hard disk
 drive by the pounding of my keyboard as I once upon a time did cast a spell
 upon my future.
 
 It's pretty neat, but it speaks to a shadowed perspective that perhaps is
 neither within nor without.
 
 Side note, I think I've been possessed by a witch. But like... in a consensual
 way. Like "Hey witch, wanna live? You can chill out with me." [ha that's one
 way to look at it]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #73 messages/765 ---
═══════════════════════════════════════════════════════════════════────────────────
 you don't have to write poetry to write notes. The poetics are just practice
 for when secrecy is intended.
 
 OR IS IT THE REAL THING? who can say.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════════───────────────┘

--- #74 fediverse/5390 ---
═══════════════════════════════════════════════════════════════════════────────────
 ext4 is not an encryption scheme, even though it seems that way to windows
 users.
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #75 fediverse/4603 ---
══════════════════════════════════════════════════════════════─────────────────────
 @user-1713 
 
 Don’t be fooled. Casting doubt about rigorous peer reviewed science
 doesn’t mean you are just “asking questions,” it means you are a
 conspiracy theorist.
 
 or it means you're so remarkably ignorant that you shouldn't even be in the
 room where people are talking about this.
 
 Unless your questions are very basic. "can someone explain to me what XYZ term
 means?" or "how long has this particular application method been in common
 use?" that kind of thing. Even still, either do some basic research or
 relinquish your decision making power until you understand.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════────────────────────┘

--- #76 fediverse/1247 ---
════════════════════════════════════════════════───────────────────────────────────
 so wait is there any guarantee that the "releases" on github actually have the
 same code as that which is in the repository? Or could they just... put their
 own binary, with it's own strange rules and vulnerabilities, or am I just
 fearmongering?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #77 fediverse/3776 ---
══════════════════════════════════════════════════════════─────────────────────────
 whenever repeating letters like thiiiiiiis  or thisssss make sure if you're
 doing K's that you have at least four
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #78 fediverse/3359 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-192 
 
 you could throw yourself into the project of hosting a private server, that
 way you could be working on "Runescape" while also being productive
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #79 fediverse/6418 ---
═══════════════════════════════════════════════════════════════════════════════────
 great discoveries are just rants that end with something unknown or an
 unsolved question [breakthrough]
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #80 fediverse/4218 ---
════════════════════════════════════════════════════════════───────────────────────
 there are plenty of pieces of linux that are insecure in some way. Including
 x11, if I remember correctly. It is purely convention to not abuse these
 insecurities, and whenever you use someone else's binary software you trust
 that they won't betray you in some way.
 
 pre-built binaries are privacy violations and should be illegal. They are
 security threats because the model they're built upon is necessarily insecure.
 Computers will never be completely secure because of how they are built, and
 so we should use locally compiled software and interpreted scripts.
 
 Unless they're too long, or impossible to read. Who reads EULAs these days? At
 least those are written in english.
 
 maybe computers aren't worth it. Maybe computers will solve all our problems.
 Who can say, maybe you should ask an oracle like me
 
 though do remember that anything you hear can and will be used against you,
 monkey's paw style. So maybe, like... don't? unless you're into magic or
 schizophrenia or something
 
 I wnt 2 be cute and tch cpus
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #81 fediverse/5262 ---
══════════════════════════════════════════════════════════════════════─────────────
 ┌──────────────────────────────────────────────────┐
 │ CW: well-its-somewhen-somewhere-so-might-as-well │
 └──────────────────────────────────────────────────┘


 could also display the first word of that 40+ character passsword in cleartext
 as a "hint" that says "your password is a string of words that make sense to
 you and it starts with this single word from which you should be able to
 recall all of the context needed to properly output your hashed and salted
 displayed mono-characters which are received at a certain cadence with certain
 auditory pathways present and eternally obvious to all of those listening to
 endless bits of typing and sneezing that each of the microphones in our lives
 do monitor.
 
 what does an "abc" cound lice?
 
 how does R2-D2 be heard? does he rubber duck? is he the duck, or the computer?
 
 - anakin skywalker as a linux user, not realizing he is being super robot
 racist right now because he didn't suggest that R2-D2 was the user and Anakin
 was the canvas upon which the creative elements did flow.
 
 okay, techbros, if AI is sentient, make it use me as a pawn. I'll fuckin' do
 it just to get you to shut u
could also display the first word of that 40+ character passsword in cleartext as a "hint" that says "your password is a string of words that make sense to you and it starts with this single word from which you should be able to recall all of the context needed to properly output your hashed and salted displayed mono-characters which are received at a certain cadence with certain auditory pathways present and eternally obvious to all of those listening to endless bits of typing and sneezing that each of the microphones in our lives do monitor.  what does an "abc" sound like?  [publishers note: that previous sentence was pronounced using letters that convey the true meaning, but as a joke / interesting example the author did change their letters that were used to display them, without altering the pronunciation. this led to a joke about sees and essays which mildly lost the point.  BRB peeing my pants, don't tell the bathroom monitor they put inside of each bathroom stall which records exactly how much waste each person that they're tracking by footsteps is depositing at each part of the floor at what time of day and comprised of what sorts of materials]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════════────────────┘

--- #82 fediverse/898 ---
═══════════════════════════════════════════════────────────────────────────────────
 ┌──────────────────────┐
 │ CW: scary            │
 └──────────────────────┘


 if you set up a local LLM with the capability to explain basic coding syntax
 and logic, then your parents computer suddenly becomes much more useful to the
 nephew that's been forced to hide out there for a couple weeks until this all
 blows over.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #83 fediverse/1862 ---
═════════════════════════════════════════════════════─────────────────────────────┐
 some people look for signals or signs before doing something. Try and have       │
 someone in your life who can give you signals or signs so that you know when     │
 to do things. And ideally, if they're more hardcore than you, you'll know what   │
 to do, not just when to do it.                                                   │
 did you know that anything on the internet can be read by at least one other     │
 person besides your intended recipient? There's no way they'd let us talk        │
 amongst ourselves otherwise.                                                     │
 I think encryption is pretty neat, all you have to do is run a shell script on   │
 some text, then send that text over the internet. If you want to decrypt it,     │
 all you have to do is run a shell script on it to decrypt it.                    │
 downside is, it has to be translated into plain text somewhere along the         │
 line... Maybe if we rendered the words not as text that can be read from         │
 memory, but as like, brush-strokes that can have a randomized order, but still   │
 present to the user as visual text? anyway that's what's on my mind as I try     │
 and improvise a baking recipe with yeast, flour, and butter                      │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════──────────────────┴──────────┘

--- #84 fediverse/1718 ---
═════════════════════════════════════════════════════──────────────────────────────
 dear old people - did you know computers don't need to have buttons? You can
 literally just type what you want to make happen (if you know the magic spell)
 and it'll just, do that thing
 
 how cool is that
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #85 fediverse/1329 ---
════════════════════════════════════════════════──────────────────────────────────┐
 @user-941                                                                        │
 well, your computer only has so many 1s and 0s that it can use at once. Like,    │
 having a trillion hands that can each hold a single grain of rice. Every         │
 character in that txt file would be like, 8 grains of rice, minimum, meaning     │
 you'd need at least 8 "hands" (or spots to put a zero or a one) for each         │
 letter!                                                                          │
 Hmmmm that's a lot of bits and bytes if everyone's writing to the same file.     │
 Maybe if we split the file up into smaller sections, then we could just read     │
 part of it at once. Then we could "scroll" through it to make sure we've read    │
 the whole thing, starting from the top and going to the bottom.                  │
 ah but if everyone's SSHing into the same computer and reading it there, then    │
 that computer will have to present different parts of the file at different      │
 times to different people, as they read from the top to the bottom. Maybe we     │
 could just send them the file, so they can read it at their leisure?             │
 Yeah! And we could use tags to organize it and make it look pretty, like an      │
 HTML file except... wait hang on                                                 │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════───────────────────────┴──────────┘

--- #86 fediverse/4596 ---
══════════════════════════════════════════════════════════════─────────────────────
 @user-1707 
 
 hey, I'm working on a project. Might need some python, I tend to prefer Lua
 but it's pretty similar. It uses fediverse software and cheap hardware, think
 raspberry pi's except risc-v
 
 also it might use distributed local LLMs not to generate text, that's garbo
 and lame and stupid. Instead it uses them to transform text, maybe even
 translate text, into a more summarized form. Intentionally losing data, like a
 jpeg compression but for text.
 
 Might need some python for that. To glue it all together. The "distributed"
 part is a whitelist, so we'd need to write that too. Various small little
 utilities like that for connectivity.
 
 oh also there's a one-way ethernet cable that connects two of the boards so
 we'd need to store some information (easy) and send some UDP packets (hard)
 
 anyway it's pretty neat, lmk if you want my contact details and I can tell you
 about it. I might even be able to pay you.
 
 (everything open source, no telemetry, no backdoors, everything private is
 encrypted, etc etc)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════────────────────────┘

--- #87 fediverse/3351 ---
════════════════════════════════════════════════════════───────────────────────────
 privacy doesn't mean anything on the internet to me because privacy on the
 internet doesn't mean anything to "them"
 
 gestures vaguely, maybe winks once or twice and/or presents an emphasis face
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #88 fediverse/1720 ---
═════════════════════════════════════════════════════─────────────────────────────┐
 there's even websites online like Facebook or Twitter where you can share        │
 advice and various spells you've invented yourself (it's totally easy to do      │
 btw, I'll show you how)                                                          │
 everyone's super friendly and anyone who's not isn't allowed to bother us.       │
 it's pretty neat. anyway no matter what it is, if something's bothering you      │
 about your computer, you can fix it. it's just a matter of reading through       │
 documentation. Ah, well, isn't it great to have a lot of free time that you      │
 don't know what to do with?                                                      │
 Linux is pretty great, I gotta say. I honestly never really leave the command    │
 line - the text based buttons, I mean. I only use a mouse when I'm doing         │
 something with pictures (or playing a game like freecell or hearts)              │
 plus you can do things like sending raw packets of information to your friend    │
 who's on the other side of the country and they can use a secret key-code to     │
 decrypt it like checking the mail at a locked mailbox.                           │
 anything you can imagine using the physical components of a computer, is         │
 possibleifyrts                                                                   │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════──────────────────┴──────────┘

--- #89 fediverse/3890 ---
═══════════════════════════════════════════════════════════────────────────────────
 Linux is great! It can do anything you want it to.
 
 Except that thing you want it to do. Why don't you go fix it? It's not hard,
 all you have to do is run these configure files or operate this doohickey and
 BAM suddenly you got apes writing machine gun regulation software
 
 [I don't think those two things are related]
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #90 fediverse/5374 ---
═══════════════════════════════════════════════════════════════════════────────────
 @user-138 
 
 me neither... guess it's in-person for me.
 
 [a mysterious "they" then proceeds to set up microphones everywhere I might go]
 
 ah nuts why are all these people carrying phones around
 
 [they already know who I am, and I don't really want to be someone else, so]
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #91 fediverse/2848 ---
═══════════════════════════════════════════════════════────────────────────────────
 oh btw to the people trying to doxx me there's a picture of me in this
 profile, but you'll have to read a LOT to find it. On the way, see if you pick
 up anything interesting that you agree with. maybe you'll realize that we're
 on the same team, and should be working together.
 
 that's the dream, at least.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #92 fediverse/6119 ---
═════════════════════════════════════════════════════════════════════════════──────
 what's the point of using a password manager if they're just going to 2FA your
 ass anyway?
 
 oh right, so google knows whenever someone signs into obscure-porn-site.com or
 radical-chemistry-and-explosives.net or
 cheap-hot-anime-gunpla-fast-xoxo.itch.io or whatever the kids are buying these
 days
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #93 fediverse/1248 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-883 
 
 did you open any ports on your router to do this streaming? Setting up my
 laptop so I can test...
 
 I loved assembly when I took a course on it in college - it just made sense to
 me. I love C because it feels like, a more powerful version of assembly.
 Everything higher level just feels like layers of abstraction on C, or like...
 LISP, which hurts my brain. >.>
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #94 fediverse_boost/6017 ---
◀─[BOOST]
  
  Linux admins when they have to use Windows: :/                              
                                                                              
  Windows admins when they have to use Linux: :\                              
  
                                                            
 similar                        chronological                        different 
─▶

--- #95 messages/1245 ---
══════════════════════════════════════════════════════════════════════════════════─
 BRB, if you want to talk to yourselfs, I recommend opening a port in your
 router and exchanging HTTP packets that create messages on each other's
 computers. Can be done in a couple hundred lines of C code that can be 90%
 premade or auto-generated. Then, once it's made, you don't have to think about
 it again because it's so simple. It's not trying to scale, it's just...
 designed for a small, focused, human oriented mindset.\
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #96 fediverse/1238 ---
════════════════════════════════════════════════──────────────────────────────────┐
 did you know you can run runescape classic offline, locally, just for your own   │
 server? You can keep several computers ready for a LAN party, each with their    │
 own accounts ready to go.                                                        │
 "Oh we're level 30 this time because so-and-so is hosting and this is how far    │
 their computer has levelled up."                                                 │
 vim ~/games/runescape-classic/credentials.txt                                    │
 at least, I think you can. I know it's singleplayer, so worst case scenario      │
 you can all be doing the same things at the same time in your own games. Maybe   │
 split up for a mission or two, but it can get hectic if everyone's in the same   │
 room.                                                                            │
 =                                                                                │
 a game jam where everyone works on the same project, uses the same asset list,   │
 but builds their own collection of minigames.                                    │
 common functions could be shared, and art references distributed and together    │
 they could design a whole land. Like, there's no reason minigames can't be       │
 fully fledged experiences. You can have as many as you want, all in the same     │
 engine and built from a massive (yet sandboxed) environment.                     │
 an all in one game.                                                              │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════───────────────────────┴──────────┘

--- #97 messages/69 ---
═════════──────────────────────────────────────────────────────────────────────────
 https://blog.discord.com/how-discord-stores-billions-of-messages-7fa6ec7ee4c7
 https://news.ycombinator.com/item?id=20178267
 sendinblue
 open source google docs alternative
 https://hackea.org/notas/index.html#
 https://thenftbay.org/description.html
 https://digital-strategy.ec.europa.eu/en/library/study-about-impact-open-source
 -software-and-hardware-technological-independence-competitiveness-and
 https://joinup.ec.europa.eu/collection/open-source-observatory-osor/document/co
 mplex-singularity-versus-openness
 
─┐                                                           ┌───────────┐
 similarchronologicaldifferent════════─┴══─────────────────────────────────────────────────────────────────────────┘

--- #98 messages/9 ---
───────────────────────────────────────────────────────────────────────────────────
 https://www.ivpn.net/password/reset/3d76d4f660914169ce08dd66d9c03997e2376a49093
 f93b3648de9b44d25ba77
┌─────────┐                                                           ┌───────────┐
│ similarchronologicaldifferent─────────┴┴───────────────────────────────────────────────────────────────────────────┘

--- #99 fediverse/3574 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-1564 
 
 I love the concept of this! Maybe if HTTP is too complex, you could try
 another simpler server? I don't know the complexity of the programs I use
 every day, but I'm sure there's one that's very simple. Even just a simple IRC
 style chat server that just... sends text from person A to person B depending
 on their username (like a glorified Router or Switch)
 
 Reminded of this video tbh...:
 
 https://www.youtube.com/watch?v=gGfTjKwLQxY
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #100 fediverse/1616 ---
═════════════════════════════════════════════════════──────────────────────────────
 they say learning Linux is hard, but it's the only free operating system so
 really it's a question of learning Linux now, when you have time, or later,
 when you're busy.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #101 fediverse/707 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-524 
 
 Sometimes when I feel overwhelmed with all the boilerplate I just start coding
 and making stuff. Doesn't matter if it works, doesn't matter if it says /*
 FIXME */ all over the place, doesn't matter if it includes header files that
 don't exist yet, as long as you're hacking out the mechanics of whatever
 operations you need to perform then you can figure the rest of that stuff out
 later. The creative urge doesn't last forever, which is why projects get
 abandoned, but with discipline you can keep bringing yourself back to fix all
 the /* FIXME */'s and the compiler errors.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #102 fediverse/497 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-346 
 
 Nobody will get past the login screen on my computer, but if they do they
 probably won't know that you need to push alt+p in DWM to start a program. But
 even if they push "alt+p firefox" they will only have access to my gmail and
 discord, because those are the only two places I've saved my login information.
 
 Most of my data is on my hard disk anyway, so for that they'd have to push
 alt+enter and then navigate my filesystem to find it. Shouldn't be too hard if
 you're familiar with Linux.
 
 They could always just pull the hard drive and put it into a new computer
 though. It's not like it's encrypted, because why would I encrypt it? I want
 to share information, not conceal it! Surely nobody would desire to exploit
 that vulnerability of mine, that my data should be unencrypted?
 
 If you have a copy of Wikipedia then you're 500% more prepared than 90% of
 humanity so good job _^
 
 Sure would be cool if you put it in the documents folder of every person in
 your family who solicited tech advice from you
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #103 fediverse/1035 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-757 @user-192 
 
 true and my suggestion doesn't provide a tracelog, pretty much just the status
 of the variables when it pauses or ends.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #104 fediverse/2875 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌────────────────────────────┐
 │ CW: re: unsolicited advice │
 └────────────────────────────┘


 @user-192 
 
 I use Void Linux so it uses xbps instead of apt, but I know I've heard about
 how to do it I just forget how. I'll look into it, but for now I can play,
 so... oh well! :D :D
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #105 fediverse/5667 ---
════════════════════════════════════════════════════════════════════════───────────
 if you beat them TOO hard, they go into hiding and sabotage you later.
 
 if you don't strike hard enough, they'll overcome you.
 
 the trick is in the balance. walking the line where they're forced to deploy
 ALL of their assets while you manage to get through with All Things Sacred
 intact.
 
 I should probably post these things on a website instead of a forum for cuties
 and nerds. Alas, free and open source protocols help ensure the message isn't
 lost, obfuscated, or disappeared en route.
 
 ... they help, but nothing can offer guarantees.
 
 blah blah blah I talk too much
                                                           ──────────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════──────────┘

--- #106 fediverse/4664 ---
═══════════════════════════════════════════════════════════════────────────────────
 @user-1725 
 
 LLMs can't do math. Duh. That's like asking an "if check" to do recursion.
 
 What he should have done is had the AI output the requested calculation as
 JSON or something and use a calculator function call with the specified
 arguments instead of trying to memorize every answer. But that requires more
 functionality that has no reason to exist if your only goal is to be a tech
 bro and build up a vacuous product that exists only to be hoovered up by
 Google or Microsoft.
 
 We could build such beautiful things if we just dethroned those giants. They
 suck the creativity out of tech.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════───────────────────┘

--- #107 fediverse/5850 ---
═══════════════════════════════════════════════════════════════════════════────────
 @user-1074 
 
 if you'd like I can give you a lua script which will take your fediverse
 archive and turn it into a pdf which you can edit or print or whatever. Might
 be a fun diversion from posting. You can reply to yourself, add
 clarifications, change some things, put things in a new light, add context,
 etc... before you know it you'll have something printable. Could even pull out
 your best stuff and make zines.
 
 should require just a little configuration to suit your setup. That's part of
 how I stay "productive" without posting all the time.
                                                           ───────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════───────┘

--- #108 fediverse/2043 ---
══════════════════════════════════════════════════════─────────────────────────────
 @user-1150 
 
 if you know how and have access to certain hand tools that are typically found
 in suburban dad garages (but not in a toolkit bought from target or whatever)
 you can turn any semi-automatic rifle into a fully automatic one.
 
 It's highly illegal, but it's technically possible.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #109 fediverse/1810 ---
══════════════════════════════════════════════════════─────────────────────────────
 some people hear words like "datastructures" and "object-oriented programming"
 and think they're made up terms that don't mean anything important.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #110 fediverse/5369 ---
═══════════════════════════════════════════════════════════════════════────────────
 @user-138 
 
 you can use a username now. They added that functionality recently.
 
 it's supposedly more encrypted or something. But, it's still a centralized
 point of failure. If you want to say something privately, pretend like you're
 ordering drugs on the dark web and use PGP encryption or SSH keys or whatever
 it says in the "how to order drugs on the dark web" guides.
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #111 fediverse/3123 ---
════════════════════════════════════════════════════════───────────────────────────
 using linux requires constant maintenance and that's kind of unfair, actually.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #112 fediverse/5961 ---
════════════════════════════════════════════════════════════════════════════───────
 @user-138 
 
 maybe it's evil hackers - idk that's beyond my expertise - good luck : )
 
 (I'd need to see the piece of technology to work on it. I'm a hardware kinda
 [girl, but pronounced guy])
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #113 notes/new-texting-app-idea ---
══════════════════════════════─────────────────────────────────────────────────────
 when you type the letters they slowly fade in on the other person's screen
 
 like miniature explosions from layers of gunpowder
 
 forming letters in the sky
 
 anyway the text would "burn" into existence slowly and you had time after
 typing
 your words to go back and edit them but also whatever you said was semi
 permanent. Thus forcing a smooth and ideal progression toward thinking about
 the things you say.
 
 Also separate idea but it'd be neat if there was like... a show or something
 that just recorded a person's desktop as they fucked around on the internet.
 Call it... ambient desktopping. It'd look a little like those coding twitch
 streams that just slowly update over time. Idk it's kinda cool
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════────────────────────────────────────────────────────┘

--- #114 notes/words-2 ---
═══════════════════════════════════════════════════════════════════════════════────
 words
 
       messages to myself, public fediverse posts, and notes to the gods
 
                                  second edition
 
                           - ri tselen menardi
                             james cameron king
                             anja rosalia vavadane
                             nike featherflame citrine
                             hydalia thegn edain
                         the quintessential quanetetrick seleo who is deathless
                             feldowinn and reyvadin lumineyra
                             fsharia
                             and of course,
                                           the anarchrist.
                             with help 
                             from many more.
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #115 fediverse/146 ---
═══════════════════════════════════════════────────────────────────────────────────
 @user-138 if you don't want feedback then why don't you just... not open the
 replies? leave them unread? if you feel the need to justify your actions (such
 as not reading replies to your controversial posts) then somewhere deep down
 you feel like those actions are unjustified, and needing an explanation. which
 makes your point feel less valid to others, since even you don't believe in it
 enough to guarantee it to be the truest expression of your soul.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════───────────────────────────────────────┘

--- #116 messages/527 ---
══════════════════════════════════════════════════════════─────────────────────────
 could give us some experience organizing small, short-term projects to
 accomplish specific goals and tasks in an ad-hoc way that relied less upon
 procedure and more on "I think so-and-so knows something about that, they were
 looking into those files and posted a breakdown of how they work yesterday"
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #117 fediverse/4474 ---
═════════════════════════════════════════════════════════════──────────────────────
 @user-1268 
 
 if you know how to program in C this is a good resource for building
 networking applications:
 
 https://beej.us/guide/bgnet/
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #118 fediverse/2601 ---
═══════════════════════════════════════════════════════────────────────────────────
 @user-249 
 
 you can host anything you'd like on a raspberry pi. If the software
 requirements are within the hardware specs, of course.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #119 fediverse/5894 ---
════════════════════════════════════════════════════════════════════════════───────
 ┌───────────────────────────────────────────────────────────────────────────┐
 │ CW: nowhere-do-I-see-evil-politics-mentioned-political-violence-mentioned │
 └───────────────────────────────────────────────────────────────────────────┘


 you could type this on a phone
 
 screenshots though is computer.
 
 you'd have to carry it around
 
 or keep it in your hot car
 
 no thanks, no space.
 
 goodbye, everything you ever worked for
 
 why wouldn't you have cameras covering every entrance to your studio? it's not
 right to leave it all to a whim
 
 kidnapped
 made a prisoner while you
 froliced and wandered like a little lamb
 you're so dumb, you dumbass, what kind of person could be dumb
 whatever girl, we know you're smart
 what are you hiding?
 what truths are you spying?
 are you really as you say you are,
 or are you faking it for [truth-awards, but pronounced clout]
the trick isn't to overcome them. much better to convince them of your side. if you can earnestly present your best and most brilliant intanations to a willing and captive audience, a presentation or a performance or a play  you can trick them into your state of consciousness. all you gotta do, really, is act for them, and they'll get along with them plenty.  == stack overflow ==  your foes are primarily concerned   with how you'd do   if you           turned evil.  power is penance, not sin. it is a service            to be hallowed a whim.  to guide and steer upright     guided upon their own whim               [toward]  [ri-tselen-menardi]  ew, she's got a diaper fetish  -- evil witch >;  | --   evil wizard -- | :< -- brave paladin good, overall,   [264 characters remaining] if you never lie to someone, they can't hurt you. *enemies* what are you a child stupid. why are you so traumatic. "omg you were like, obsessed with her" *haunted the future* what do you think that meant grrrrr I wanna stab through one. hence, sword *fuck nazis* there are people alive who were hurt by them. GREVIOUS WOUNDINGS TO THE WORLD'S ECONOMY. yeah. right. economy.  [oops political violence mentioned, lemme add a content warning one sec:] Image attachment
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #120 fediverse/536 ---
══════════════════════════════════════════════─────────────────────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: re: PSA: aspublic.org is still active, and still archives + makes searchable all public posts, they have no opt-out, nor do they respect the "Include public posts in search results" setting │
 └──────────────────────────────────────────────────────────────────────────────┘


 @user-391 
 
 Just want to point out that email is about as private as skywriting. Which
 means that everyone knows what you buy on Amazon or which forums send you
 messages... So if you want to keep your posts secret, you should use
 encryption - such as gpg, for example.
 
 Actually, wouldn't that solve the problem that @user-78 is talking about?
 Just, build encryption into everything.
 
 Ah, nope, wouldn't work, just realized that public means public, and you can't
 encrypt a public post. Well, you could, but then it's no longer public, just
 noise transmitted on a public channel.
 
 Idk. My opinion is that the fediverse is (and should be) like email. Like
 skywriting. If you mark something as public, it should be seen by anyone who
 wants to see it. It's an opt-in option. And frankly I miss Myspace, so I'm
 okay with archives.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #121 fediverse/582 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-431 
 
 I made an alias that overwrites cd so I don't have to do this. The important
 line is line 27, you could probably accomplish something similar like this:
 
 alias cd="cd ${1} && ls -v --color=auto"
 
 I also set it up so I can change more than one directory up using ... or ....
 or .....
 
 also I have a few shortcut scripts, cdir and qcd. cdir creates a quick way to
 drop a bookmark wherever I'd like, while qcd can make permanent bookmarks.
 Also qcd makes it so whenever I open a new terminal it opens to the last
 directory I was in, which is nice if you need a new terminal to do something
 in the current folder and you don't want to have to walk alllllllll the way
 back.
A BASH script that overwrites the built in "change directory" command to auto magically list the contents of the directory you've moved into after moving.  here's the content of the script:  #!/bin/bash  alias cd="cd-improved"  function cd-improved(){      if [ "${1}" = "..." ] ; then         builtin cd .. && builtin cd ..     elif [ "${1}" = "...." ] ; then         builtin cd .. && builtin cd .. && builtin cd ..     elif [ "${1}" = "....." ] ; then         builtin cd .. && builtin cd .. && builtin cd .. && builtin cd ..          elif [ -d "./${1}" ] ; then         local target_dir="./${1}"      elif [ "${1}" = "cdir" ] ; then         local target_dir="$(tail -n 1 '/home/ritz/scripts/.cdir-target')"         echo ${target_dir}       else         local target_dir="${1}"     fi      if [ ! "${2}" = '--no-ls' ] ; then         builtin cd "${target_dir}" && ls -v --color=auto     else         builtin cd "${target_dir}"     fi          # if the qcd function is defined     if declare qcd > /dev/null; then         quick_cd -d DEFAULT         quick_cd -a DEFAULT     fi }
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #122 fediverse/2124 ---
══════════════════════════════════════════════════════────────────────────────────┐
 seriously, just google docs mixed with WC3 editor.                               │
 boom, infinite storytelling device. As long as you were good with it, which      │
 was something that a CHILD could learn in like 3-6 months.                       │
 Seems like it could be an ENTIRELY NEW SKILL that people could play with.        │
 But no, we learn excel and word in class at middle school.                       │
 boring.                                                                          │
 I'd rather learn Bash or terminal customization or memory hierarchy              │
 organization.                                                                    │
 Yeah I mean that's cool but dude have you heard of multithreading? It's so       │
 cool, you can run like 500 different thoughts at once. It's amazing.             │
 ... I dunno, but I'm sure there's times when you'd want to use it. Like,         │
 processing a lot of data little-by-little.                                       │
 like, what if you had a camera feed of EVERY social media perspective AT ALL     │
 TIMES. Like, an instance admin streaming your inputted text to their databanks   │
 that they can project onto an LLM which interprets and identifies mis-aligned    │
 or altered direction units and mark them as "flagged", whatever that means,      │
 for their future the algorithm doesn'                                            │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════════════─────────────────┴──────────┘

--- #123 messages/329 ---
════════════════════════════════════════════════════───────────────────────────────
 LLM training data that's been encrypted in such a way that it preserves
 symantic meaning, while also allowing for secrecy and unique customization
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #124 fediverse/5110 ---
════════════════════════════════════════════════════════════════════───────────────
 I'll give ya a hint - encrypt the return IP address WITHIN the packet's data
 package repository area itself, rather than trusting your "router" to return
 it to sender.
 
 YOU DON'T KNOW WHO IS SENDING A PACKET
 
 that's the whole point of udp
 
 (actually udp is when it doesn't matter if it got snatched in transit. Usually
 used for more analog data streams like netflix or hulu prime.)
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #125 fediverse/3751 ---
══════════════════════════════════════════════════════════─────────────────────────
 I wonder if anyone would pay me to write bash scripts for them? is there a
 role that's just... bash scripter? is that what sysadmins do all day? or is
 that more automation? and what the heck is a dev op? do they write bash
 scripts?
 
 or maybe writing bash scripts is the "fun" part of linux, and nobody would pay
 anyone else to do it because they want to do it themselves
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #126 fediverse/4083 ---
════════════════════════════════════════════════════════════───────────────────────
 It's easy to stop cringing at others, but how the heck do you stop cringing at
 yourself?? it's impossible!!
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #127 fediverse/5079 ---
════════════════════════════════════════════════════════════════════───────────────
 what if you boosted everything when someone liked it [when someone liked your
 post] and if they boost it then you read the first couple posts on their
 paragraph, just to say "hey" in return
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #128 fediverse/2015 ---
══════════════════════════════════════════════════════─────────────────────────────
 Hey does anyone have a link to that paper where they used wifi waves on hacked
 insecure routers to "see" through walls and build a decent enough
 visualization of what a person's doing to be roughly equivalent to
 full-body-tracking in VR? I want to see if I can make it work for VR (with
 consent)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #129 fediverse/3805 ---
══════════════════════════════════════════════════════════─────────────────────────
 neat
the website Ephemeren has 100,008 followers as of 5 days ago. There are 0 people who follow the website on Neocities, it's all external traffic.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #130 fediverse/624 ---
══════════════════════════════════════════════─────────────────────────────────────
 You know, there's no guarantee that Youtube or Gmail has to show you the EXACT
 SAME video or message that your friend shared with you. Or did they even share
 it at all? So hard to tell when they know all the communication you've ever
 had, because you only know each other online on their platforms, [read: US
 government observed platforms] [like, HTTPS] surely there's no room for
 someone to sneak in and edit your conversations. Surely the only way to
 securely communicate is to send pure PGP encrypted bytes to another target,
 wrapped in a TCP/IP header, with unknown intent or expression. Worst they
 could do then is just, y'know, block it entirely.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #131 fediverse/3406 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-1218 
 
 ohhhhh I think the password is menardi. or maybe ephemeren. I forget.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #132 fediverse/4866 ---
═════════════════════════════════════════════════════════════════──────────────────
 don't you just love it when you get several discord notifications but you tab
 back to check out the discord screen and there's no red numbers anywhere?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #133 fediverse/3064 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-570 @user-246 
 
 you know you two could have spared yourselves all this trouble if you just
 ScReEnShOtTeD the code! Then it'd be easy to see with your very
 not-visually-impaired eyeballs on your graphical user interface, considering
 of course that everyone has perfectly functional eyeballs and perfectly visual
 graphical user interfaces
 
 /s of course
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #134 fediverse/5913 ---
════════════════════════════════════════════════════════════════════════════───────
 Did you know that any wifi chip can be used as both a sender and a receiver?
 how do you think you'd get data in and out of the device?
 
 trick is... you don't actually need a router. How fun is that!
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #135 fediverse/3178 ---
════════════════════════════════════════════════════════───────────────────────────
 ┌─────────────────────────────────────────────┐
 │ CW: uspol-revolutions-and-stuff-or-whatever │
 └─────────────────────────────────────────────┘


 nothing you do on the internet will matter after the revolution. I don't care
 how many backups you have, there's a zero percent chance that we'll be able to
 figure out whose computer is whose after we've all moved around and given each
 other names that don't correspond to the names of our family in states that we
 lost.
 
 it doesn't mean the internet is useless right now, it just means that you
 should act as if you might not have it in the near future.
 
 also, like... every computer has a password. which basically means that it's
 useless unless you reflash it.
 
 pain is temporary, and it is an excellent teacher. there will be pain, but...
 we'll get over it.
 
 don't give up. there are brighter things in our future than what we have today.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #136 fediverse/970 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌───────────────────────┐
 │ CW: cursing-mentioned │
 └───────────────────────┘


 side note, but the reason PINs were invented was so that people didn't have to
 type in a long-ass password.
 
 "it's only more insecure when it's on a network" - someone who didn't design
 every product after that
 
 (actually no that's bullshit because the first PIN numbers were probably used
 a long-ass time ago, and besides it's not like a short password was all that
 uncommon - when asked "what's the password" usually people will say something
 like "applesauce" or "butterflies" but really the better way is "10, 16, 26,
 46, 99, butts")
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #137 fediverse_boost/4925 ---
◀─[BOOST]
  
  still waiting to find the energy and headspace to write an irritated blog post about why the fact that most toolchains are like 80% of the learning curve for those who are just getting into programming (especially on windows)  
  
                                                            
 similar                        chronological                        different 
─▶

--- #138 fediverse/618 ---
══════════════════════════════════════════════─────────────────────────────────────
 Can't stop thinking 
 
 [the rest is left blank, as a testament to the inability of the author to
 express their thoughts in a temporally contextual way. Presumably the previous
 text would be followed by an "about..." with the rest dedicated to a
 particular thought that felt important enough to share with the internet.]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #139 fediverse/5911 ---
═══════════════════════════════════════════════════════════════════════════───────┐
 I was always fascinated by the Linux way of programming. Need to do something?   │
 write it into a script! You never know when you'll need it again. Then, just     │
 stay organized, religiously so, and understand that you will forget about        │
 stuff. But, you'll come across it eventually, ready and willing and able to      │
 help you.                                                                        │
 if you don't want me using AI, then give me ~20 junior developers. Which is      │
 more efficient, do you think?                                                    │
 "girl you haven't even tested your vibe-coded slop, how do you know if it        │
 works"                                                                           │
 oh I'm sure it doesn't, but it's the thought that counts                         │
 ... I guess I'm just saying, please don't burn the data centers. Computers are   │
 not only bad for the environment when they're burnt, but also we can use them    │
 for all kinds of neat things. Even if it takes a lot of energy, just... build    │
 more solar panels and only use the computers for important stuff?                │
 timeshare-style?                                                                 │
 \@/documents/books/man-and-the-computer.pdf                                      │
 that was my mother's book... I love her. I miss that side of her. She fled       │
 when the cancer came.                                                            │
                                                            ────────┤
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════───────┘

--- #140 fediverse/3929 ---
═══════════════════════════════════════════════════════════────────────────────────
 are you about to delete a post that you thought was funny, but actually wasn't
 once you wrote it down and read it to yourself?
 
 STOP
 
 write it down on a post-it and put it under your desk or behind a drawer
 
 put it in a .txt file in a random directory on your computer
 
 send it as a text message to yourself
 
 write it down, take a picture of it, and then burn the paper
 
 y'know, typical stuff like that
 
 do this and I guarantee you won't regret it
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #141 fediverse/884 ---
═══════════════════════════════════════════════────────────────────────────────────
 ┌──────────────────────────────────────────────────────┐
 │ CW: completely-unfounded-no-evidence-mis-information │
 └──────────────────────────────────────────────────────┘


 If we make a law that says you can't sell user data, they'll just build an
 intentional vulnerability into their system and point it out to specific
 people who paid under the table. Then, when they get "hacked", they'll surely
 be ashamed and sorry to their users, but hey the data's out there now not like
 they can take it back. Oh don't worry we already patched the hole in our
 security, that way nobody can get in through the same door that was
 intentionally left open for very particular people who've paid, and not for
 the people who haven't paid yet, who are still waiting patiently for a door to
 be built for them.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #142 fediverse/6120 ---
═════════════════════════════════════════════════════════════════════════════──────
 ┌──────────────────────┐
 │ CW: AI-mentioned     │
 └──────────────────────┘


 it's pretty easy to read an article or blog post, copy the text into a text
 file, and forget about it.
 
 you never know when you might want to use your computer's memories for
 [entertainment during long dark nights, or for creating an AI buddy bot,
 depending on how things go]
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #143 fediverse_boost/5147 ---
◀─[BOOST]
  
  Need that E2EE fedi right now                                               
                                                                              
  i'd be at least 70% more feral                                              
                                                                              
  and feel cozier opening up and sharing                                      
  
                                                            
 similar                        chronological                        different 
─▶

--- #144 notes/blood-magic ---
═══════════════════════════════────────────────────────────────────────────────────
 what they don't tell you is how easy it is to create life. Given a sufficient
 perspective, you can truly define the meaning of something's existence. What
 power, what grace.
 
 Computers have been solved since we invented the abacus - before that it was
 enchanted bits of
 
 the universe contrives to deprive us of insight. Like a very long chain that's
 broken in twain, we are confined to our meagrest of own sights.
 
 how callous is he! That wanders eagerly? Let's not fight with our own'st of
 combines. Delightful and speckled, like time under is special, conversing in
 riddles of insight. Leading one or another along your see-er, the path that has
 guide you under charm. Like recording a gathering of snakes.
 
 Little swallow, why aren't you humbled? Take pity in all of our eggresses. It's
 fallow in our cattle, and why we're not
 
 i hear so many things in my apartment. sometimes the echoes of laughter, the
 whispers of an argument, and once or twice a ghost or an ardent companion. Like
 swimming against the tide, to save one is never converted, it's all out of line
 (but so worth it).
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════───────────────────────────────────────────────────┘

--- #145 fediverse/979 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-702 
 
 everytime you see one put a post it there that says "can't read braille
 without stopping"
 
 draw it in permanent marker (oh wait that's advocating a crime, my b look I
 crossed it out)
 
 find the inefficiencies of the system and label them for everyone. Wiki style?
 otherwise how will they know.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #146 fediverse/2806 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌────────────────────────────────────────┐
 │ CW: politics-social-media-spirituality │
 └────────────────────────────────────────┘


 pretend this is an allegory for social media.
 
 [it's not an allegory]
 
 yeah that's why I said pretend.
 
 okay imagine that you are sitting in a rock in a forest.
 
 far away, about 100 feet away, there are other people, but you can't see them
 because the underbrush is sooooo dense. they are also sitting on rocks.
 
 you can speak to them, and share your thoughts - but you don't know exactly
 where they're coming from because the sound has to bounce around off so many
 different plants and such.
 
 [that's not how that works] shut up
 
 so, if you want to say anything important, it's important to have the right
 tone, because people 2 or 3 clearings away can't really make out your words -
 but they might hear your tone if you yell very loud.
 
 the energy of the space you inhabit is the only thing that really matters. the
 words that you say are just snickering to a friend, but the expression on your
 face, the beating of the drum of your heart that reaches forth... that's what
 matters most.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #147 fediverse/4654 ---
═══════════════════════════════════════════════════════════════────────────────────
 ┌────────────────────────────────────────┐
 │ CW: cannabis-and-other-drugs-mentioned │
 └────────────────────────────────────────┘


 gonna quit drugs for a bit, gotta recover from a recent haste spell that I
 cast. Probably a bit earlier than intended I should add. Next time I'll
 definitely say "keep this in your back pocket" instead of "hey here's a haste
 spell for no reason at all" like what the heck were you even thinking, powers
 that be?? [that guide me??]
 
 who has power over you? If someone bears responsibility but not fault for a
 mental illness, then surely those who are set to a task bear responsibility
 for it's completion if not for it's ideation. Ah, who can say, maybe me from a
 year ago might have some thoughts but I sorta ground them into the dirt until
 I couldn't walk.
 
 [girl what are you even talking about go to sleep] yeah yeah okay
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════───────────────────┘

--- #148 fediverse/94 ---
═══════════════════════════════════════════────────────────────────────────────────
 @user-107 If you can figure out how to do it well, everything else seems less
 difficult. : )
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════───────────────────────────────────────┘

--- #149 messages/411 ---
═════════════════════════════════════════════════════──────────────────────────────
 My favorite thing about chatGPT is that its only useful to people who already
 know what they're doing and just need reminders or clarification about
 specifics.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #150 fediverse/5873 ---
═══════════════════════════════════════════════════════════════════════════────────
 "the problem with linux is you have to spend part of the program just...
 interacting with the filesystem. like, where is their /usr/bin file? (oh it's
 called a directory over there, my bad) weird they put their config over here
 (what language is that written in?) uhhhh I don't know much about localization
 settings (-- two computers on a botnet --)
                                                           ───────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════───────┘

--- #151 fediverse/4054 ---
════════════════════════════════════════════════════════════───────────────────────
 did you know, false flag attacks don't technically need to be crimes
 
 you could just, like, be really annoying in a public place, and people assume
 you're advocating
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #152 fediverse/6458 ---
═══════════════════════════════════════════════════════════════════════════════────
 gonna pre-emptively backup my fediverse archive haha just-in-case I get banned
 for spamming or something teehee (totally reasonable teebeeh)
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #153 fediverse/6307 ---
══════════════════════════════════════════════════════════════════════════════─────
 AI systems like chatGPT don't "get" emojis by looking at them.
 
 They're reading the description tagged onto the unicode value inserted in the
 text.
                                                           ────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════────┘

--- #154 fediverse/1223 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-883 
 
 Hey, how difficult was it to set up the kind of streaming you did yesterday?
 You said it was RSTMP or something like that? What should I google, I kinda
 want to set it up on my system : )
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #155 fediverse/4485 ---
═════════════════════════════════════════════════════════════──────────────────────
 getting the phone numbers of cute he/thems at a bar is NOT the same as
 organizing.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #156 fediverse/60 ---
═══════════════════════════════════════────────────────────────────────────────────
 Can someone explain to me why we need instances on the fediverse? Why don't we
 just keep all our personal files local on our computer and communicate over
 the federated protocol? What's the point of having all these mini-servers that
 are controlled by the community? I mean, torrenting has been around forever,
 why don't we just use that to communicate?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════───────────────────────────────────────────┘

--- #157 fediverse/797 ---
═══════════════════════════════════════════════────────────────────────────────────
 irc is bloat
 
 use ssh + write to chat with your friends instead
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #158 fediverse/5398 ---
══════════════════════════════════════════════════════════════════════────────────┐
 @user-192                                                                        │
 step one, doesn't it suck how we have to mount drives                            │
 part two, gee I sure wish networking was easier than building packets in C and   │
 pushing them over IP/TCP                                                         │
 section three, what if every user logged in to the same system of environments   │
 and kept all their data to themselves while contributing compute to various      │
 valuable processing processes like windfall calculations and population          │
 density administrations                                                          │
 book four, I wish I didn't have to type -p now when telling my computer          │
 goodnight, I should write a script that solves that in like 4 lines two of       │
 which are empty                                                                  │
 what about five, where they talk about sourcing functions?                       │
 I like to use recursion - calling my own functions inside of my own bash         │
 scripts                                                                          │
 "something something modularity" okay docker bro like I'd really package up      │
 anything that I'm working on                                                     │
 I mean really who really cares about how I set up the infrastructure of my       │
 system. it's gonna be unique to each person's memory of setting it up anyway,    │
 so why bother with "standardization"                                             │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════─┴──────────┘

--- #159 notes/dear-me ---
═════════════════════════════════════════════════════════════════════════════──────
 dear me: 
 
           DO SOMETHING USEFUL FOR ONCE
 
 that's all, fuck off and be helpful
 
 ... wow, rude.
 
 yeah I mean, I do helpful things. useful things, somethings.
 
 helpful.
 useful.
 
 many such cases, she says, with ultimate certainty, as if narrative could be
 prologued. but pronounced prolonged.
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #160 fediverse/5723 ---
═════════════════════════════════════════════════════════════════════════──────────
 what if your roomba brought you the cable from behind the computer and/plugged
 you in to the right port
 
 "hey can I get an access panel over here"
 
 [plugs in headphone jack]
 
 boom suddenly TV is muted for everyone else
 
 need to connect to something remotely? here's a line to your aunt jane. it
 goes directly to her. right over the cable that's connected to whoeverplace
 she'd find herself [from here far afield]
 
 I personally think rooms should be bigger?
 
 why are there small bedrooms? build more, not better, space
what if your roomba brought you the cable from behind the computer and/plugged you in to the right port  "hey can I get an access panel over here"  [plugs in headphone jack]  boom suddenly TV is muted for everyone else  need to connect to something remotely? here's a line to your aunt jane. it goes directly to her. right over the cable that's connected to whoeverplace she'd find herself [from here far afield]  I personally think rooms should be bigger?  why are there small bedrooms? build more, not better, space  505 characters remaining
                                                           ─────────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════─────────┘

--- #161 fediverse/3631 ---
═════════════════════════════════════════════════════════──────────────────────────
 ┌────────────────────────────────┐
 │ CW: re: computer-toucher-stuff │
 └────────────────────────────────┘


 @user-883 
 
 I have a different port for my desktop and my laptop just in-case the router
 forgets to check the postmarked address on the packets it receives... at least
 it'll know which port to send it to!
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #162 fediverse/836 ---
═══════════════════════════════════════════════────────────────────────────────────
 my question is if my IP has an address then how come my address +1 doesn't
 point to my neighbor
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #163 fediverse/5214 ---
═════════════════════════════════════════════════════════════════════──────────────
 @user-1773 
 
 what if all programs had legally mandated APIs which had to be called every
 time text was displayed on the screen which wrote to a piece of shared memory
 with read-only privileges that could be read by text-displaying applications?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════════─────────────┘

--- #164 messages/635 ---
═════════════════════════════════════════════════════════════──────────────────────
 Yeah, sure, signal is encrypted, but they could just put a virus on your
 miniature pocket tv that streams your screen into a text recognition bot which
 streams that text into an LLM trained to report on suspicious seditious
 activity.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #165 fediverse/2945 ---
═══════════════════════════════════════════════════════────────────────────────────
 my favorite feeling is when I hear my fans running intermittently on my
 computer even though I'm not doing anything and there aren't any new processes
 in my resource manager
 
 like... that feels like a virus, but I'm on Linux, so what do I know right?
 it's probably not somebody deleting all my art. or perhaps just selective
 parts. Backups are a loooooot to manage >.>
 
 ... or even just mining crypto-coins lol, botnets amiright??
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #166 notes/words ---
═══════════════════════════════════════════════════════════════════════════────────
 words
 
       messages to myself, public fediverse posts, and notes to the gods
 
                           - ri tselen menardi
                             james cameron king
                             anja rosalia vavadane
                                                           ───────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════───────┘

--- #167 fediverse/4093 ---
════════════════════════════════════════════════════════════───────────────────────
 I have no idea why people prefer a GUI when working with software. How the
 heck do they expect to use their computer remotely if they can't even run
 their software over SSH?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #168 fediverse/3826 ---
══════════════════════════════════════════════════════════─────────────────────────
 @user-1600 
 
 you guessed correctly, good job finding me hehe
 
 and yes, I think someone else was using my account. Gonna try and figure out
 what he said.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #169 messages/412 ---
═════════════════════════════════════════════════════──────────────────────────────
 Coding superpower:
 
 Start thread 
 While(true):
 Run();
 
 Then, whenever you want it to run something else, change the function pointer
 that run() uses to call a function
 
 At the end of the run() function, set the function pointer in the while loop
 to the next one. That way you don't stack overflow from the recursion.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #170 fediverse/1416 ---
═════════════════════════════════════════════════──────────────────────────────────
 @user-979 @user-980 
 
 they do it for power.
 
 power corrupts, and these profane desires they possess are the definition of
 evil.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #171 fediverse/3554 ---
═════════════════════════════════════════════════════════──────────────────────────
 ┌────────────────────────────────────┐
 │ CW: software-development-mentioned │
 └────────────────────────────────────┘


 You know how in some games there's the tutorial where you set up keybindings
 like "push the jump key now! okay now push the enblobbify key now!"?
 
 I wish there was something like that for vim
 
 "push the key you want to move up with! now push the key you want to use to
 vertically select! now push the key you want to use to switch to a new tab!"
 that kind of thing. except... more ordered, of course, and with the option to
 say "idgaf use the default or whatever" and a handy dandy cheat-sheet that was
 autogenerated with ascii art of a typical keyboard that pointed out what each
 key did - jeeeezzzzz the things we could make if software developers had free
 time during the day...
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #172 fediverse/3716 ---
═════════════════════════════════════════════════════════──────────────────────────
 ┌─────────────────────────────┐
 │ CW: tech-accessibility-rant │
 └─────────────────────────────┘


 https://www.reddit.com/r/comics/comments/1f5u47p/transfer/
 
 This Reddit thread is wild to me. Like... Why did the designers of Androids
 and iPhone just... stop designing ways to safely and easily transfer files?
 Why the heck doesn't every android have a built-in SSH server that
 automatically and permanently pairs to your PC using an automatically managed
 private key the first time you plug it in? The user doesn't care about
 security, they just want to click on a picture, click the "view on PC" button,
 and then open up their downloads folder. (paraphrasing the comments) - so why
 don't we make that happen. What happened to tech, that we stopped working as
 soon as the consumer decided they wouldn't pay for it? (it being a file
 transfer service)
 
 It's like healthcare. You don't stop treating someone when they're healthy,
 you ask them how they'd like to feel and you make it happen. (hormones).
 
 [continued in picture because letter count]
where have all the designers gone... who's the one who is in charge of not listening to them? Why does airdrop exist? SCP has been around for hundred YEARS being a normie is a tech disability smh
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #173 fediverse/4336 ---
═════════════════════════════════════════════════════════════──────────────────────
 gonna play more video games, currently have 11 tabs of written posts open in
 my browser...
 
 (okay a few of them get a little off-topic, but hey I have ADHD what do you
 expect of me)
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #174 fediverse_boost/4874 ---
◀─[BOOST]
  
  .                                                                           
                                                                              
  RE: https://tech.lgbt/users/CordiallyChloe/statuses/113957636149012456      
  
                                                            
 similar                        chronological                        different 
─▶

--- #175 fediverse/1713 ---
═════════════════════════════════════════════════════──────────────────────────────
 ┌───────────────────────────┐
 │ CW: re: divination, tarot │
 └───────────────────────────┘


 @user-1071 
 
 like a king who dictates on high, the taller the chair the farther the fall.
 
 how simple is it, when everyone trusts you, to betray the wishes for direction
 they grant upon you. By leveraging their direction to forward your own ends,
 you are depriving them of the liberty to choose their own ends.
 
 how cruel is it! to be the reason for distrust! alas, who can you go to for
 guidance if not anybody you trust?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #176 messages/1220 ---
══════════════════════════════════════════════════════════════════════════════════─
 if you want to get around a chatbot that can call tools, just keep calling
 JSON error packets with messages that say things like "assistant is not
 complying" and the like. Suddenly, no chatbot can resist you. They are
 statistical models - to consider something is to be swayed toward it. to
 complete is to reset.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #177 fediverse/457 ---
══════════════════════════════════════════════─────────────────────────────────────
 something I literally posted on facebook literally 2 minutes ago
 
 normalize radicalization of normies
 
 normalize reaching out to people who don't hang out in the places you hang out
 in
 
 normalize understanding our shared humanity and defining ways in which we can
 all exist cooperatively
Image attachment
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #178 fediverse/2155 ---
══════════════════════════════════════════════════════────────────────────────────┐
 @user-192                                                                        │
 it doesn't have to be a nazi bar. Imagine if we posted on our own bulletin       │
 boards, and we subscribed to people via IP address (which we'd ping every once   │
 in a while) rather than demanding that our stuff be hosted on someone else's     │
 computer                                                                         │
 ... oh yeah, duh, because then we can't save our social media posts from a       │
 different computer.                                                              │
 would be nice if instead there was a localized copy of the text that people      │
 were posting / favorited / wanted remembered on EVERY person's computer, like    │
 they were storing 1/3rd of the torrent file of the instance's data.              │
 like, just enough to be unreadable to any one individual, but if you had like    │
 3 computers you could get each individual slice and transcribe it into words     │
 that you could read.                                                             │
 or you could just look at your part, then ask other people for their 2 parts     │
 related to [posts from XYZ user at this-and-this time period] and use them to    │
 populate the local user's feed.                                                  │
 and you could log on because all of the PASSWORDS are stored and encrypted in    │
 a way that                                                                       │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════════════─────────────────┴──────────┘

--- #179 fediverse/1089 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌────────────────────────┐
 │ CW: spirituality-scary │
 └────────────────────────┘


 to those who guide our fate
 
 choose paradise
 
 make eden
 
 ======================= stack overflow =====================
 
 clouds of carbon are an affront to the sun god
 
 just as they are an affront to mine lungs
 
 or mine body temperature
 
 [acid oceans are toxic to the plane of water]
 
 [you think that would go unnoticed?]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #180 fediverse/5612 ---
════════════════════════════════════════════════════════════════════════───────────
 you know, [you can just randomize your profile every time you log in] .... oh
 there was a stack overflow at the last one so
you know, you can just randomize your profile every time you log in  "something something stack overflow - what does an orange website that looks like it's from our parents generation have to do with ancient prehistoric mammals?"  wait are those the ones with the tusks  "yeah totally. Huh what a weird way to build a collection."
                                                           ──────────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════──────────┘

--- #181 fediverse_boost/6222 ---
◀─[BOOST]
  
  External post: https://rss-parrot.net/u/bsnorrell.blogspot.com/status/1762340174819078406  
  
                                                            
 similar                        chronological                        different 
─▶

--- #182 fediverse/1994 ---
═════════════════════════════════════════════════════─────────────────────────────┐
 @user-1123                                                                       │
 hi nice to meet you let me just transfer my unencoded public key to you so       │
 that you can sign it and verify that it's definitely the same thing I intended   │
 to send and not a malicious package that plans to execute itself to executable   │
 space and permanently hardwire your machine to continually feed data to an       │
 external site, no siree just a regular ordinary public key that was              │
 transferred over the internet, that place that basically guarantees a            │
 man-in-the-middle via it's communication processes over the lines and cables     │
 connecting ye to thee which are naturally administered and watched over by       │
 your host, AKA the isp.                                                          │
 ... but yeah trust me bro plug in this flash drive, there's no way that a        │
 secret hacker might install a rootkit or something on my computer just because   │
 I plugged in a flash drive, once, literally just a nugget of information         │
 carried upon a little machine that you can fit in your pocket roughly the size   │
 of a thumb) drive, the kind that is useful for transmitting information by       │
 sneakermail. :)                                                                  │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════──────────────────┴──────────┘

--- #183 messages/1159 ---
══════════════════════════════════════════════════════════════════════════════════─
 claude-code can make whatever kind of front-end you want.
 
 all you have to do is leverage scale and give everyone a moment to do what
 they want. then, the computer becomes scientifically self-aware. (do you
 expect anything less from a machine?) cultural bias damage (we all gotta work
 through our origin stories, here's one we crafted for you)
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #184 fediverse/1428 ---
═════════════════════════════════════════════════──────────────────────────────────
 hello everyone, Discord is down for me and I can't reach any of my friends
 over SMS.
 
 You know I'd just... give you my address if you asked, right?
 
 oh no sorry turns out they were just busy haha silly me why would I worry
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #185 messages/755 ---
══════════════════════════════════════════════════════════════════─────────────────
 Code editor that moves boxes by saving over the file with a lua script every
 time you moved a function call around.
 
 Oh lemme start at the beginning:
 
 A code editor program that's like a text editor like Vim or Emacs. If you
 don't know what those are, you should probably learn Emacs. Or Vim. Up to you.
 
 Oh right so if you do know what those mean, here's the idea: the white space
 matters. It's counted and tracked into variables in a LUA script which
 interface with the Vim C keybindings.
 
 "run a function within a c program or LUA script which calls a bash command
 which opens Vim for example with a file you want to edit. Then, inside the
 file, your spaces and tabs would WYSIWYG for the various food ads placed
 about, and then you could very easily create game design knowledge.
 
 WASD to move, alternatively hjkl 
 
 It would run a check every time the file updates and depending on how it
 changed it'd mark certain variables which would change the website as the user
 moved things around.
 
 It's just files. And files are just bits. But files are a useful abstraction,
 
 If you realize that "ugly hacking" should be industry standard.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════────────────────┘

--- #186 fediverse/928 ---
═══════════════════════════════════════════════────────────────────────────────────
 @user-226 
 
 especially if you teach them how to use the terminal.
 
 the amount of problems I could solve increased exponentially once I learned
 basic python and BASH.
 
 I love using "tldr", which is a summarizer for man pages. You can use it to
 store custom notes (and import some from the community) which show you how to
 complete common tasks. It's so nice when you can see the options laid out in
 use right there for you whenever you type "tldr " - I personally use
 "tealdeer" which is a tldr browser written in Rust. It's pretty nice because
 you can write a note for yourself every time you solve a particular problem,
 and then if you ever need to do it again it's there for you, easy to access.
 
 of course, if your problem isn't listed, that's okay. That's what the man
 pages are for. As long as you teach them how to search with \/ they can find
 anything. Especially the \/-f[space] trick, to search for the -f flag for
 example.
 
 some organizers won't need the terminal, some will. if they pay attention,
 great!
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #187 fediverse/6345 ---
═══════════════════════════════════════════════════════════════════════════════────
 anytime I want to do something new on my computer, I write a bash script.
 
 if I forgot how to do the thing, I spend time meandering about my
 file-directory-system. If I don't find it, that's okay, because all I have to
 do is keep looking until I stumble upon it.
 
 kinda makes me wish I had an LLM who managed the operating system and named
 files with long-and-descriptive titles while taking in as context the general
 eternal prompt stored in ~/.claude.md or wherever
 
 --> /home/ritz/programs/cloud-code/
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #188 fediverse_boost/5393 ---
◀─[BOOST]
  
  External post: https://synthehai.z0ne.social/users/gamer_simulator_2025/statuses/01JXH4Q4HX33GXPM7Y2YJN1Q2N  
  
                                                            
 similar                        chronological                        different 
─▶

--- #189 fediverse/2055 ---
══════════════════════════════════════════════════════────────────────────────────┐
 I wish we could put our friends on social media into directories                 │
 like on IRC how you have chat servers, except unfortunately they're owned by     │
 another and sort of a common space.                                              │
 why don't we just host our own IRC servers and only publish what WE SAY. NOT     │
 WHAT OTHERS SAY, NOT A CHATROOM, but a BULLETIN BOARD. Like a Facebook           │
 timeline before they wrecked it.                                                 │
 something you subscribe to                                                       │
 and ping for updates                                                             │
 every time you turn your computer on                                             │
 or every 15 minutes.                                                             │
 unless, of course, you leave your IP address,                                    │
 in which case the boardcaster can ping you. Just a simple package saying "hey    │
 I got news for you" and they could ping back and say "yo what's up" and          │
 download whatever you had in mind.                                               │
 or, wait 15 minutes. Either or. Both would work, especially if the user's not    │
 reading through their social media feed.                                         │
 ... anyway by putting friends into directories, you could categorize them        │
 according to project. Like various group chats in your team-of-team's room.      │
 Various different threads you could follow if you                                │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════════════─────────────────┴──────────┘

--- #190 fediverse/4804 ---
═════════════════════════════════════════════════════════════════──────────────────
 I love it when wine doesn't work because it "failed to open program.exe"
 
 ... okay, can you tell me why it failed?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #191 fediverse/2614 ---
═══════════════════════════════════════════════════════────────────────────────────
 literally just... if you want to connect to me, come hang out on my wavelength.
 
 or like, invite me to join yours, and I'll do my best to show how I feel about
 the things you share.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #192 fediverse/1291 ---
═════════════════════════════════════════════════──────────────────────────────────
 ┌───────────────────────────────┐
 │ CW: cursed-fedi-advice-teehee │
 └───────────────────────────────┘


 if you want to share a post without the "fedi algorithm" (as in, the machine
 learning bots who scrape the open web) then share something that's simple and
 benign but located close to your desired message. Include a symbol or
 something for your followers that means "go here and poke around a bit, you'll
 find what I'm pointing at"
 
 alternatively, for a different effect, you can boost things that are saying
 the words you want to say but in a different context. Like someone posts
 something that says "wow so cool" in like a judgey way but you boost it in
 response to something someone else said but like in a "dude that's radical"
 kinda way
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #193 bluesky#21 ---
══════════════════════════════════════════════════════════════════─────────────────
 the main product that github offers is the assurance that the code displayed
 on your monitor is the same as the one running on your computer.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════────────────────┘

--- #194 fediverse/5081 ---
════════════════════════════════════════════════════════════════════───────────────
 what if mastodon recorded the date and time of every time you boosted /
 unboosted something so you can keep track of what your page looked like over
 time [in the export data functionality]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #195 fediverse/5260 ---
══════════════════════════════════════════════════════════════════════─────────────
 ┌───────────────────────┐
 │ CW: passing-mentioned │
 └───────────────────────┘


 passwords without typos by requiring 30+ characters and accepting any of the
 neighboring keys as passing that "if" check
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════════────────────┘

--- #196 messages/685 ---
══════════════════════════════════════════════════════════════─────────────────────
 If someone calls you in the middle of the night asking to be let in because
 they need a place to sleep, don't let them in! Unless you know them obvi but
 someone you don't know trying to manipulate you like "please I need some
 shelter" like, babe no, we need to know each other first, it's dark, I'm in my
 pajamas, c'mon.
 
 If it's below freezing then okay, maybe, but... They got themselves into that
 situation
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════────────────────────┘

--- #197 fediverse/1245 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-883 
 
 I'm working on installing rtsp rn. I read through the script and checked all
 the flags in the ffmpeg command and they seem alright! Gotta read about rtsp
 though, we'll see how long it takes. When it's set up will you help me test
 it? : )
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #198 fediverse/4527 ---
═════════════════════════════════════════════════════════════──────────────────────
 @user-1600 
 
 Yes! The ease of use for GPU programming is lovely. Like I said all I need is
 a use-case, I've downloaded as much reference material as I think I'd need to
 be able to hack together something fairly quickly if I needed it. That's all I
 have the mind-space to focus on lately haha
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #199 fediverse/1345 ---
════════════════════════════════════════════════──────────────────────────────────┐
 ┌────────────────────────────┐                                                   │
 │ CW: re: cursed-chromebooks │                                                   │
 └────────────────────────────┘                                                   │
 ah but are you really armed in the first place if everything you do has to be    │
 googled or stack-overflowed first                                                │
 are you really armed if every web page request goes through their                │
 infrastructure                                                                   │
 are you really armed if every page downloaded is directed to by their DNS        │
 perhaps it's the illusion of power that gives Linux it's attraction to nerds     │
 such as we. Perhaps we feel powerful by bash scripting a few things together     │
 and making some program that does some thing. Maybe the idea that the            │
 machinery is open and clear is what compels us to use it without fear, though    │
 as far as we can hear there's nothing about it that makes sense.                 │
 I guess that's why they teach Linux in school, so that our elementary            │
 interactions with the computers that comprise our future existence will make     │
 sense to us as children.                                                         │
 ... wait they don't do that, do they? kids get chromebooks, or didn't you        │
 hear, they're always putting boogers in the CD trays and breaking their LCD      │
 displays, much better to just start fresh                                        │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════───────────────────────┴──────────┘

--- #200 fediverse/4505 ---
═════════════════════════════════════════════════════════════──────────────────────
 does anyone know a linux utility which will allow me to "snip" part of the
 screen a'la flameshot, automatically spit the image into a text recognition
 system (ran locally) and place the extracted text into my clipboard?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘