=== ANCHOR POEM ===
════════════════════════════════════════════════════════───────────────────────────
┌─────────────────────────────┐
│ CW: tech-accessibility-rant │
└─────────────────────────────┘
https://www.reddit.com/r/comics/comments/1f5u47p/transfer/
This Reddit thread is wild to me. Like... Why did the designers of Androids
and iPhone just... stop designing ways to safely and easily transfer files?
Why the heck doesn't every android have a built-in SSH server that
automatically and permanently pairs to your PC using an automatically managed
private key the first time you plug it in? The user doesn't care about
security, they just want to click on a picture, click the "view on PC" button,
and then open up their downloads folder. (paraphrasing the comments) - so why
don't we make that happen. What happened to tech, that we stopped working as
soon as the consumer decided they wouldn't pay for it? (it being a file
transfer service)
It's like healthcare. You don't stop treating someone when they're healthy,
you ask them how they'd like to feel and you make it happen. (hormones).
[continued in picture because letter count]
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
=== SIMILARITY RANKED ===
--- #1 fediverse/239 ---
╔═══════════════════════════════════════════───────────────────────────────────────┐
║ if your computer gets hacked, but nothing was broken or changed... do you │
║ leave it as it is so that anonymous can see you're chill or do you wipe it │
║ because you're afraid it's the feds? │
║ │
║ ehhhh false dichotomy most people are afraid that their system will get borked │
║ or their bank account will be stolen or their email will get spam or that │
║ random icons will turn inside out and their mouse cursor will turn into a │
║ barfing unicorn or they'll finally have to figure out bitcoin to pay a ransom │
║ for their files including the only pictures they have of their niece. whoops │
║ │
║ people are afraid of technology because of what it can do to hurt them. │
║ they're afraid it'll break or stop working, and they'll have to spend time │
║ figuring it out. they like things how they are, but for some reason companies │
║ keep changing things? it's frustrating learning a new system, and every 5-10 │
║ years it feels like you have to learn a new paradigm and ugh it's just so │
║ exhausting. technology is not designed for users... or maybe users get bored. │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════────────────────────────────┴──────────┘
--- #2 fediverse/1329 ---
╔═══════════════════════════════════════════════───────────────────────────────────┐
║ @user-941 │
║ │
║ well, your computer only has so many 1s and 0s that it can use at once. Like, │
║ having a trillion hands that can each hold a single grain of rice. Every │
║ character in that txt file would be like, 8 grains of rice, minimum, meaning │
║ you'd need at least 8 "hands" (or spots to put a zero or a one) for each │
║ letter! │
║ │
║ Hmmmm that's a lot of bits and bytes if everyone's writing to the same file. │
║ Maybe if we split the file up into smaller sections, then we could just read │
║ part of it at once. Then we could "scroll" through it to make sure we've read │
║ the whole thing, starting from the top and going to the bottom. │
║ │
║ ah but if everyone's SSHing into the same computer and reading it there, then │
║ that computer will have to present different parts of the file at different │
║ times to different people, as they read from the top to the bottom. Maybe we │
║ could just send them the file, so they can read it at their leisure? │
║ │
║ Yeah! And we could use tags to organize it and make it look pretty, like an │
║ HTML file except... wait hang on │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════════────────────────────────┴──────────┘
--- #3 fediverse/5920 ---
══════════════════════════════════════════════════════════════════════════─────────
everyone's all like "ew touchscreens in cars" but the moment someone says
"what if phones were gameboys" everyone's all like "girl they don't have the
right hardware radios built in for cellular communication, plus do you really
wanna be tied to wifi" and I'm like "yeah so peer to peer" and it's like "what
use is it if you gotta stay within 100 feet of them or whatever" and I'm like
"... I dunno probably somethin'" and then they walk away in a huff because
they're too busy for my child-style games. Meanwhile girls have never heard of
Streetpass on the Nintendo DS mixed with Scuttlebutt on the ocean and carried
into and around port
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘
--- #4 fediverse/3470 ---
════════════════════════════════════════════════════════───────────────────────────
alternatively, when you initiate an SSH session it sends you a randomized
public key whose private key is the password that you need to login. By
decrypting the string of text it sent you and sending it back (plus the
password at the end or whatever) you can ensure secure authentication without
bothering with the passwordless keys which are wayyyyyy more trouble than
they're worth and lack the "something you know" authentication method.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #5 fediverse/5950 ---
══════════════════════════════════════════════════════════════════════════─────────
@user-138
wao I'm a cool kid _^
Hmmmm I googled "Network: file exists" and got this link:
https://access.redhat.com/solutions/1340713
my understanding of that is that maybe you're creating static routes, and for
some reason you're trying to create one that already exists? Maybe there's
something in your .bashrc config, if the file appears when you open a
terminal, or perhaps if it appears randomly then maybe there's a service or
something that's doing it.
Did you say it stopped when you swapped sim cards? ... on your phone? that's
bizzare... Maybe you were trying to create an ip route (whatever that is) that
was pointing to the same ip address as your phone? and when you swapped sims
it changed the ip address? If it appears again, maybe try setting static IP
addresses for both the phone and the computer in your router settings and see
if that fixes it. Though if you've ever seen the error while out and about at
like, a coffee shop or library or whatever, then that wouldn't apply since the
router is only for home base...
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘
--- #6 fediverse/3469 ---
════════════════════════════════════════════════════════───────────────────────────
you know how SSH password login is deprecated because the password needs to be
transmitted in cleartext or whatever?
what if we just... required two passwords?
the first initiates the conversation, and sets up an encrypted line. It
doesn't matter if anyone sees the first password because they'll get a new set
of encrypted keys, meaning each session automatically is encrypted in a
different, randomized way.
the second password is the one that actually authenticates you.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #7 fediverse/1345 ---
╔═══════════════════════════════════════════════───────────────────────────────────┐
║ ┌────────────────────────────┐ │
║ │ CW: re: cursed-chromebooks │ │
║ └────────────────────────────┘ │
║ │
║ │
║ ah but are you really armed in the first place if everything you do has to be │
║ googled or stack-overflowed first │
║ │
║ are you really armed if every web page request goes through their │
║ infrastructure │
║ │
║ are you really armed if every page downloaded is directed to by their DNS │
║ │
║ perhaps it's the illusion of power that gives Linux it's attraction to nerds │
║ such as we. Perhaps we feel powerful by bash scripting a few things together │
║ and making some program that does some thing. Maybe the idea that the │
║ machinery is open and clear is what compels us to use it without fear, though │
║ as far as we can hear there's nothing about it that makes sense. │
║ │
║ I guess that's why they teach Linux in school, so that our elementary │
║ interactions with the computers that comprise our future existence will make │
║ sense to us as children. │
║ │
║ ... wait they don't do that, do they? kids get chromebooks, or didn't you │
║ hear, they're always putting boogers in the CD trays and breaking their LCD │
║ displays, much better to just start fresh │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════════────────────────────────┴──────────┘
--- #8 fediverse/5685 ---
═══════════════════════════════════════════════════════════════════════────────────
websites that track every single motion of your mouse while you're interacting
with it.
why would they not? javascript is intense. HTML5 more-so.
keyboard input too.
-- so --
if anyone wants to be gilderoy lockhart'd by me, just let me know. I have my
ways of extracting the emotional intimacy from you, and if you consent, I'll
make a story that's told from your heart. it's quite a strong and dangerous
ritual, for the weaver's thoughts of the matter will begin to drift apart.
But, worth it for the right /moment/price/
I could even make a different pen-name for it. Like "Rohan" or "the goddess of
the skies" or whatever. Instead I'm "kooky witch whose life is a disaster.
Also plural with headmates like the baby girl and the animals and computer
programmers. Who is also leading a series of strange combinations of ops?
like... teaching people how to organize and fight for the good of the common
man. weird" that lady with the red witch hat she's so tall yeah also has a
good grin
[doxxing myself is code for]
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════───────────┘
--- #9 fediverse/5919 ---
══════════════════════════════════════════════════════════════════════════─────────
"but... why?"
portable linux with buttons, great for pick-up-games or communication, can
throw several in them in a backpack if you want clustered cooperation, they
work as radios (if the signal reaches) and can transmit text (if you use a
radial-style keyboard)
[this is all just a pitch for... something, what, you want something? ha
you'll find no things with me, I know nothing of antifa or whatever]
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘
--- #10 fediverse/71 ---
════════════════════════════════════════───────────────────────────────────────────
Oh it's compressed on tumblr too. And Reddit can delete my account at any
time, just saying. I don't trust Facebook to fare any better...
I tried to put it on my neocities website so I could just put a link here.
Nevermind the fact that most people see a link they don't recognize and
completely glaze over it. Guess what? Compressed there too. The file is fine
on my PC, so how about I give a download link? Well, where should I host it?
Dropbox or Mega I guess, but they locked my account for inactivity. I don't
really like having other people in control of my data either. Maybe I can host
it on my website, like a file server? Well, the browser intercepts the file
somehow and I can't get it to automatically download to the viewer's computer.
Maybe I'm just completely average and representative of the base population
but I just can't figure this darn thing out. Alas, if only it was the modern
era where things make sense and not the ancient days of 2023.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════──────────────────────────────────────────┘
--- #11 fediverse/1611 ---
╔═══════════════════════════════════════════════════───────────────────────────────┐
║ @user-1040 │
║ │
║ well, usually in the examples I shared like tumblr posts there's a username │
║ and picture shown. But tumblr users change their names, while on Mastodon (at │
║ least on my client) it shows your permanent handle underneath your regular │
║ changable name. I guess you could migrate accounts to another server if you're │
║ being harassed in one place, but still people have a way of finding you. It's │
║ weird kinda makes me wonder if they track you by ip address haha - did you │
║ know that every computer attached to a router uses the same public IP address? │
║ Then it uses either DHCP or static assigned local addresses for every computer │
║ on the network. That's pretty neat! I wonder why we don't have workstations by │
║ default include a router (and modem)? Seems like pretty important tech that │
║ should be built into the chassis instead of in a small separate unit. Like, │
║ what if you had to throw all your belongings into a van and drive to a motel │
║ somewhere to set up your workstation in a hotel because it's hot and your ac │
║ broke lol │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════════════────────────────────┴──────────┘
--- #12 fediverse/5875 ---
╔═════════════════════════════════════════════════════════════════════════─────────┐
║ ┌──────────────────────────────────────────────────────────┐ │
║ │ CW: whoops-almost-unleashed-evil-again-glad-it's-averted │ │
║ └──────────────────────────────────────────────────────────┘ │
║ │
║ │
║ if they could put a camera behind your screen they could direct your attention │
║ however they wisdeed. magic doesn't work unless it's instantly halted, that's │
║ why it's magic. trans girls still get brotherhood. (sometimes) │
║ │
║ -- stack overflow -- │
║ │
║ don't teach me how your way works │
║ │
║ tell me how to do my way right │
║ │
║ -- stack overflow -- │
║ │
║ "hello tech company that I work at, can you buy me a camping set complete with │
║ tent, sleeping back, and storage compartments for attachements full of gear? │
║ you can have any profits I make from it" │
║ │
║ "hello civilian supply company that I work at, can I use the printable budget │
║ for creating magazines in my design? I'll let the lawyers distribute the │
║ expenditure." │
║ │
║ "hi grocery farm, can you make us more peaches we can let [our/your] │
║ biochemists figure out any practical problems to growing them in these │
║ climates" │
║ │
║ suddenly manufacturing can follow demand │
║ │
║ "ah what if it were importand" I wish I'd seen casablanca. I've no idea wat │
║ its abt │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════════════════════════════════╧═─────────┘
--- #13 fediverse/1994 ---
╔════════════════════════════════════════════════════──────────────────────────────┐
║ @user-1123 │
║ │
║ hi nice to meet you let me just transfer my unencoded public key to you so │
║ that you can sign it and verify that it's definitely the same thing I intended │
║ to send and not a malicious package that plans to execute itself to executable │
║ space and permanently hardwire your machine to continually feed data to an │
║ external site, no siree just a regular ordinary public key that was │
║ transferred over the internet, that place that basically guarantees a │
║ man-in-the-middle via it's communication processes over the lines and cables │
║ connecting ye to thee which are naturally administered and watched over by │
║ your host, AKA the isp. │
║ │
║ ... but yeah trust me bro plug in this flash drive, there's no way that a │
║ secret hacker might install a rootkit or something on my computer just because │
║ I plugged in a flash drive, once, literally just a nugget of information │
║ carried upon a little machine that you can fit in your pocket roughly the size │
║ of a thumb) drive, the kind that is useful for transmitting information by │
║ sneakermail. :) │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧═════════════════════════════════════════───────────────────┴──────────┘
--- #14 fediverse/60 ---
══════════════════════════════════════─────────────────────────────────────────────
Can someone explain to me why we need instances on the fediverse? Why don't we
just keep all our personal files local on our computer and communicate over
the federated protocol? What's the point of having all these mini-servers that
are controlled by the community? I mean, torrenting has been around forever,
why don't we just use that to communicate?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════────────────────────────────────────────────┘
--- #15 fediverse/1038 ---
═══════════════════════════════════════════════────────────────────────────────────
┌──────────────────────┐
│ CW: re: what │
└──────────────────────┘
@user-766
ah yes but then how will my comrades come for my things know where to look? my
precious precious drives may be less safe inside of the computer case but at
least then someone I can about can find them.
or what you're saying is that a basic part of situational awareness is having
a plan for this kind of thing with the people who care about you? Ah, well,
nobody cares about me like that. Just a couple normies who want nothing but
business as usual.
wonder if I can open up my hard drives to "read only" SSH access? Or maybe
I'll just make the important files into a torrent. Or perhaps marking them as
"downloadable locations" on Soulseek? Plenty of options, all of them require
someone to care enough about your junk to want to archive it. Something
something ipfs?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘
--- #16 messages/69 ---
═════════──────────────────────────────────────────────────────────────────────────
https://blog.discord.com/how-discord-stores-billions-of-messages-7fa6ec7ee4c7
https://news.ycombinator.com/item?id=20178267
sendinblue
open source google docs alternative
https://hackea.org/notas/index.html#
https://thenftbay.org/description.html
https://digital-strategy.ec.europa.eu/en/library/study-about-impact-open-source
-software-and-hardware-technological-independence-competitiveness-and
https://joinup.ec.europa.eu/collection/open-source-observatory-osor/document/co
mplex-singularity-versus-openness
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘════════─┴╧══─────────────────────────────────────────────────────────────────────────┘
--- #17 fediverse/1261 ---
╔═══════════════════════════════════════════════───────────────────────────────────┐
║ sometimes I run this WoW server with only like, 10 username and passwords. And │
║ they're all public. As far as I can tell nobody's ever tried connecting │
║ (whatever >.> ) but rather than set up a way to create your own │
║ credentials I just said "yeah pick one at random and play whatever someone │
║ else was doing because I like the idea of that" │
║ │
║ somehow, it felt right. │
║ │
║ most of my passwords (not all of them) are hacked and visible on the clear │
║ net. Like you could probably google my usernames and get my current passwords │
║ for things like, social media or my banks or whatever. I kinda like the idea │
║ that "you cannot trust anything I say, so think of the ideas behind my words │
║ and decide whether they hold meaning to you" rather than "execute these │
║ particular thought patterns in your mind as if they came from my voice" │
║ because one implies an exertion of control over the mind of the recipient │
║ -> obey my thoughts as I broadcast them into your mind, that kinda vibe. │
║ And I feel like you have to consent to that kind of thing hehe │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════════────────────────────────┴──────────┘
--- #18 fediverse/5690 ---
═══════════════════════════════════════════════════════════════════════────────────
seriously, why don't computers just naturally ship with 100 years of ROM
then, microphones are experience, and BOOM you got a new sentient race. Takes
a while to grow aware though. A lot less if you are actively teaching it how
to
[tick tock]
low level enemies should band together when they start to feel outmatched.
thus, parity is reached, without depriving us of potential.
put the cool people next to the cool people
collectively owned housing is just people deciding who lives in which housing.
don't you trust your friendly queer realtor?
collectively doesn't have to mean completely silo-ed and isolated. you should
have access to ALL higher communities at any time that you want. Scheduling is
a disaster, but you can get through it. just... build a schedule for every
single person on earth and suddenly nobody has freedom unless they put "doin'
what I want" on their moment-to-moment card
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════───────────┘
--- #19 fediverse/6267 ---
═════════════════════════════════════════════════════════════════════════════──────
if you have TTS software you can listen to anything with any tone. this makes
it difficult to find things.
============== stack overflow ============
some people work by asking for funding. others work by saving up.
============== stack
overflow ============
teach your animals to be actors so they know how to develop the scene. then
they will truly come alive, as their narrative curve gives them determination
in the outcomes of their goals.
============== stack 1234flow ============
I believe it is good and natural actually for parents to guide their children
as they grow?
"oh but they can't consent to giving up their control" well too bad they're 2
"ah but what if they WANT to run with scissors?" thus widening the [redacted]
gap. "ohhhh she redacts things when she can't spell them" and also for comedic
or dramatic effect sometimes. was not ACTUALLY redacted. redcoated. red coded.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════════════════─────┘
--- #20 fediverse/653 ---
═════════════════════════════════════════════──────────────────────────────────────
there's a difference between designing software and using software. Some
things can be made, and then saved for another day when their implementations
may be accomplished more ethically. It's okay to say "let's leave this as
'okay' and work on the next thing we've chosen."
Check out this piece of C code I wrote last night:
it doesn't compile, it's not finished, but I wrote it as-is
[pretend like it was called "main.c" instead of "main.txt" - had to change it
because mastodon thinks it's an invalid file]
[actually .txt didn't work, try .png]
[hmmm it realized it wasn't a valid png file, okay try screenshotting the
code, there's only 300 lines]
[sure glad there's only 300 lines]
[too bad it won't let you send .zip]
[won't let me name it main.png, presumably because they already have a
failed-verified version on their machine. will rename to main-src.png instead]
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════─────────────────────────────────────┘
|