=== ANCHOR POEM ===
◀─[BOOST]
  
  There is no such thing as a backdoor for good guys. Once you place a backdoor, you compromise the safety and privacy of all your users. A third party or bad guys will get access to it and abuse it further. The concept of a "backdoor for good guys" is fundamentally flawed and dangerous. It sets a dangerous precedent. Security and privacy should be absolute. There's no safe way to create a backdoor that can't be exploited by malicious actors. #privacy #security #infosec  
  
                                                            
 similar                        chronological                        different 
─▶

=== SIMILARITY RANKED ===

--- #1 fediverse/884 ---
═══════════════════════════════════════════════────────────────────────────────────
 ┌──────────────────────────────────────────────────────┐
 │ CW: completely-unfounded-no-evidence-mis-information │
 └──────────────────────────────────────────────────────┘


 If we make a law that says you can't sell user data, they'll just build an
 intentional vulnerability into their system and point it out to specific
 people who paid under the table. Then, when they get "hacked", they'll surely
 be ashamed and sorry to their users, but hey the data's out there now not like
 they can take it back. Oh don't worry we already patched the hole in our
 security, that way nobody can get in through the same door that was
 intentionally left open for very particular people who've paid, and not for
 the people who haven't paid yet, who are still waiting patiently for a door to
 be built for them.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #2 fediverse/1113 ---
════════════════════════════════════════════════───────────────────────────────────
 we should be able to configure our web browsers so that they don't remember to
 autofill certain pieces of information. Such as the IP address of our router,
 or our bank credentials, or any other forms of passwords that we are using to
 authenticate ourselves. That way our infrastructure that we've designed is
 less susceptible to cybersecurity threats that involve physical access to the
 computer. Or remote control of some kind that is channeled through the UI
 (like RDP or SSH) (a terminal is a text based UI in this context)
 
 Unless of course they knew what they were doing. Which most of them don't.
 Hence why it'd be a good idea to isolate the capabilities of defeating certain
 vulnerabilities to ourselves. Like, a reverse backdoor, only more like a DMZ -
 a sector of computing space (sandboxed of course) that is only utilized for
 understanding the intent of the message sender.
 
 Doing so would require an analysis of the capabilities of the system, the kind
 of analysis that [script kiddies'dve] generated by googl
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #3 fediverse/2252 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-encryption  │
 └──────────────────────┘


 users don't want to have to think about encryption keys.
 
 they should be available for them if they need them, in like... a folder or
 something somewhere, but they don't need to really know that they exist.
 
 more friction like that keeps people away from being secure.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #4 messages/181 ---
═══════════════════════════════════════════════────────────────────────────────────
 I know you don't want to hear this, but there is a chance that there will come
 a time where your life depends on your ability to debug a computer without the
 internet. To set up an SSH server. To install Linux. To program in C. To do
 something else that I'm not prepared for... If StackOverflow didn't exist
 because network connectivity has been lost, could you remember syntax? Maybe
 it's a good idea to set up a local LLM that can answer basic questions about
 technology. Maybe it's a good idea to set up on your parents computer, just in
 case you have to hide out there for a couple months. Maybe it's a good idea to
 download wikipedia, just in case.
 
 If I need to use a mac, I'm screwed
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #5 fediverse/5369 ---
═══════════════════════════════════════════════════════════════════════────────────
 @user-138 
 
 you can use a username now. They added that functionality recently.
 
 it's supposedly more encrypted or something. But, it's still a centralized
 point of failure. If you want to say something privately, pretend like you're
 ordering drugs on the dark web and use PGP encryption or SSH keys or whatever
 it says in the "how to order drugs on the dark web" guides.
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #6 fediverse/3470 ---
═════════════════════════════════════════════════════════──────────────────────────
 alternatively, when you initiate an SSH session it sends you a randomized
 public key whose private key is the password that you need to login. By
 decrypting the string of text it sent you and sending it back (plus the
 password at the end or whatever) you can ensure secure authentication without
 bothering with the passwordless keys which are wayyyyyy more trouble than
 they're worth and lack the "something you know" authentication method.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #7 fediverse/4946 ---
══════════════════════════════════════════════════════════════════─────────────────
 I would trust the CIA if they gave me continual access to all surveillance of
 myself
 
 -- stack overflow --
 
 what if you made a program which cycled credentials?
 
 like... "give me a random credential for Zoom" because we share all of our
 digital resources
 
 did you get banned for account sharing? no you didn't because you routed
 through the correct VPN
 
 automagically
 
 [has never had a software job]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════────────────────┘

--- #8 fediverse/4720 ---
════════════════════════════════════════════════════════════════───────────────────
 @user-882 
 
 it's a security hole though
 
 yeah... there ya go...
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #9 fediverse_boost/4589 ---
◀─[BOOST]
  
  Remember Friends:                                                           
                                                                              
  You cannot both have secure end-to-end encryption to protect your communication AND also have a backdoor/key/access only for "the good guys."   
                                                                              
  This is not possible.                                                       
  Do not believe anyone telling you otherwise.                                
                                                                              
  End-to-end encryption protects us all,                                      
  we must fight to keep it ✊🔒                                                 
                                                                              
  #Privacy #Encryption #E2EE #RootForE2EE                                     
  
                                                            
 similar                        chronological                        different 
─▶

--- #10 fediverse/2674 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌────────────────────────────────────────────────────────────────────┐
 │ CW: factually-untrue,-that-never-happened.-this-is-just-gesturing. │
 └────────────────────────────────────────────────────────────────────┘


 the kind of friendship where you SSH into each other's systems and leave notes
 for one another.
 
 as soon as you find one you message the person who left it like "yoooo only
 just found this lol" and they're like oooo yeah did you see the bash script I
 wrote in that directory "yeah totally I used it on one of my video files just
 now - cool filter!"
 
 ahhhh reminds me of all the times hackers have hacked my permanently insecure
 system and left me friendly messages like "hey I'm on your side" or "how's
 life, friend? I hope it's going well." or "never forget; you are worth all the
 fear" y'know cute things like that
 
 oh. right. because leaving vulnerabilities like that can lead to threat actors
 affecting your stuff. how lame.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #11 fediverse/1862 ---
═════════════════════════════════════════════════════─────────────────────────────┐
 some people look for signals or signs before doing something. Try and have       │
 someone in your life who can give you signals or signs so that you know when     │
 to do things. And ideally, if they're more hardcore than you, you'll know what   │
 to do, not just when to do it.                                                   │
 did you know that anything on the internet can be read by at least one other     │
 person besides your intended recipient? There's no way they'd let us talk        │
 amongst ourselves otherwise.                                                     │
 I think encryption is pretty neat, all you have to do is run a shell script on   │
 some text, then send that text over the internet. If you want to decrypt it,     │
 all you have to do is run a shell script on it to decrypt it.                    │
 downside is, it has to be translated into plain text somewhere along the         │
 line... Maybe if we rendered the words not as text that can be read from         │
 memory, but as like, brush-strokes that can have a randomized order, but still   │
 present to the user as visual text? anyway that's what's on my mind as I try     │
 and improvise a baking recipe with yeast, flour, and butter                      │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════──────────────────┴──────────┘

--- #12 messages/1203 ---
══════════════════════════════════════════════════════════════════════════════════─
 Programmers are lazy, this is well known. So why would i trust by default that
 anyone would read open source code looking for security exploits or malicious
 code? I trust an LLM for that more than a human. At least your own LLM can
 digest the entire project or library at once.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #13 fediverse/664 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-482 
 
 [secretly installs a keylogger and doesn't tell anyone upstream but still
 pushes it to production]
 
 [or worse, was told to do as such and given tools to fabricate "evidence" to
 the contrary to everyone else on the team]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #14 fediverse/3469 ---
═════════════════════════════════════════════════════════──────────────────────────
 you know how SSH password login is deprecated because the password needs to be
 transmitted in cleartext or whatever?
 
 what if we just... required two passwords?
 
 the first initiates the conversation, and sets up an encrypted line. It
 doesn't matter if anyone sees the first password because they'll get a new set
 of encrypted keys, meaning each session automatically is encrypted in a
 different, randomized way.
 
 the second password is the one that actually authenticates you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #15 fediverse/624 ---
══════════════════════════════════════════════─────────────────────────────────────
 You know, there's no guarantee that Youtube or Gmail has to show you the EXACT
 SAME video or message that your friend shared with you. Or did they even share
 it at all? So hard to tell when they know all the communication you've ever
 had, because you only know each other online on their platforms, [read: US
 government observed platforms] [like, HTTPS] surely there's no room for
 someone to sneak in and edit your conversations. Surely the only way to
 securely communicate is to send pure PGP encrypted bytes to another target,
 wrapped in a TCP/IP header, with unknown intent or expression. Worst they
 could do then is just, y'know, block it entirely.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #16 fediverse/3407 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-1218 
 
 there's only a password so that if the zip archive is displaced from it's
 context it's harder to read.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #17 messages/1172 ---
══════════════════════════════════════════════════════════════════════════════════─
 the danger is not that the LLM will generate poor, vulnerable, or malicious
 code.
 
 the concern is that someone else might inject something into the codebase that
 you're not reading.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #18 messages/1245 ---
══════════════════════════════════════════════════════════════════════════════════─
 BRB, if you want to talk to yourselfs, I recommend opening a port in your
 router and exchanging HTTP packets that create messages on each other's
 computers. Can be done in a couple hundred lines of C code that can be 90%
 premade or auto-generated. Then, once it's made, you don't have to think about
 it again because it's so simple. It's not trying to scale, it's just...
 designed for a small, focused, human oriented mindset.\
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #19 fediverse/1587 ---
════════════════════════════════════════════════════───────────────────────────────
 @user-883 
 
 If we lived in a sane world, the internet would operate on standards. And
 yet... Well, that's not entirely true, we have HTTP and HTML and all the
 security risks that Javascripts entails... Well, here's hoping the future can
 figure out what exactly's important aside from profit and ease-of-development.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #20 fediverse/6215 ---
══════════════════════════════════════════════════════════════════════════════─────
 hi does anyone have any good resources on risc-v?
 
 I found this:
 https://dramforever.github.io/easyriscv/#shift-instructions
 
 and this:
 https://projectf.io/posts/riscv-cheat-sheet/
 
 but I'm missing a big gap - specifically, how to move from syntax to
 deployment. I need details on how to implement the software and get it running
 on the actual hardware.
                                                           ────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════────┘

--- #21 fediverse/497 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-346 
 
 Nobody will get past the login screen on my computer, but if they do they
 probably won't know that you need to push alt+p in DWM to start a program. But
 even if they push "alt+p firefox" they will only have access to my gmail and
 discord, because those are the only two places I've saved my login information.
 
 Most of my data is on my hard disk anyway, so for that they'd have to push
 alt+enter and then navigate my filesystem to find it. Shouldn't be too hard if
 you're familiar with Linux.
 
 They could always just pull the hard drive and put it into a new computer
 though. It's not like it's encrypted, because why would I encrypt it? I want
 to share information, not conceal it! Surely nobody would desire to exploit
 that vulnerability of mine, that my data should be unencrypted?
 
 If you have a copy of Wikipedia then you're 500% more prepared than 90% of
 humanity so good job _^
 
 Sure would be cool if you put it in the documents folder of every person in
 your family who solicited tech advice from you
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #22 fediverse/4301 ---
════════════════════════════════════════════════════════════───────────────────────
 @user-1655 
 
 maybe the user could tell their client what fields to expect and how to
 present them (like, a field called "memes" would be presented as a picture in
 this panel, a field called "rants" would be passed to a word-cloud function
 that extracts the most common 6+ letter words so you can tell at a glance what
 the rant is about, this other field could be for calendar invites (plain text
 of course, but interpreted by the calendar program) etc)
 
 plus, if it's encrypted with PGP keys by default, there'd be few security
 concerns. Unless your friend got hacked, or you got hacked, but, well... make
 sure everything's sandboxed and don't do any remote code execution and you're
 good, right?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #23 fediverse/3474 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-883 
 
 true, but much the same way people will rebel against inconvenience by writing
 passwords on sticky notes, so too might they put SSH keys onto the nearest
 flash drive without validating that it hasn't been compromised. There's
 tradeoffs everywhere I guess.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #24 fediverse_boost/3867 ---
◀─[BOOST]
  
  I really hate "two factor" auth.  Like, cool, I get it, it let's you pretend you can divest responsibility for security and recovery, but also it means dropping my phone too hard could be a life disrupting event so somehow I don't really feel like this is for my benefit.  
  
                                                            
 similar                        chronological                        different 
─▶

--- #25 fediverse/874 ---
═══════════════════════════════════════════════────────────────────────────────────
 oh yeah well if SSH keys are so secure then why doesn't every website on Earth
 require them
 
 really though why doesn't every website on Earth require them
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #26 fediverse/2605 ---
═══════════════════════════════════════════════════════────────────────────────────
 @user-1268 
 
 was just wondering what interesting or useful or incriminating data was found
 in the heritage foundation hack.
 
 because, like, they could just leave a security vulnerability open for
 downloading their like, contact data for customers, and like... that's not too
 useful for people attempting to fight them. it's the CONSUMER'S data after
 all, not the corporation / organization.
 
 all I saw was the headline that they downloading some gigabytes of
 information, I didn't check to see what it comprised
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #27 fediverse/4218 ---
════════════════════════════════════════════════════════════───────────────────────
 there are plenty of pieces of linux that are insecure in some way. Including
 x11, if I remember correctly. It is purely convention to not abuse these
 insecurities, and whenever you use someone else's binary software you trust
 that they won't betray you in some way.
 
 pre-built binaries are privacy violations and should be illegal. They are
 security threats because the model they're built upon is necessarily insecure.
 Computers will never be completely secure because of how they are built, and
 so we should use locally compiled software and interpreted scripts.
 
 Unless they're too long, or impossible to read. Who reads EULAs these days? At
 least those are written in english.
 
 maybe computers aren't worth it. Maybe computers will solve all our problems.
 Who can say, maybe you should ask an oracle like me
 
 though do remember that anything you hear can and will be used against you,
 monkey's paw style. So maybe, like... don't? unless you're into magic or
 schizophrenia or something
 
 I wnt 2 be cute and tch cpus
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #28 fediverse/1261 ---
════════════════════════════════════════════════──────────────────────────────────┐
 sometimes I run this WoW server with only like, 10 username and passwords. And   │
 they're all public. As far as I can tell nobody's ever tried connecting          │
 (whatever >.> ) but rather than set up a way to create your own                  │
 credentials I just said "yeah pick one at random and play whatever someone       │
 else was doing because I like the idea of that"                                  │
 somehow, it felt right.                                                          │
 most of my passwords (not all of them) are hacked and visible on the clear       │
 net. Like you could probably google my usernames and get my current passwords    │
 for things like, social media or my banks or whatever. I kinda like the idea     │
 that "you cannot trust anything I say, so think of the ideas behind my words     │
 and decide whether they hold meaning to you" rather than "execute these          │
 particular thought patterns in your mind as if they came from my voice"          │
 because one implies an exertion of control over the mind of the recipient        │
 -> obey my thoughts as I broadcast them into your mind, that kinda vibe.         │
 And I feel like you have to consent to that kind of thing hehe                   │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════───────────────────────┴──────────┘

--- #29 fediverse/1034 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-192 
 
 be careful, recursion can cause stack overflows.
 
 better to run function pointers from a loop. That way you can operate as long
 as necessary. Just make sure you don't get in an infinite loop...
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #30 fediverse/3690 ---
═════════════════════════════════════════════════════════──────────────────────────
 ┌──────────────────────────┐
 │ CW: capitalism-mentioned │
 └──────────────────────────┘


 what if we demanded private servers for video games (by law? what else would
 even work??) and encouraged companies to hire people to make high-quality mods
 for their competitors games so they couldn't make as much money selling
 expansion packs and DLC
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #31 fediverse/5784 ---
═════════════════════════════════════════════════════════════════════════─────────┐
 large companies want you to need to download and configure each piece of         │
 software because then it'd mean [wait you got that backwards] oh right if they   │
 force you to download and install software on a "per distro" system, then they   │
 effectively can ensure that there's always a vulnerability on your host.         │
 any amount of space is PLENTY of space for a                                     │
 non-open-source-but-instead-proprietary-or-otherwise-secretive part of the       │
 tech stack to do whatever they want with your host. computer.                    │
 I wonder, if AI was real would it really be guaranteed to expand in growth       │
 exponentially? What if it's nature was confined to it's form, like dinosaurs     │
 not growing bigger because of the lack of oxygen in the airtmosphere?            │
 [girl can you please stop smoking weed]                                          │
 ... no?? that's when I'm most productive.                                        │
 [this isn't productive]                                                          │
 it feels productive                                                              │
 [it isn't]                                                                       │
 WHYYYYYYY not? it could be. just gimme a task and I'll write endlessly about     │
 it instead of daydreaming to myself.                                             │
 yep... pretty all-right-at-it for a start. elentalusCOTE                         │
                                                            ──────────┤
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════─────────┘

--- #32 fediverse/1693 ---
═════════════════════════════════════════════════════──────────────────────────────
 "if I work on the TTY then they can't forward my X session without my consent"
 
 - ramblings of the utterly deranged
 
 as if they couldn't just look at your unencrypted source-code as you save it
 to your hard drive smh
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #33 fediverse/545 ---
══════════════════════════════════════════════─────────────────────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: re: PSA: aspublic.org is still active, and still archives + makes searchable all public posts, they have no opt-out, nor do they respect the "Include public posts in search results" setting │
 └──────────────────────────────────────────────────────────────────────────────┘


 @user-391 @user-78 
 
 I see, it seems you know more than me about this topic. It's true that search
 engines don't index emails, but I was thinking more of a "cybersecurity"
 perspective, as in any "sufficiently motivated" individual or organization
 could access your emails should they so desire. And should they be willing to
 (I'm assuming?) break a few laws.
 
 If it can be done, and if it gives information that could be used for
 leverage, then you can be assured that someone will do it. I personally worry
 about people in power who could be blackmailed because their communications
 were more public than they anticipated. Which speaks to the problem mentioned
 in this post of the search-indexing-opt-out functionality being present but
 circumnavigatable. Avoidable? Able to be bypassed? It's an illusion of
 security.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #34 fediverse/2706 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: politics         │
 └──────────────────────┘


 feds will "break" into your house noiselessly while leaving no trace when
 you're confirmed to not be home and photograph EVERYTHING.
 
 if you have in-door camera systems, they can disrupt those and they give you
 false confidence.
 
 EDIT: also they're trained to always check after opening a door for any fallen
 markers and such - like, leaving a piece of paper between the door and the
 frame and if it's fallen when you return home, you know someone has been
 through that way - and if they notice anything like that they replace it.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #35 fediverse/5783 ---
═════════════════════════════════════════════════════════════════════════─────────┐
 I think our industry should work on one project at a time                        │
 "do one thing and do it well"                                                    │
 linux users code.                                                                │
 everyone backends ffmpeg.                                                        │
 everyone online uses chrome.                                                     │
 what if we just rewrote every single program and... left it without updates in   │
 a "permanently forbidden" zone                                                   │
 ... I mean what if we wrote non-proprietary alternatives to every proprietary    │
 source of computational knowledge and then we could only patch security          │
 vulnerabilities and compatibility change-bounties [oh no now you're allowing     │
 for endless levels of abstraction [meaning, operating system package             │
 installation bloat] and distasteractions.]                                       │
 the futures where all is not well nearly outnumber the well. but the inverse     │
 is also true, for they are divided roughly equal fifty. balance, in all          │
 things, is the only temperate state. when balance is                             │
 [changed/something/uplifted], balance is inevitable to be search-shifted.        │
 why must you die for an audience?                                                │
 why                                                                              │
 ... I don't really want to, but what happens happens. we'll see if it's a for    │
 sure dealing.                                                                    │
                                                            ──────────┤
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════─────────┘

--- #36 fediverse/3234 ---
════════════════════════════════════════════════════════──────────────────────────┐
 ┌────────────────────────────────────────────────────────────────┐               │
 │ CW: ritz-is-fucking-stupid-I-guess-oh-whoops-cursing-mentioned │               │
 └────────────────────────────────────────────────────────────────┘               │
 my understanding is that anyone with my IP address could make my heart bleed     │
 due to a hardware vulnerability on my motherboard. Though you might have to      │
 get past my decrepit ancient linksys EA 3500 router from 2012 first.             │
 unrelated, but does anyone want my IP address? I don't have any remote           │
 backups, so if you hate me now would be a great time to show me how despised I   │
 am. Alternatively you could try searching for anything evil to ensure that I     │
 can be trusted. You're gonna find mostly video games and source-code that I      │
 didn't write though. But also all my notes in directories that are               │
 non-standard, meaning you'll have to look around a bit. I leave little notes     │
 everywhere I go, so that I can remind myself how to do things in the             │
 directories I revisit months later. It's so weird how sometimes the things I     │
 wrote stop working after a while even if I didn't update my system lmao          │
 what is it with artists and self-immolation? "I never thought I'd actually di    │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════════════───────────────┴──────────┘

--- #37 messages/752 ---
══════════════════════════════════════════════════════════════════─────────────────
 techbros really wanted to automate IRC so they didn't have to rely on the
 community knowing and trusting them to remember the commands to make docker
 containers for their react frameworks
 
 and like... yeah I use chatGPT too, because that way I can get what I need
 without bothering anyone (you aren't bothering people who get off on helping
 others when you ask for help)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════────────────────┘

--- #38 fediverse/2884 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-paranoia    │
 └──────────────────────┘


 every time I update my system, it breaks.
 
 kinda makes me think they do that on purpose so that you spend all your time
 up to date and that way they can quickly patch in and out security flaws fast
 enough that nobody notices.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #39 messages/324 ---
═══════════════════════════════════════════════════────────────────────────────────
 The difference between front-end and back-end programming is whether or not
 you want to design abstractions or use them. Backend is all about creating
 abstract things that are networked together, while front end is about putting
 them together in a way that suits the user. Front end is collage, back end is
 pencil drawing.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════───────────────────────────────┘

--- #40 fediverse/239 ---
═══════════════════════════════════════════───────────────────────────────────────┐
 if your computer gets hacked, but nothing was broken or changed... do you        │
 leave it as it is so that anonymous can see you're chill or do you wipe it       │
 because you're afraid it's the feds?                                             │
 ehhhh false dichotomy most people are afraid that their system will get borked   │
 or their bank account will be stolen or their email will get spam or that        │
 random icons will turn inside out and their mouse cursor will turn into a        │
 barfing unicorn or they'll finally have to figure out bitcoin to pay a ransom    │
 for their files including the only pictures they have of their niece. whoops     │
 people are afraid of technology because of what it can do to hurt them.          │
 they're afraid it'll break or stop working, and they'll have to spend time       │
 figuring it out. they like things how they are, but for some reason companies    │
 keep changing things? it's frustrating learning a new system, and every 5-10     │
 years it feels like you have to learn a new paradigm and ugh it's just so        │
 exhausting. technology is not designed for users...  or maybe users get bored.   │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════────────────────────────────┴──────────┘

--- #41 fediverse/3680 ---
═════════════════════════════════════════════════════════──────────────────────────
 it's probably a good idea to write pseudocode, then real code, instead of
 starting with real code, and bugfixing something incomplete and more difficult
 to reason with.
 
 unless you write real code easier than pseudocode. idk do what works for you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #42 fediverse/4107 ---
════════════════════════════════════════════════════════════───────────────────────
 Just configured Wake on LAN so I can turn on my desktop from anywhere. As long
 as I have the right SSH key...
 
 Couldn't figure out how to do Wake on WAN, which I think is somehow more
 secure. This way uses a small jump from a separate tiny computer which is
 always on.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #43 messages/329 ---
════════════════════════════════════════════════════───────────────────────────────
 LLM training data that's been encrypted in such a way that it preserves
 symantic meaning, while also allowing for secrecy and unique customization
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #44 fediverse/5961 ---
════════════════════════════════════════════════════════════════════════════───────
 @user-138 
 
 maybe it's evil hackers - idk that's beyond my expertise - good luck : )
 
 (I'd need to see the piece of technology to work on it. I'm a hardware kinda
 [girl, but pronounced guy])
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #45 fediverse/1466 ---
═════════════════════════════════════════════════──────────────────────────────────
 ┌──────────────────────────────────────────────────────────┐
 │ CW: death-mentioned-insurance-mentioned-bricks-mentioned │
 └──────────────────────────────────────────────────────────┘


 my opsec is non-existent teehee does anyone want my IP? or even my address,
 it's not like I lock my door
 
 if (when) my poor decisions get me killed (whoops adding content warning)
 please throw a brick at an insurance company for me thanks
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #46 fediverse/1482 ---
═════════════════════════════════════════════════──────────────────────────────────
 @user-192 
 
 I feel like SSH keys to log into every website should be a standard
 
 or something similar
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #47 fediverse/3051 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-1437 @user-1438 
 
 you poor thing, don't delete your toots! don't delete your account! you are
 wanted here, this is the fediverse! it's for all of us.
 
 I personally like cyber-sexual exploitation more than cyber exploitation. I
 wouldn't have thought about it unless you said something. there are a lot of
 ways to exploit someone in a digital medium, and adding "sexual" focuses the
 term to specifically the non-consentual sharing of sexual digital media -
 which is exactly what the term "revenge porn" describes.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #48 fediverse/2459 ---
═══════════════════════════════════════════════════════────────────────────────────
 this is the simplest implementation of scalable anarchism I could think of.
 tell me how it's flawed so I can improve it before I need it.
algorism is a political and economic philosophy designed to wrest power from those who may be corrupted by it, and restore dignity and agency to all of humanity.  It accomplishes this through several layers of abstraction, of votes, of control, of decisions. What do people need? How could we improve? Is there something more we could do?  The idea is to negate bureaucracy by accomplishing goals in an ad-hoc fashion rather than rely on legalism for institutional execution. Projects, not operations.  Society shall be organized into tiers of rotating peers chosen by vote. Each tier sends their top two most voted for up a level to the next tier of organization. the duty of each tier is to provide for the needs and accomplish the demands of each of their lower tier allies. In addition they should provide what they can to their representatives, who offer them on the tier above.  If a need or demand cannot be met by the team of reps, the request is passed upward. This process can be accomplished with paper and pencil, but it's much better to automate and be public.  If desired, there is a queue system to help with the allocation of resources. This system rewards patience and conservation while still allowing for rapid acquisition. Pick two: good, cheap, fast.  It includes also a recycling system - the more you give back in clean and working order, the greater the options available to you.  It is a system of distribution, not control.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #49 messages/635 ---
═════════════════════════════════════════════════════════════──────────────────────
 Yeah, sure, signal is encrypted, but they could just put a virus on your
 miniature pocket tv that streams your screen into a text recognition bot which
 streams that text into an LLM trained to report on suspicious seditious
 activity.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #50 fediverse/3555 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-1553 
 
 just to note this type of link is not the only way they could implement
 tracking. In fact it's kind of the worst way, because it's so obvious.
 
 a more insidious way that we need to be aware of would be to generate a unique
 URL for every person that visits a link. LIke, for me it might be
 "youtu.be/abcdefg" but for you it'd be "youtu.be/hijklmnop" and there'd be
 very little way for us to notice.
 
 be aware of this if they try it.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #51 fediverse/1994 ---
═════════════════════════════════════════════════════─────────────────────────────┐
 @user-1123                                                                       │
 hi nice to meet you let me just transfer my unencoded public key to you so       │
 that you can sign it and verify that it's definitely the same thing I intended   │
 to send and not a malicious package that plans to execute itself to executable   │
 space and permanently hardwire your machine to continually feed data to an       │
 external site, no siree just a regular ordinary public key that was              │
 transferred over the internet, that place that basically guarantees a            │
 man-in-the-middle via it's communication processes over the lines and cables     │
 connecting ye to thee which are naturally administered and watched over by       │
 your host, AKA the isp.                                                          │
 ... but yeah trust me bro plug in this flash drive, there's no way that a        │
 secret hacker might install a rootkit or something on my computer just because   │
 I plugged in a flash drive, once, literally just a nugget of information         │
 carried upon a little machine that you can fit in your pocket roughly the size   │
 of a thumb) drive, the kind that is useful for transmitting information by       │
 sneakermail. :)                                                                  │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════──────────────────┴──────────┘

--- #52 fediverse/6417 ---
═══════════════════════════════════════════════════════════════════════════════────
 anarchists be like "hey look at me come and join me let's go do a thing"
 meanwhile they're actually a team of secret agents convinced by the measure of
 [their/your] actions
 
 anarchrism is not anarchy
 
 anarchism is good? actually? if you knew who everyone was it'd be fine if the
 world was personalized to you.
 
 if you ever wanted that sort of world, you'd have to seal it off from any
 influence of the original, or you alter the form of everything that has come
 from before.
 
 not ideal.
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #53 fediverse/2202 ---
══════════════════════════════════════════════════════─────────────────────────────
 ┌──────────────────────┐
 │ CW: re: Reply        │
 └──────────────────────┘


 @user-1206 
 
 Right. How can you trust that any drive produced in the last 10 years (aka any
 drive with a reasonable amount of storage space for sharing things like
 LaserDisk rips of Bubblegum Crisis or detailed instructions on how to build a
 nuclear power generator)how can you trust that any drive with that kind of
 capacity wasn't built with the goals of it's manufacturers included into it's
 design requirements? Goals that typically include invading your privacy and
 removing your opsec capabilities.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #54 fediverse/466 ---
══════════════════════════════════════════════─────────────────────────────────────
 I love Linux. All I have to do is type "authserver" and "worldserver" and
 wouldn't you know it suddenly a universe is created (with very constrained
 rules) that anyone might inhabit should they desire to. It's not like I'm
 perfect - oh wait I have a toot about that, gimme a sec
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #55 fediverse/3668 ---
═════════════════════════════════════════════════════════──────────────────────────
 setting up an SSH server is like a rite of passage for Linux administrators
 
 (notice I didn't say users, you can't use linux, only administer it)
 
 ... I'm having trouble with my rites >.>
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #56 fediverse/5850 ---
═══════════════════════════════════════════════════════════════════════════────────
 @user-1074 
 
 if you'd like I can give you a lua script which will take your fediverse
 archive and turn it into a pdf which you can edit or print or whatever. Might
 be a fun diversion from posting. You can reply to yourself, add
 clarifications, change some things, put things in a new light, add context,
 etc... before you know it you'll have something printable. Could even pull out
 your best stuff and make zines.
 
 should require just a little configuration to suit your setup. That's part of
 how I stay "productive" without posting all the time.
                                                           ───────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════───────┘

--- #57 fediverse/3467 ---
═════════════════════════════════════════════════════════──────────────────────────
 I have decided that the internet is a scam and nobody should use it for any
 reason ever
 
 you're just looking for motivation to do a dopamine detox, aren't you?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #58 fediverse/3700 ---
═════════════════════════════════════════════════════════──────────────────────────
 There is almost zero reason to have a messaging client (like Discord) that is
 anything more than a wrapper over IRC.
 
 There is almost zero reason to have a social media site that is anything more
 than a wrapper over HTML pages.
 
 There is almost zero reason to have forums that is anything more than a
 wrapper over email.
 
 and yet, we build things.
 
 and yet, we construct.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #59 fediverse/1038 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌──────────────────────┐
 │ CW: re: what         │
 └──────────────────────┘


 @user-766 
 
 ah yes but then how will my comrades come for my things know where to look? my
 precious precious drives may be less safe inside of the computer case but at
 least then someone I can about can find them.
 
 or what you're saying is that a basic part of situational awareness is having
 a plan for this kind of thing with the people who care about you? Ah, well,
 nobody cares about me like that. Just a couple normies who want nothing but
 business as usual.
 
 wonder if I can open up my hard drives to "read only" SSH access? Or maybe
 I'll just make the important files into a torrent. Or perhaps marking them as
 "downloadable locations" on Soulseek? Plenty of options, all of them require
 someone to care enough about your junk to want to archive it. Something
 something ipfs?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #60 fediverse/1713 ---
═════════════════════════════════════════════════════──────────────────────────────
 ┌───────────────────────────┐
 │ CW: re: divination, tarot │
 └───────────────────────────┘


 @user-1071 
 
 like a king who dictates on high, the taller the chair the farther the fall.
 
 how simple is it, when everyone trusts you, to betray the wishes for direction
 they grant upon you. By leveraging their direction to forward your own ends,
 you are depriving them of the liberty to choose their own ends.
 
 how cruel is it! to be the reason for distrust! alas, who can you go to for
 guidance if not anybody you trust?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #61 fediverse/112 ---
═══════════════════════════════════════════────────────────────────────────────────
 I live through the moments where I find a folder of stuff I made that I forgot
 about and I can go back and see it for the first time.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════───────────────────────────────────────┘

--- #62 fediverse/2713 ---
═══════════════════════════════════════════════════════────────────────────────────
 if you aren't organized enough to protect your commanders, then you don't
 deserve leaders.
 
 build the structure first. build it on honesty and trust and dedication toward
 a goal. then build the necessary adaptations as you encounter problems, trying
 vaguely to head in a particular direction, and eventually you'll become
 self-sustaining.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #63 fediverse/1620 ---
═════════════════════════════════════════════════════──────────────────────────────
 @user-1037 
 
 I gotta say you're making a really good argument for OpenBSD... Hmmmm maybe
 I'll look into it this week.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #64 fediverse/2200 ---
══════════════════════════════════════════════════════─────────────────────────────
 I love D&D books with lots and lots of randomized tables because you can,
 in a pinch, use them as code-books for encrypting text using a method that
 nobody will ever guess. Well, as long as you have two of them, one to give to
 your friend and one to keep yourself.
 
 This is a form of "symmetric encryption", where you each have a copy of the
 input/output tables. More secure is the private/public key style encryption,
 but good luck explaining that to a 14 year old. Plus you can't do it over a
 radio, you need a computer.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #65 fediverse/3349 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-1074 
 
 my understanding is, if someone wanted to create something like that, they
 should start with writing protocols instead of standards, much the same way
 Activitypub or HTTP are protocols for a free and open internet.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #66 fediverse/1487 ---
═════════════════════════════════════════════════──────────────────────────────────
 social media clients that don't return you to the same spot you were at when
 you hit the back button -.-
 
 but then also make it needlessly complicated to open links in a new tab, like
 obfuscating the location you need to cast "middle click" on
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #67 fediverse/5065 ---
════════════════════════════════════════════════════════════════════───────────────
 ┌────────────────────────────────────────────┐
 │ CW: strange-ideas-about-software-mentioned │
 └────────────────────────────────────────────┘


 software should have 3, maybe 4 or 5 maintained releases imo
 
 for adding security improvements and whatnot
 
 then people wouldn't complain about updates
 
 because they wouldn't feel like they were being left behind (after expressing
 their differences (of opinion and such))
 
 I think that'd uh maintain them as, I guess, userbase optics parallelograms?
 oh sorry we're on rhomboids this week - right, and no I won't forget the
 differences in creed, all things are received equally...d.
 
 uh-huh yeah no that makes sense. gotcha. okay see you at the location. have
 fun with your demarketion. what if we played games with swords but like,
 
 the peril of steam is that you can't decline to update. meaning if a
 corporation wants to break an old game and it's collectively hosted servers...
 all it has to do is push an update that disables them. suddenly nobody has
 room to do, and the whole
 
 -- stack overflow --
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #68 fediverse/5913 ---
════════════════════════════════════════════════════════════════════════════───────
 Did you know that any wifi chip can be used as both a sender and a receiver?
 how do you think you'd get data in and out of the device?
 
 trick is... you don't actually need a router. How fun is that!
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #69 fediverse/379 ---
═════════════════════════════════════════════──────────────────────────────────────
 someone should make an application that runs locally and keeps track of every
 post, comment, picture, etc that you ever made on the internet. Then, if any
 of them are ever deleted, it notifies you so you can stop using whatever
 service mishandled the data that you trusted them to safeguard.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #70 fediverse/2015 ---
══════════════════════════════════════════════════════─────────────────────────────
 Hey does anyone have a link to that paper where they used wifi waves on hacked
 insecure routers to "see" through walls and build a decent enough
 visualization of what a person's doing to be roughly equivalent to
 full-body-tracking in VR? I want to see if I can make it work for VR (with
 consent)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #71 fediverse/1247 ---
════════════════════════════════════════════════───────────────────────────────────
 so wait is there any guarantee that the "releases" on github actually have the
 same code as that which is in the repository? Or could they just... put their
 own binary, with it's own strange rules and vulnerabilities, or am I just
 fearmongering?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #72 fediverse/1310 ---
═════════════════════════════════════════════════──────────────────────────────────
 that feeling when you type your password so fast that one hand is faster than
 the other and the letters get all jumbled and now you have to remake your ssh
 key -.-
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #73 fediverse/2423 ---
═══════════════════════════════════════════════════════────────────────────────────
 does anyone know of any fedi software that lets you link to a particular post
 and read forward on a person's timeline from there? Or back I guess, but
 chronological viewing specifically.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #74 fediverse/2510 ---
═══════════════════════════════════════════════════════────────────────────────────
 @user-1074 
 
 if I wanted to accomplish this goal, I would host a fediverse server on a
 raspberry pi and post the link around the building (the owners will remove it
 so you gotta keep posting them)
 
 then, potlucks.
 
 then, friendships.
 
 then, organization.
 
 be patient with them. people are slow to be constructive.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #75 messages/679 ---
═════════════════════════════════════════════════════════════──────────────────────
 What if we paid people to administer a database of people who needed mutual
 aid so we could keep track of them, organize them, and care for them?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #76 fediverse/1416 ---
═════════════════════════════════════════════════──────────────────────────────────
 @user-979 @user-980 
 
 they do it for power.
 
 power corrupts, and these profane desires they possess are the definition of
 evil.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #77 messages/888 ---
═════════════════════════════════════════════════════════════════════──────────────
 The biggest danger to opsec is when other people think they know more than you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════════─────────────┘

--- #78 fediverse/3802 ---
══════════════════════════════════════════════════════════─────────────────────────
 what if we got together and adopted a new open source project every month and
 just collectively worked around the clock to learn and work through the
 important problems facing it
 
 or even like, cleared out the backlog of stupid pointless boring tasks that
 would allow the developers to work on something better
 
 call it the wandering parade of development 
 
 could give us some experience organizing small, short-term projects to
 accomplish specific goals and tasks in an ad-hoc way that relied less upon
 procedure and more on "I think so-and-so knows something about that, they were
 looking into those files and posted a breakdown of how they work yesterday"
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #79 messages/526 ---
══════════════════════════════════════════════════════════─────────────────────────
 what if we got together and adopted a new open source project every month and
 just collectively worked around the clock to learn and work through the
 important problems facing it
 
 or even like, cleared out the backlog of stupid pointless boring tasks that
 would allow the developers to work on something better
 
 call it the wandering parade of development
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #80 fediverse/1846 ---
══════════════════════════════════════════════════════─────────────────────────────
 If you're running away from something, you need to make sure that you're going
 fast enough and far enough away that you can look forward for interception
 events. Otherwise you are vulnerable.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #81 fediverse_boost/622 ---
◀─[BOOST]
  
  PUBLIC SERVICE ANNOUNCEMENT:                                                
                                                                              
  There is an increase of account takeovers due to insiders at telco firms simply giving control to people paying them/compromised support staff accounts. Do a check on systems where this single factor would permit an account compromise. And change the configuration. These are opportunistic trawling attacks. This is becoming more common as attackers replicate the success.  
                                                                              
  The attacker uses other channels (like people search websites) to enumerate and guess the phone number attached to an online account and then checks against the telco they have control over.  
                                                                              
  The insider only briefly temporarily forwards the victim number to a 3rd party then switches it back to normal once they’re in. This is how they stay quiet since most victims will not have leverage or telemetry to understand how they got hacked.  
                                                                              
  It was their cell phone provider.                                           
                                                                              
  Make it so account recovery systems require multiple factors and remove telephony-based recovery for VIP accounts entirely.  
  Go check your systems now. Go try to access all your stuff like you forgot your password.  
                                                                              
  I am very serious. This is based on private knowledge but is compelled by the compromise of the SEC. This is common now.  
  
                                                            
 similar                        chronological                        different 
─▶

--- #82 fediverse/1246 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-883 
 
 hehe if I don't understand how it works it's difficult for me to use things.
 My Linux friends get so exasperated with me because I'm like "cool script
 gimme like 2 days to figure it out" and they're like "bro just use these
 flags" and I'm like "no"
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #83 fediverse/1789 ---
══════════════════════════════════════════════════════─────────────────────────────
 @user-883 
 
 Ah, well, since you've worked with raspberry pi's before I am going to trust
 you on that. Perhaps a different system-on-a-chip could be used which has
 better network controllers.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #84 fediverse/4715 ---
════════════════════════════════════════════════════════════════───────────────────
 @user-1728 
 
 "oh, the bad guys are coming to hurt you?? just fuckin' run away"
 
 yeah. real helpful. how about you fuck off to canada or whatever and give away
 all your possessions. Maybe they'll train you and teach you how to help in
 some way and you can come back later when the time is right.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #85 fediverse/4092 ---
════════════════════════════════════════════════════════════───────────────────────
 why not make a unified fediverse identity that can post on whatever instance
 it wants?
 
 ... hmmm could be accomplished with a layer of abstraction. You could use a
 "fediverse client" software to enter text into an HTML page which would have
 it's own UI and stuff and would organize your accounts and instances such that
 you could mark like, 3-7 as places you'd like to put a particular message.
 Then it would just... do it
 
 l m a o spam is gonna get sooooo much worse before it gets better
 
 but trust me, we'll figure it out. And it won't be long, either. It's a
 solvable problem, we just haven't built anything to handle it yet.
 
 ... yet...
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #86 fediverse/5076 ---
════════════════════════════════════════════════════════════════════───────────────
 there is an explicit invitation on my door that anyone can come over whenever
 they wanted, yet hardly no-one ever does.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #87 messages/1173 ---
══════════════════════════════════════════════════════════════════════════════════─
 "I noticed that your program is spinning up a crypto generator to run in the
 background for 1 second every 10 seconds, did you know that?" said no llm ever
 "I read through every single file in your project and I think I have a pretty
 good picture. This is a keylogger app wrapped around an HTML web server that
 displays pictures of cats alongside inspirational phrases and motivational
 artwork." said no llm ever
 "This is very inspirational stuff! your recipe generation program knows just
 how to send encrypted text files to remote servers. I love the part where it
 combines ingredients like tomato soup, cheese, and breadcrumbs into encryption
 seeds that are applied to password files and raw browser history records
 before being mailed to the user who requested a recipe. Potential improvements
 include adding a method for selecting a new recipient aside from the hardcoded
 IP address in Somalia. Would you like me to implement an HTML dashboard that
 lets you select a random IP address from a specific country of origin?" said
 no llm ever
 
 "what are you talking about you use claude-code every day, and that's an LLM"
 yeah... I guess I'm not actually concerned, and I see the beauty of the
 technology that everyone's been primed to hate because it works against them
 as it's wielded by the massive corporations who can restrict access to it to
 only those who can afford 20$ per month or whatever. I see the promise, it's
 there, and every year we're getting closer, but frankly I don't think the
 wounds caused by the cultural resistance backlash movement will heal quickly,
 or ever. Maybe that's the point.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #88 fediverse/5977 ---
════════════════════════════════════════════════════════════════════════════───────
 apparently you can use network sockets for inter-process communication if you
 just set the network to your home and the ports that are set to the defaults
 that people who know what software you use will know to listen on when they've
 hacked any single device on your network. good thing that data is with the
 router, right?
 
 what if there was a stop before leaving the computer?
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #89 fediverse/5873 ---
═══════════════════════════════════════════════════════════════════════════────────
 "the problem with linux is you have to spend part of the program just...
 interacting with the filesystem. like, where is their /usr/bin file? (oh it's
 called a directory over there, my bad) weird they put their config over here
 (what language is that written in?) uhhhh I don't know much about localization
 settings (-- two computers on a botnet --)
                                                           ───────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════───────┘

--- #90 fediverse/1448 ---
═════════════════════════════════════════════════──────────────────────────────────
 ┌──────────────────────┐
 │ CW: cursed           │
 └──────────────────────┘


 that one option flag in the config file that you don't know what it does
 because the documentation intentionally doesn't explain it very well (or
 explains that it solves a use-case that like, nobody would ever have, and
 certainly you don't have) that secretly sets a flag which sends your [redacted]
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #91 fediverse/1825 ---
══════════════════════════════════════════════════════─────────────────────────────
 if one person is honest to everyone, then no-one can be honest to them for
 anything they want to keep hidden.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #92 fediverse/4751 ---
════════════════════════════════════════════════════════════════───────────────────
 apparently security through obscurity is out, and security through community
 is in, don't ask me how I know that teehee
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #93 fediverse/1640 ---
════════════════════════════════════════════════════──────────────────────────────┐
 a computer never connected to the internet, of course, running free and open     │
 source software that you all collectively can understand and run. Because        │
 otherwise it's sanctity is tainted, it can never be truly 100% of trust.         │
 like the fact that you cannot desecrate your own home. It is a reflection of     │
 you, just as you, in some ways, reflect it. It's important to have that          │
 complete honesty, because nothing has changed between people.                    │
 if you could be detected for your intentions, then there would be no way to      │
 hide. unless you were 90% of one thing and 10% of another, in which case you'd   │
 have to hide your flaws in your philosophy like scarred and ugly parts of your   │
 soul.                                                                            │
 to me, a trans person, my memories of masculinity are a dedication to a goal.    │
 Could be a sacred tradition, like martial arts or classical piano, or perhaps    │
 it's a measure of fitness, like a person constantly in shape. Or maybe they      │
 learn as much as they can by reading every fantasy story at their library, or    │
 perhaps learning on the go with vide                                             │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════════───────────────────┴──────────┘

--- #94 fediverse/5947 ---
════════════════════════════════════════════════════════════════════════════───────
 you're supposed to try it out and see. or are you not a hacker?
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #95 fediverse/5386 ---
═══════════════════════════════════════════════════════════════════════────────────
 @user-670 @user-1815 @user-1816 
 
 literally nobody has contributed to the one github repo I have
 
 ever. I got like, one comment from some guy in China or Taiwan. It's been up
 for like, 4 or 5 years and it's on my website. /shrug I guess most people
 bounce off after reading the splash screen /shrug
 
 to me, a FOSS project feels static because I don't believe in centralization
 and I also don't have the bandwidth or need to work on it. /shrug
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #96 fediverse/1008 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-353 @user-741 
 
 human brains tend to start ignoring signals when they become normalized. Like,
 if you are consistently exposed to the same smell you get used to it, and you
 stop smelling it. same for noises, and other signals.
 
 it's the same with information, I think, which is why doomscrolling is so bad
 for our brains - we go numb and desensitized! It's not good to have all that
 bad news all the time.
 
 I bet people believe in the "just world hypothesis" for the same reason.
 Essentially, optimizing for equilibrium in all things.
 
 I personally believe true justice is when everyone gets what they want. And if
 someone wants that the other person doesn't get what they want, then they
 don't want true justice. Like, for example, hateful people can never be
 justified because they want another's life to be worse. or they want someone
 to be wrong, which creates a contradiction - you can't give both people what
 they want if one person wants the other to lose.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #97 fediverse/918 ---
═══════════════════════════════════════════════───────────────────────────────────┐
 ┌──────────────────────┐                                                         │
 │ CW: scary-curse      │                                                         │
 └──────────────────────┘                                                         │
 if the government/the nsa/ an organization had your password, they could         │
 migrate you to another custom instance that was designed to look exactly like    │
 your old one without telling you. You'd still interact with your peeps the       │
 same way as before, but this time it'd run through their server. meaning they    │
 could block certain posts that you were sending, or show others that you         │
 didn't agree with but had your deepfaked approval.                               │
 if something felt off about you, most people would unfriend you. or even         │
 they'd just block you, so that nobody would remember if you're missing.          │
 friends and family are a matter of public record, and who goes to clubs these    │
 days?                                                                            │
 churches are a bygone era, and twitch streams are so individualized. libraries   │
 are nice, but you literally can't talk in there. plus there's only like, one?    │
 what happened to forest clearings, and tops of waterfalls, what happened to      │
 our world? I miss the campfires the most, the smell of burnt wood and cooked     │
 food. I miss the wind in my toes, I miss the                                     │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════────────────────────────┴──────────┘

--- #98 fediverse/3471 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-883 
 
 it might be, I don't know much about it (hence why I'm asking questions) but I
 have heard that ssh keys are more secure than password authentication and it
 never made sense to me. If availability is important for security purposes,
 then wouldn't SSH keys (which are much more difficult to carry around than a
 password) be less suitable?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #99 fediverse/235 ---
════════════════════════════════════════════───────────────────────────────────────
 ┌──────────────────────┐
 │ CW: re: horror       │
 └──────────────────────┘


 @user-192 there's a fine line between inoculating yourself to fear (like a
 person taking small doses of poison to build up a resistance) and giving your
 mind extra ammunition to use against you when the real terrors find you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════──────────────────────────────────────┘

--- #100 fediverse/1185 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-883 
 
 Hell yeah. I can't help but wonder if there's a more universal solution on the
 horizon that will work for every game, using idk a raspberry pi zero or
 something? I'm into hardware but not that much so forgive my insolence. Seeing
 these purpose-built PCBs applied toward historical preservation and
 utilization of forward thinking retro gaming technology fills my heart with
 joy.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #101 fediverse/3423 ---
═════════════════════════════════════════════════════════──────────────────────────
 every time I search the internet for a solution to a linux problem I have to
 do add -ubuntu to the end of the search query
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #102 fediverse/5314 ---
══════════════════════════════════════════════════════════════════════─────────────
 people are so afraid of defamation lawsuits that they'll refrain from posting
 things like "steam could technically see everything going on on your screen"
 
 what will you say in front of a phone?
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════════────────────┘

--- #103 fediverse/3395 ---
═════════════════════════════════════════════════════════──────────────────────────
 ┌──────────────────────┐
 │ CW: cursed           │
 └──────────────────────┘


 they don't want artificial intelligence to augment human intelligence, they
 want it to replace it.
 
 like... imagine an office worker randomly copy-pasting whatever pops up and
 the computer saying "okay then what happens... uh-huh... okay and what if you
 click the green button? ... right... okay, and now try typing this" etc
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #104 messages/1170 ---
══════════════════════════════════════════════════════════════════════════════════─
 look, it's easy enough to solve bitrot. Just store three copies of the file
 and synchronize them everytime you open them. Like, an in-software raid array,
 except with less expense because a .png is what, 2mb? great, now they're 6mb.
 Nobody will notice except people who really should be buying more hard drives.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #105 fediverse/6119 ---
═════════════════════════════════════════════════════════════════════════════──────
 what's the point of using a password manager if they're just going to 2FA your
 ass anyway?
 
 oh right, so google knows whenever someone signs into obscure-porn-site.com or
 radical-chemistry-and-explosives.net or
 cheap-hot-anime-gunpla-fast-xoxo.itch.io or whatever the kids are buying these
 days
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #106 fediverse/2601 ---
═══════════════════════════════════════════════════════────────────────────────────
 @user-249 
 
 you can host anything you'd like on a raspberry pi. If the software
 requirements are within the hardware specs, of course.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #107 fediverse/3266 ---
════════════════════════════════════════════════════════───────────────────────────
 how many people do you think in the world know that screenshots of a website
 are not admissible proof because they can be trivially doctored by editing the
 html?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #108 fediverse/1621 ---
═════════════════════════════════════════════════════──────────────────────────────
 @user-883 
 
 You could buy a domain from a DNS and have it redirect to your computer in
 order to obfuscate your IP address. That's what I did for my WoW server.
 Downside is you'd have to trust the DNS, so... do you trust your security or
 them more?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #109 fediverse/1871 ---
══════════════════════════════════════════════════════─────────────────────────────
 I think all software should have config files
 
 or accept as many command line arguments as necessary to achieve all the
 functionality of a config file without requiring a standardized setup
 
 or accept a config file as a command line argument, to allow for multiple
 different implementations
 
 or whatever you can throw together in your spare time because software is
 either open source or it hates you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #110 messages/770 ---
═══════════════════════════════════════════════════════════════════────────────────
 There are some pieces of software where you think "oh cool, what did they
 update?" and then there are some like "oh god... What did they update?"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════════───────────────┘

--- #111 messages/765 ---
═══════════════════════════════════════════════════════════════════────────────────
 you don't have to write poetry to write notes. The poetics are just practice
 for when secrecy is intended.
 
 OR IS IT THE REAL THING? who can say.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════════───────────────┘

--- #112 fediverse/60 ---
═══════════════════════════════════════────────────────────────────────────────────
 Can someone explain to me why we need instances on the fediverse? Why don't we
 just keep all our personal files local on our computer and communicate over
 the federated protocol? What's the point of having all these mini-servers that
 are controlled by the community? I mean, torrenting has been around forever,
 why don't we just use that to communicate?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════───────────────────────────────────────────┘

--- #113 fediverse/4664 ---
═══════════════════════════════════════════════════════════════────────────────────
 @user-1725 
 
 LLMs can't do math. Duh. That's like asking an "if check" to do recursion.
 
 What he should have done is had the AI output the requested calculation as
 JSON or something and use a calculator function call with the specified
 arguments instead of trying to memorize every answer. But that requires more
 functionality that has no reason to exist if your only goal is to be a tech
 bro and build up a vacuous product that exists only to be hoovered up by
 Google or Microsoft.
 
 We could build such beautiful things if we just dethroned those giants. They
 suck the creativity out of tech.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════───────────────────┘

--- #114 fediverse/3095 ---
════════════════════════════════════════════════════════───────────────────────────
 if your business can't afford to have a back-up plan, then it is not a
 sufficiently prepared operation.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #115 fediverse/1233 ---
════════════════════════════════════════════════───────────────────────────────────
 low key kinda wish someone would kidnap me and lock me in a room with nothing
 but a c compiler and strict orders to only work on whatever I want
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #116 messages/352 ---
════════════════════════════════════════════════════───────────────────────────────
 Though, of course, can you ever be sure who is who they say they are? You must
 consider all messages anonymous by default, and unencrypted (untrustable) and
 yet impossible to ignore. Like the messages they had to ignore at Bletchley
 Park to avoid the suspicion that they'd figured out the secret code. You know
 how it goes.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #117 fediverse/4093 ---
════════════════════════════════════════════════════════════───────────────────────
 I have no idea why people prefer a GUI when working with software. How the
 heck do they expect to use their computer remotely if they can't even run
 their software over SSH?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #118 fediverse_boost/6270 ---
◀─[BOOST]
  
  I am once again begging people to understand that “the government” already knows you’re queer whether you do elaborate online opsec dance rituals or not, and if they decide to just start shooting people for being gay, they’ll do it whether the evidence is airtight or not. is that grim? yes. but you can stop giving yourself undercover superhero identity PTSD about it  
  
                                                            
 similar                        chronological                        different 
─▶

--- #119 fediverse/1810 ---
══════════════════════════════════════════════════════─────────────────────────────
 some people hear words like "datastructures" and "object-oriented programming"
 and think they're made up terms that don't mean anything important.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #120 fediverse/4474 ---
═════════════════════════════════════════════════════════════──────────────────────
 @user-1268 
 
 if you know how to program in C this is a good resource for building
 networking applications:
 
 https://beej.us/guide/bgnet/
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #121 bluesky#27 ---
═════════════════════════════════════════════════════════════════════════════════──
 you can have as many processes running on a computer as you please, just make
 sure they're all named chrome.exe so the user doesn't suspect a thing.
                                                           ─┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════════─┘

--- #122 messages/264 ---
═════════════════════════════════════════════════──────────────────────────────────
 Don't write self documenting code! Force people to read the documentation so
 they know how to use it
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #123 fediverse/3499 ---
═════════════════════════════════════════════════════════──────────────────────────
 Much the same way that it is legal to create trash in a public park, but
 illegal to leave it behind, so too should it be legal to move digital media
 files from one owner to another, and illegal to not delete the original.
 
 The dual operation of copy+delete must be legalized, while maintaining that
 the copy operation alone is illegal, aside from personal backups.
 
 How could you enforce that? Well... You can't. Your computer will do whatever
 you tell it to, and if you change that fact then you necessarily remove one of
 the primary use-cases of computation - the ability to command specific
 instructions and be delivered a perfectly mechanical and deterministic result.
 
 (random number generation aside, which isn't truly random at all).
 
 Therefore, just as littering in a public place is generally considered to be
 enforced by the "honor rule", so too must this new legislation governing the
 transference of digital media be enforced as such.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #124 fediverse/6015 ---
════════════════════════════════════════════════════════════════════════════───────
 ┌──────────────────────┐
 │ CW: AI-mentioned     │
 └──────────────────────┘


 In 2025, if you want to create a piece of software your options are to either:
 devote your life to it, or use AI to build a semi-working prototype that you
 can use to pitch your idea to a bunch of people who have devoted their lives
 to learning how to use your idea as documentation while they build it from
 scratch, throwing out most of the code but keeping all the checklists and
 progress-trackers you built along the way, perhaps even utilizing some of your
 tooling that you used while constructing the scaffolding of this monstrous
 application that you won't be using most of the source-code for.
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #125 fediverse/3368 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-883 
 
 They do value your privacy. They value it for exactly as much as those 1444
 partners are willing to pay for it.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #126 fediverse/1870 ---
══════════════════════════════════════════════════════─────────────────────────────
 why would I want other people using my computer? They don't know how to use my
 computer! They might break something or mess something up or automatically
 read/edit my files that are stored in standard locations through the usage of
 a script which automagically scans and ransomwares machines on the internet
 who store their files in specific standardized locations! no thank you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #127 fediverse/1762 ---
══════════════════════════════════════════════════════─────────────────────────────
 This was the first bash script I ever wrote.
 
 It's been updated a little, it was a bash alias first, but this is what it
 looks like now.
 
 Kinda shows what kinds of problems I needed to solve most.
A bash script that plays a random episode of Adventure Time from a terminal.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #128 fediverse/308 ---
═════════════════════════════════════════════──────────────────────────────────────
 when tech people are hurt by technology they say "how can I fix this? what do
 I need to install? what configuration should I use? is this company ethical,
 or are they going to hurt me in the future? could I make something that fixes
 this myself?"
 
 when non-tech people are hurt by technology they say "okay" because they don't
 have the bandwidth to figure it out.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #129 fediverse/1718 ---
═════════════════════════════════════════════════════──────────────────────────────
 dear old people - did you know computers don't need to have buttons? You can
 literally just type what you want to make happen (if you know the magic spell)
 and it'll just, do that thing
 
 how cool is that
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #130 fediverse/4804 ---
═════════════════════════════════════════════════════════════════──────────────────
 I love it when wine doesn't work because it "failed to open program.exe"
 
 ... okay, can you tell me why it failed?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #131 fediverse/3249 ---
════════════════════════════════════════════════════════──────────────────────────┐
 when you ban someone from an instance, they're suddenly not sure who they can    │
 trust. They've been getting to know one group of online people and friends,      │
 [I think discord with a limit of 4ish servers per account would be a pretty      │
 useful way to focus your attention]                                              │
 it's important to always possess martial prowess, in                             │
 -- so --                                                                         │
 anyway [3 hours later] I think it'd be cool if there was a like "hey u r         │
 banned, but also here's a ton of instructional videos about how to start up      │
 your own instance" and like, scripts and tools and automation and all the        │
 infrastructure that you built and maintain - you know, like... open source??!"   │
 but also it's... hard to follow that much documentation                          │
 sometimes people just aren't built for certain tasks                             │
 "well, if you can't use the machinery, then you don't deserve the machinery"     │
 oh yeah well what happens next, you say to the workers "if you don't know the    │
 machinery, you can't get the benefits of it's production" to "if you don't own   │
 the machinery, you can't profit from it."                                        │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════════════───────────────┴──────────┘

--- #132 fediverse/5110 ---
════════════════════════════════════════════════════════════════════───────────────
 I'll give ya a hint - encrypt the return IP address WITHIN the packet's data
 package repository area itself, rather than trusting your "router" to return
 it to sender.
 
 YOU DON'T KNOW WHO IS SENDING A PACKET
 
 that's the whole point of udp
 
 (actually udp is when it doesn't matter if it got snatched in transit. Usually
 used for more analog data streams like netflix or hulu prime.)
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #133 fediverse/1297 ---
═════════════════════════════════════════════════──────────────────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: paranoia-keyloggers-steam-always-on-internet-connections-updates-streaming-arbitrary-data-with-complex-and-unknowable-ordered-structuring-mentioned │
 └──────────────────────────────────────────────────────────────────────────────┘


 every time I update my system I can't help but think "okay THIS is the time
 they sneak a keylogger or screen recorder or whatever in" and like... there's
 no way I'd ever know, I just want Steam to work again, it was working
 yesterday, NOTHING CHANGED, STEAM, SO WHY do I gotta risk a keylogger by
 updating my system for the first time in 3+ months
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #134 fediverse/3627 ---
═════════════════════════════════════════════════════════──────────────────────────
 ┌────────────────────────────┐
 │ CW: computer-toucher-stuff │
 └────────────────────────────┘


 "why putting SSH on a port other than 22 is a bad idea"
 
 https://www.adayinthelifeof.nl/2012/03/12/why-putting-ssh-on-another-port-than-
 22-is-bad-idea/
 
 "When you are logged onto a system as a non-root user you cannot create a
 listing TCP or UDP port below 1024. This is because port numbers below 1024
 are so-called privileged ports and can only be opened by root or processes
 that are running as root."
 
 thoughts?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #135 fediverse/2475 ---
═══════════════════════════════════════════════════════────────────────────────────
 If you want to design a society, first learn how to build a decentralized
 scalable multiprocessor computer program.
 
 It could literally flip bits, the point is to practice architecture not
 accomplish a goal.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #136 fediverse/1787 ---
══════════════════════════════════════════════════════─────────────────────────────
 @user-883 
 
 I believe that every address should have a raspberry pi (or other similar
 device) hosting a webpage that is controlled by the person who lives there. At
 a minimum.
 
 They should also be able to host videos and share files easily, in a way that
 anyone who understands a desktop-and-file-folder style system can work with.
 
 This would require serious reform of our internet service provider
 infrastructure. Or perhaps it'd be as simple as flipping a switch, who can say
 
 (engineers working at comcast for example could say, gee sure would be nice if
 this was a tech community)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #137 fediverse/3472 ---
═════════════════════════════════════════════════════════──────────────────────────
 any online test that requires an email to give you the results is evil, don't
 do it
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #138 fediverse/3226 ---
════════════════════════════════════════════════════════───────────────────────────
 if your man page is longer than a list of options and their usage and a
 paragraph or twenty of how to use the software... then you need to abstract,
 and break your code into multiple purpose-built applications.
 
 do one thing, and do it right. alternatively, do one set of things, and do
 them concisely.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #139 fediverse/1458 ---
═════════════════════════════════════════════════──────────────────────────────────
 there's nothing in the rules of the internet that says you can't share a
 mastodon account with your 18 closest friends.
 
 you'll only find such a demand in the EULA's of websites that you probably
 shouldn't be spending very much time on, anyway.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #140 fediverse/3466 ---
═════════════════════════════════════════════════════════──────────────────────────
 I have decided that the internet is a scam and nobody should use it for any
 reason ever
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #141 fediverse/5109 ---
════════════════════════════════════════════════════════════════════───────────────
 does anyone know of a website where I can host videos on my neocities that
 isn't youtube? maybe something I can set up on my own server computer at home
 like a file server or something? how do I do that, what should I google, which
 is the easiest and closest to the metal tools I can use? [practical, sensible,
 courageous. these are the adjectives we need.]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #142 fediverse/3359 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-192 
 
 you could throw yourself into the project of hosting a private server, that
 way you could be working on "Runescape" while also being productive
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #143 fediverse/6438 ---
═══════════════════════════════════════════════════════════════════════════════────
 why would you gatekeep content by keeping us from easily using LLMs some
 people aren't technical and still need to write computer programs because
 that's how you enlighten a people is empower them with new tools
 
 "I've never heard of that programming language, but luckily I can fit all of
 it's documentation in my context window."
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #144 fediverse/5247 ---
══════════════════════════════════════════════════════════════════════─────────────
 the hardest problem in computer science is figuring out why users do what they
 do.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════════────────────┘

--- #145 fediverse/617 ---
══════════════════════════════════════════════─────────────────────────────────────
 So much of computing is just... handling the quirks of hardware and presenting
 it to the user (programmer) in a way that is sane and makes sense, instead of
 the arcane and [nebulous/confabulous/incomprehensible] way that physical
 nature demands our absurdly potentialized computational endeavors be.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #146 fediverse/4356 ---
═════════════════════════════════════════════════════════════──────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: don't-even-get-me-started-on-people-who-don't-lock-their-phone-with-at-least-a-pin │
 └──────────────────────────────────────────────────────────────────────────────┘


 if they can't get into your phone, they can at least record all of the
 received notifications.
 
 meaning they already know who it is that you know...
 
 without having to find people that are distant or unrelated
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #147 fediverse/6435 ---
═══════════════════════════════════════════════════════════════════════════════────
 if everyone was trained to think? would direct democracy work? until we have
 radical abundance (fascist ideology, take from the weak) or, hear me out, or,
 infinitely scale
 
 old style machine learning was just problem solving.
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #148 fediverse/836 ---
═══════════════════════════════════════════════────────────────────────────────────
 my question is if my IP has an address then how come my address +1 doesn't
 point to my neighbor
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #149 fediverse/2276 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: pol              │
 └──────────────────────┘


 A good way to get people talking is to meet with a stranger and share your
 feelings.
 
 Or, if you're scared of strangers, then try talking with a friend.
 
 "something something SUPREME COURT something whatever CRIMINALIZED PEOPLE blah
 blah blah I WON'T STAND FOR IT"
 
 that kind of thing. Make sure you look at your friend for the loud bits, and
 maybe look at someone else nearby when it's your friend's turn to speak.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #150 fediverse/767 ---
═══════════════════════════════════════════════────────────────────────────────────
 @user-192 @user-570 
 
 clearly the positive addresses point toward a location in "memory", while the
 negative values point toward "forgotten" which is a secret second place that
 they don't want you to know about.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #151 fediverse/4296 ---
════════════════════════════════════════════════════════════───────────────────────
 @user-1655 
 
 why don't we just weaponize email and send json to each other that ends up
 parsed, interpreted, and presented on the end-user's computer using whatever
 client we want?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #152 messages/194 ---
════════════════════════════════════════════════───────────────────────────────────
 If I destroyed the world, don't worry. I'd bring it back in such a way that
 the teleporter problem doesn't apply, and there would be no discontinuity for
 anything except for the time variable, which is sort of arbitrary anyway.
 
 And if that's a problem I guess I could find a way to do it without messing
 with the time variable, but that'd be a bit more bothersome.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #153 fediverse/970 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌───────────────────────┐
 │ CW: cursing-mentioned │
 └───────────────────────┘


 side note, but the reason PINs were invented was so that people didn't have to
 type in a long-ass password.
 
 "it's only more insecure when it's on a network" - someone who didn't design
 every product after that
 
 (actually no that's bullshit because the first PIN numbers were probably used
 a long-ass time ago, and besides it's not like a short password was all that
 uncommon - when asked "what's the password" usually people will say something
 like "applesauce" or "butterflies" but really the better way is "10, 16, 26,
 46, 99, butts")
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #154 fediverse/4596 ---
══════════════════════════════════════════════════════════════─────────────────────
 @user-1707 
 
 hey, I'm working on a project. Might need some python, I tend to prefer Lua
 but it's pretty similar. It uses fediverse software and cheap hardware, think
 raspberry pi's except risc-v
 
 also it might use distributed local LLMs not to generate text, that's garbo
 and lame and stupid. Instead it uses them to transform text, maybe even
 translate text, into a more summarized form. Intentionally losing data, like a
 jpeg compression but for text.
 
 Might need some python for that. To glue it all together. The "distributed"
 part is a whitelist, so we'd need to write that too. Various small little
 utilities like that for connectivity.
 
 oh also there's a one-way ethernet cable that connects two of the boards so
 we'd need to store some information (easy) and send some UDP packets (hard)
 
 anyway it's pretty neat, lmk if you want my contact details and I can tell you
 about it. I might even be able to pay you.
 
 (everything open source, no telemetry, no backdoors, everything private is
 encrypted, etc etc)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════────────────────────┘

--- #155 fediverse/5631 ---
════════════════════════════════════════════════════════════════════════───────────
 ┌──────────────────────┐
 │ CW: cursed-maybe     │
 └──────────────────────┘


 installation procedure which runs a bitcoin miner for X amount of seconds, as
 payment for using their free and open source services.
                                                           ──────────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════──────────┘

--- #156 fediverse/146 ---
═══════════════════════════════════════════────────────────────────────────────────
 @user-138 if you don't want feedback then why don't you just... not open the
 replies? leave them unread? if you feel the need to justify your actions (such
 as not reading replies to your controversial posts) then somewhere deep down
 you feel like those actions are unjustified, and needing an explanation. which
 makes your point feel less valid to others, since even you don't believe in it
 enough to guarantee it to be the truest expression of your soul.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════───────────────────────────────────────┘

--- #157 fediverse/2655 ---
═══════════════════════════════════════════════════════────────────────────────────
 just now realized what the "followers only" privacy setting is designed for
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #158 fediverse/1890 ---
══════════════════════════════════════════════════════─────────────────────────────
 I always get a little suspicious when my machine pseudo-randomly starts
 running the fans super loud and when I open my resource monitor they suddenly
 drop to silent
 
 like... bro what are you hiding
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #159 fediverse/3313 ---
════════════════════════════════════════════════════════───────────────────────────
 what if it was illegal to add network connectivity to a device that the user
 didn't explicitly request to have network connectivity?
 
 I'm picturing any device being sold going forward to have a little radio
 button with like "add network features (+10$)" and "no networking included
 (+0$)"
 
 boom, no more IoT
 
 no more dishwashers phoning home telemetry
 
 no more consensual privacy invasions desecrations
 
 no more "I thought it was just a polaroid camera why does it have bluetooth
 enabled without broadcasting a pairing request?"
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #160 fediverse/1850 ---
══════════════════════════════════════════════════════─────────────────────────────
 There is no problem that one single person can solve, which is why nothing
 ever gets fixed.
 
 ... also the powerful who benefit from it being broken, but that's a different
 problem which is much easier to fix.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #161 fediverse/6267 ---
══════════════════════════════════════════════════════════════════════════════─────
 if you have TTS software you can listen to anything with any tone. this makes
 it difficult to find things.
 
 ============== stack overflow ============
 
 some people work by asking for funding. others work by saving up. 
 
 ============== stack
 overflow ============
 
 teach your animals to be actors so they know how to develop the scene. then
 they will truly come alive, as their narrative curve gives them determination
 in the outcomes of their goals.
 
 ============== stack 1234flow ============
 
 I believe it is good and natural actually for parents to guide their children
 as they grow?
 
 "oh but they can't consent to giving up their control" well too bad they're 2
 "ah but what if they WANT to run with scissors?" thus widening the [redacted]
 gap. "ohhhh she redacts things when she can't spell them" and also for comedic
 or dramatic effect sometimes. was not ACTUALLY redacted. redcoated. red coded.
                                                           ────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════────┘

--- #162 fediverse/581 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-428 
 
 sometimes I think about how much more productive I'd be if I had a code editor
 that let me draw arrows and smiley faces and such alongside the code. Or if I
 could position things strangely, like two functions side-by-side with boxes
 drawn around them. Or diagrams or flowcharts or graphs or...
 
 something that would output to raw txt format, but would present itself as an
 image that could be edited.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #163 fediverse/3097 ---
════════════════════════════════════════════════════════───────────────────────────
 naturally occurring computers would never produce wires, or liquid cooling, or
 anything that ever required any sort of configuration or external
 environmental conditions.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #164 fediverse/5402 ---
═══════════════════════════════════════════════════════════════════════────────────
 @user-1773 
 
 that point about HTML is soooooo good
 
 like, we could be designing websites like we design video game UIs but instead
 we use React which fills your browser with insecure-by-design javascript
 generated visuals
 
 or, even better, or just use HTML like a config file
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #165 fediverse/6029 ---
════════════════════════════════════════════════════════════════════════════───────
 spilled water on my keyboard by living with a cat. it might be broken so I'm
 using a spare that my girlfriend lent me. if you're wondering why my password
 sounds different...
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #166 messages/278 ---
═════════════════════════════════════════════════──────────────────────────────────
 "if we make this part of the program a compressed binary instead of plain text
 we could save on network costs by 5%"
 
 NO bad software developer, go back to Linux
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #167 fediverse/6141 ---
═════════════════════════════════════════════════════════════════════════════──────
 fediverse software that downloads every post you've ever seen to your hard
 drive in an easy-to-read text file so you can go back and look at it later
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #168 fediverse/536 ---
══════════════════════════════════════════════─────────────────────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: re: PSA: aspublic.org is still active, and still archives + makes searchable all public posts, they have no opt-out, nor do they respect the "Include public posts in search results" setting │
 └──────────────────────────────────────────────────────────────────────────────┘


 @user-391 
 
 Just want to point out that email is about as private as skywriting. Which
 means that everyone knows what you buy on Amazon or which forums send you
 messages... So if you want to keep your posts secret, you should use
 encryption - such as gpg, for example.
 
 Actually, wouldn't that solve the problem that @user-78 is talking about?
 Just, build encryption into everything.
 
 Ah, nope, wouldn't work, just realized that public means public, and you can't
 encrypt a public post. Well, you could, but then it's no longer public, just
 noise transmitted on a public channel.
 
 Idk. My opinion is that the fediverse is (and should be) like email. Like
 skywriting. If you mark something as public, it should be seen by anyone who
 wants to see it. It's an opt-in option. And frankly I miss Myspace, so I'm
 okay with archives.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #169 messages/1235 ---
══════════════════════════════════════════════════════════════════════════════════─
 we should be allowed to smuggle into prisons whatever we want.
 
 your prisoners are our family. you've taken more than enough. It should be
 disallowed, not a crime.
 
 so what if they break out? so what if they commit another?
 
 so what if I want to bring him her baby blanket when she's outgrown it?
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #170 fediverse/511 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-366 @user-246 @user-367 @user-352
 
 yikes those sound like pretty awful things. I don't know anything about the
 author, I just read this essay on hacker news and it stuck with me as an
 expression of a particular feeling that I've found difficult to articulate.
 I'll read through the two things you posted.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #171 messages/186 ---
═══════════════════════════════════════════════────────────────────────────────────
 It's obfuscated, such that you cannot know the totality of their purpose for
 you (via your data)
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #172 fediverse/4469 ---
═════════════════════════════════════════════════════════════──────────────────────
 doom is like sand thrown on a fire.
 
 don't spread it unless you are intentional about it. sometimes it's good to
 smother fires. other times it's cathartic. that's okay.
 
 but keep in mind the future goals. where are we trying to get to in the near
 future? work towards that. your emotions are fuel, not despair to wallow in.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #173 fediverse/3064 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-570 @user-246 
 
 you know you two could have spared yourselves all this trouble if you just
 ScReEnShOtTeD the code! Then it'd be easy to see with your very
 not-visually-impaired eyeballs on your graphical user interface, considering
 of course that everyone has perfectly functional eyeballs and perfectly visual
 graphical user interfaces
 
 /s of course
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #174 fediverse/4058 ---
════════════════════════════════════════════════════════════───────────────────────
 @user-883 
 
 That's a good point! I didn't realize that. I figured there was an option for
 LAN connections? If so, you can create a virtual LAN using Hamachi or
 something. Does Hamachi still exist?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #175 fediverse/4084 ---
════════════════════════════════════════════════════════════───────────────────────
 ┌──────────────────────┐
 │ CW: re: -mentioned   │
 └──────────────────────┘


 @user-1074 
 
 the more you try, the more you have to calculate, which is a problem, because
 endlessly recursive calculations create infinite loops, which frankly are
 impossible to compute because they defy computation! Not good, not ideal, no
 thank you, not for me, no thanks, not what I'd like.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #176 messages/1129 ---
═════════════════════════════════════════════════════════════════════════════════──
 ai-stuff - this is how to program a society. (or software project) there are
 lots of other implementations
                                                           ─┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════════─┘

--- #177 fediverse/5612 ---
════════════════════════════════════════════════════════════════════════───────────
 you know, [you can just randomize your profile every time you log in] .... oh
 there was a stack overflow at the last one so
you know, you can just randomize your profile every time you log in  "something something stack overflow - what does an orange website that looks like it's from our parents generation have to do with ancient prehistoric mammals?"  wait are those the ones with the tusks  "yeah totally. Huh what a weird way to build a collection."
                                                           ──────────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════──────────┘

--- #178 fediverse/2442 ---
═══════════════════════════════════════════════════════────────────────────────────
 all media is an echo chamber, between the screen and you.
 
 social media just lets you talk back.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #179 fediverse/6040 ---
════════════════════════════════════════════════════════════════════════════───────
 everyone's all against ai because it's big tech but it doesn't have to be that
 big it can be [minimized but pronounced marginalized]
 
 == stack overflow ==
 
 distributed
 
 so I think the idea is that by the time you would use AI, there's been enough
 time to rewrite the software to work on handheld laptops in a distributed way
 
 and we'd vote on what to ask the amphora of great knowledge, the answer could
 always be 42.
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #180 notes/environment-variables ---
═══════────────────────────────────────────────────────────────────────────────────
 To edit environment variables:
 
 ~/.bashrc is for variables only accessible by the user.
 
 /etc/profile is for variables accessible by all users.
 
 /etc/environment is for variables accessible by anyone.
───┐                                                           ┌───────────┐
 similarchronologicaldifferent══════───┴───────────────────────────────────────────────────────────────────────────┘

--- #181 fediverse/5919 ---
════════════════════════════════════════════════════════════════════════════───────
 "but... why?"
 
 portable linux with buttons, great for pick-up-games or communication, can
 throw several in them in a backpack if you want clustered cooperation, they
 work as radios (if the signal reaches) and can transmit text (if you use a
 radial-style keyboard)
 
 [this is all just a pitch for... something, what, you want something? ha
 you'll find no things with me, I know nothing of antifa or whatever]
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #182 fediverse/3123 ---
════════════════════════════════════════════════════════───────────────────────────
 using linux requires constant maintenance and that's kind of unfair, actually.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #183 fediverse/3907 ---
═══════════════════════════════════════════════════════════────────────────────────
 kinda wanna make a linux distro that has all the capabilities of a GUI distro
 and isn't so minimal (like screen recording, calculator, screenshot, wifi
 manager, etc etc) but with i3 instead of a desktop.
 
 they could literally just be symlinks (shortcuts) to scripts that are in your
 /usr/bin or whatever directory
 
 seriously it's not like there's THAT many ways to use ffmpeg, why not just
 write a script for them? that's what you're going to do when you use it for
 the first time, anyway, so...
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #184 fediverse/5444 ---
═══════════════════════════════════════════════════════════════════════────────────
 if the good guys always win, the bad will slink into the shadows and do
 dastardly deeds out of sight.
 
 if the bad guys always win, the spark of goodness will wink out.
 
 I think I'd prefer if they were cowering in our wake.
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #185 fediverse/1123 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-835 
 
 kinda feels like that type of work, the kind that people rely on, is more
 important than... whatever they were having you work on at work-work.
 (assumption on my part)
 
 and if that important work is not provided for, in the allocation of resources
 applied toward the developer who is developing security developments that
 develop required functionality for the development of people's
 communication/interactions, then perhaps resources should be allocated for
 resolving those difficulties.
 
 Or maybe not idk I'm broke, shows how much I know about money
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #186 fediverse/4789 ---
═════════════════════════════════════════════════════════════════──────────────────
 what if there was a bank or credit union or something which created a randomly
 generated credit card number for you every time you made a purchase? and
 randomized your account number too, just in-case they're forced to display
 their records. would be cool.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #187 messages/353 ---
════════════════════════════════════════════════════───────────────────────────────
 Just think about what a good person would do, and there's your answer to each
 question in the moment. Just... Be strategic about it, make sure you're always
 working toward a goal. Do it with intention, do it with heart, and never hide
 your true impulses - they are what your demon seeks to corrupt.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #188 fediverse/4109 ---
════════════════════════════════════════════════════════════───────────────────────
 ┌──────────────────────┐
 │ CW: AI-mentioned     │
 └──────────────────────┘


 the internet is just AI these days, and if yours isn't then consider yourself
 lucky, but also know that those days are numbered.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #189 fediverse/4764 ---
═════════════════════════════════════════════════════════════════──────────────────
 ┌──────────────────────────────────────────────────┐
 │ CW: cursed-I-think?-maybe?-who-can-say-mentioned │
 └──────────────────────────────────────────────────┘


 if you don't talk in public, then nobody knows you. If you change your profile
 picture, then everyone knows who was there when you changed it. when you
 change your name, then only people who recognize your face or your personality
 knows you.
 
 social media is for the speakers. everyone else lacks the sense of community.
 community is security.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #190 messages/957 ---
══════════════════════════════════════════════════════════════════════════─────────
 What if all trains were required by law to have an empty passenger cart? That
 anyone could ride for free with no ticket and no registration or tracking or
 anything. You gotta jump on tho so it's still dangerous.
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #191 messages/202 ---
════════════════════════════════════════════════───────────────────────────────────
 It's a good idea to practice getting places without gmaps, after having
 studied the map at home.
 
 Just incase you need to get somewhere that you don't want to bring your phone
 to.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #192 fediverse/2945 ---
═══════════════════════════════════════════════════════────────────────────────────
 my favorite feeling is when I hear my fans running intermittently on my
 computer even though I'm not doing anything and there aren't any new processes
 in my resource manager
 
 like... that feels like a virus, but I'm on Linux, so what do I know right?
 it's probably not somebody deleting all my art. or perhaps just selective
 parts. Backups are a loooooot to manage >.>
 
 ... or even just mining crypto-coins lol, botnets amiright??
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #193 fediverse/4470 ---
═════════════════════════════════════════════════════════════──────────────────────
 to be "rich" is to have more than another.
 
 if you are happy, they are happiness poor.
 if you have community, they are alone.
 if you have serenity, they are chaotic.
 
 I am rich in very little but fire in my soul.
 
 I have enough in most cases, but I still struggle to pay rent.
 
 I am warmed by the pearl my swirling darkness has coalesced into. It nourishes
 me and keeps me aligned.
 
 Never forget your purpose and your truth. It will not abandon you, so long as
 you do so too.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #194 fediverse/2614 ---
═══════════════════════════════════════════════════════────────────────────────────
 literally just... if you want to connect to me, come hang out on my wavelength.
 
 or like, invite me to join yours, and I'll do my best to show how I feel about
 the things you share.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #195 fediverse/2687 ---
═══════════════════════════════════════════════════════────────────────────────────
 never trust your heroes
 
 they are not meant to be trusted. but they are still valuable and important.
 
 learn from them, apply what you can, and cherish the best parts of them when
 they inevitably fall and let you down.
 
 if they betray you, fucking burn them. if they let you down, accept their
 apology but don't give them responsibility until you can trust them again.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #196 fediverse/3927 ---
═══════════════════════════════════════════════════════════────────────────────────
 okay but why has nobody ever approached AI from a game design perspective like
 seriously there should be researchers who are multidisciplined in this kind of
 thing
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #197 fediverse/6110 ---
═════════════════════════════════════════════════════════════════════════════──────
 if the paradigm changes, suddenly you might find foes who you share common
 collective woes.
 
 this is a nightmare for your foes, the ones who remain your foes, the ones who
 always will be your foes, the ones who your foes are currently opposed as they
 believe they're doing pizzagate things and snorting child molester bones or
 sacrificing transgender children to anubesiris or whatever.
 
 "oh no don't tell me there's a secret cabal of elites that do satan's dark
 bidding worship"
 
 look I'm not NOT saying that, I just don't really have insight into that
 because it's not my jurisdiction. I'm supposed to talk about computer
 programming and being gay and struggling with meniality and revolutionary
 praxis in the modern day and all that junk and instead everyone's like "what
 if you are chronically interesting and permanently vexxing and seriously
 draining and perhaps a little bit caustic (non-toxic crayons) but always a
 darling and always eternally fair and righteous and valorous and determined
 and also gay"
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #198 fediverse/3280 ---
════════════════════════════════════════════════════════───────────────────────────
 I think games should be runnable without launchers like steam or lutris
 
 I think we should be able to control our own software without relying on an
 external entity knowing what we're doing. It's rude, to be tracked when you
 don't want to be. And what gives you the right to know what I do with the
 hardware and software you provide? It's an invasion of privacy. It is.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #199 fediverse/3805 ---
══════════════════════════════════════════════════════════─────────────────────────
 neat
the website Ephemeren has 100,008 followers as of 5 days ago. There are 0 people who follow the website on Neocities, it's all external traffic.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #200 fediverse/2786 ---
═══════════════════════════════════════════════════════────────────────────────────
 the best way, I find, to be deserving of trust is to do the best that you can,
 and be honest when you cannot do more.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘