=== ANCHOR POEM ===
◀─╔═══════════════════════[BOOST]═════════════════════════───────────────────────╗
║ ┌────────────────────────────────────────────────────────────────────────────┐ ║
║ │ There is no such thing as a backdoor for good guys. Once you place a backdoor, you compromise the safety and privacy of all your users. A third party or bad guys will get access to it and abuse it further. The concept of a "backdoor for good guys" is fundamentally flawed and dangerous. It sets a dangerous precedent. Security and privacy should be absolute. There's no safe way to create a backdoor that can't be exploited by malicious actors. #privacy #security #infosec │ ║
║ └────────────────────────────────────────────────────────────────────────────┘ ║
╠─────────┐ ┌───────────╣
║ similar │ chronological │ different ║
╚═════════╧═════════════════════════════════════════════───────────────┴───────╝─▶
=== SIMILARITY RANKED ===
--- #1 fediverse/884 ---
═══════════════════════════════════════════════────────────────────────────────────
┌──────────────────────────────────────────────────────┐
│ CW: completely-unfounded-no-evidence-mis-information │
└──────────────────────────────────────────────────────┘
If we make a law that says you can't sell user data, they'll just build an
intentional vulnerability into their system and point it out to specific
people who paid under the table. Then, when they get "hacked", they'll surely
be ashamed and sorry to their users, but hey the data's out there now not like
they can take it back. Oh don't worry we already patched the hole in our
security, that way nobody can get in through the same door that was
intentionally left open for very particular people who've paid, and not for
the people who haven't paid yet, who are still waiting patiently for a door to
be built for them.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘
--- #2 fediverse/1113 ---
════════════════════════════════════════════════───────────────────────────────────
we should be able to configure our web browsers so that they don't remember to
autofill certain pieces of information. Such as the IP address of our router,
or our bank credentials, or any other forms of passwords that we are using to
authenticate ourselves. That way our infrastructure that we've designed is
less susceptible to cybersecurity threats that involve physical access to the
computer. Or remote control of some kind that is channeled through the UI
(like RDP or SSH) (a terminal is a text based UI in this context)
Unless of course they knew what they were doing. Which most of them don't.
Hence why it'd be a good idea to isolate the capabilities of defeating certain
vulnerabilities to ourselves. Like, a reverse backdoor, only more like a DMZ -
a sector of computing space (sandboxed of course) that is only utilized for
understanding the intent of the message sender.
Doing so would require an analysis of the capabilities of the system, the kind
of analysis that [script kiddies'dve] generated by googl
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #3 fediverse/2252 ---
═══════════════════════════════════════════════════════────────────────────────────
┌──────────────────────┐
│ CW: tech-encryption │
└──────────────────────┘
users don't want to have to think about encryption keys.
they should be available for them if they need them, in like... a folder or
something somewhere, but they don't need to really know that they exist.
more friction like that keeps people away from being secure.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #4 messages/181 ---
═══════════════════════════════════════════════────────────────────────────────────
I know you don't want to hear this, but there is a chance that there will come
a time where your life depends on your ability to debug a computer without the
internet. To set up an SSH server. To install Linux. To program in C. To do
something else that I'm not prepared for... If StackOverflow didn't exist
because network connectivity has been lost, could you remember syntax? Maybe
it's a good idea to set up a local LLM that can answer basic questions about
technology. Maybe it's a good idea to set up on your parents computer, just in
case you have to hide out there for a couple months. Maybe it's a good idea to
download wikipedia, just in case.
If I need to use a mac, I'm screwed
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘
--- #5 fediverse/5369 ---
═══════════════════════════════════════════════════════════════════════────────────
@user-138
you can use a username now. They added that functionality recently.
it's supposedly more encrypted or something. But, it's still a centralized
point of failure. If you want to say something privately, pretend like you're
ordering drugs on the dark web and use PGP encryption or SSH keys or whatever
it says in the "how to order drugs on the dark web" guides.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════───────────┘
--- #6 fediverse/3470 ---
═════════════════════════════════════════════════════════──────────────────────────
alternatively, when you initiate an SSH session it sends you a randomized
public key whose private key is the password that you need to login. By
decrypting the string of text it sent you and sending it back (plus the
password at the end or whatever) you can ensure secure authentication without
bothering with the passwordless keys which are wayyyyyy more trouble than
they're worth and lack the "something you know" authentication method.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #7 fediverse/4946 ---
══════════════════════════════════════════════════════════════════─────────────────
I would trust the CIA if they gave me continual access to all surveillance of
myself
-- stack overflow --
what if you made a program which cycled credentials?
like... "give me a random credential for Zoom" because we share all of our
digital resources
did you get banned for account sharing? no you didn't because you routed
through the correct VPN
automagically
[has never had a software job]
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════────────────────┘
--- #8 fediverse/4720 ---
════════════════════════════════════════════════════════════════───────────────────
@user-882
it's a security hole though
yeah... there ya go...
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘
--- #9 fediverse_boost/4589 ---
◀─╔═════════════════════════[BOOST]═══════════════════════════───────────────────╗
║ ┌────────────────────────────────────────────────────────────────────────────┐ ║
║ │ Remember Friends: │ ║
║ │ │ ║
║ │ You cannot both have secure end-to-end encryption to protect your communication AND also have a backdoor/key/access only for "the good guys." │ ║
║ │ │ ║
║ │ This is not possible. │ ║
║ │ Do not believe anyone telling you otherwise. │ ║
║ │ │ ║
║ │ End-to-end encryption protects us all, │ ║
║ │ we must fight to keep it ✊🔒 │ ║
║ │ │ ║
║ │ #Privacy #Encryption #E2EE #RootForE2EE │ ║
║ └────────────────────────────────────────────────────────────────────────────┘ ║
╠─────────┐ ┌───────────╣
║ similar │ chronological │ different ║
╚═════════╧═════════════════════════════════════════════════───────────┴───────╝─▶
--- #10 fediverse/2674 ---
═══════════════════════════════════════════════════════────────────────────────────
┌────────────────────────────────────────────────────────────────────┐
│ CW: factually-untrue,-that-never-happened.-this-is-just-gesturing. │
└────────────────────────────────────────────────────────────────────┘
the kind of friendship where you SSH into each other's systems and leave notes
for one another.
as soon as you find one you message the person who left it like "yoooo only
just found this lol" and they're like oooo yeah did you see the bash script I
wrote in that directory "yeah totally I used it on one of my video files just
now - cool filter!"
ahhhh reminds me of all the times hackers have hacked my permanently insecure
system and left me friendly messages like "hey I'm on your side" or "how's
life, friend? I hope it's going well." or "never forget; you are worth all the
fear" y'know cute things like that
oh. right. because leaving vulnerabilities like that can lead to threat actors
affecting your stuff. how lame.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #11 fediverse/1862 ---
╔═════════════════════════════════════════════════════─────────────────────────────┐
║ some people look for signals or signs before doing something. Try and have │
║ someone in your life who can give you signals or signs so that you know when │
║ to do things. And ideally, if they're more hardcore than you, you'll know what │
║ to do, not just when to do it. │
║ │
║ did you know that anything on the internet can be read by at least one other │
║ person besides your intended recipient? There's no way they'd let us talk │
║ amongst ourselves otherwise. │
║ │
║ I think encryption is pretty neat, all you have to do is run a shell script on │
║ some text, then send that text over the internet. If you want to decrypt it, │
║ all you have to do is run a shell script on it to decrypt it. │
║ │
║ downside is, it has to be translated into plain text somewhere along the │
║ line... Maybe if we rendered the words not as text that can be read from │
║ memory, but as like, brush-strokes that can have a randomized order, but still │
║ present to the user as visual text? anyway that's what's on my mind as I try │
║ and improvise a baking recipe with yeast, flour, and butter │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧══════════════════════════════════════════──────────────────┴──────────┘
--- #12 messages/1203 ---
══════════════════════════════════════════════════════════════════════════════════─
Programmers are lazy, this is well known. So why would i trust by default that
anyone would read open source code looking for security exploits or malicious
code? I trust an LLM for that more than a human. At least your own LLM can
digest the entire project or library at once.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════════════┘
--- #13 fediverse/664 ---
══════════════════════════════════════════════─────────────────────────────────────
@user-482
[secretly installs a keylogger and doesn't tell anyone upstream but still
pushes it to production]
[or worse, was told to do as such and given tools to fabricate "evidence" to
the contrary to everyone else on the team]
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘
--- #14 fediverse/3469 ---
═════════════════════════════════════════════════════════──────────────────────────
you know how SSH password login is deprecated because the password needs to be
transmitted in cleartext or whatever?
what if we just... required two passwords?
the first initiates the conversation, and sets up an encrypted line. It
doesn't matter if anyone sees the first password because they'll get a new set
of encrypted keys, meaning each session automatically is encrypted in a
different, randomized way.
the second password is the one that actually authenticates you.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #15 fediverse/624 ---
══════════════════════════════════════════════─────────────────────────────────────
You know, there's no guarantee that Youtube or Gmail has to show you the EXACT
SAME video or message that your friend shared with you. Or did they even share
it at all? So hard to tell when they know all the communication you've ever
had, because you only know each other online on their platforms, [read: US
government observed platforms] [like, HTTPS] surely there's no room for
someone to sneak in and edit your conversations. Surely the only way to
securely communicate is to send pure PGP encrypted bytes to another target,
wrapped in a TCP/IP header, with unknown intent or expression. Worst they
could do then is just, y'know, block it entirely.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘
--- #16 fediverse/3407 ---
═════════════════════════════════════════════════════════──────────────────────────
@user-1218
there's only a password so that if the zip archive is displaced from it's
context it's harder to read.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #17 messages/1172 ---
══════════════════════════════════════════════════════════════════════════════════─
the danger is not that the LLM will generate poor, vulnerable, or malicious
code.
the concern is that someone else might inject something into the codebase that
you're not reading.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════════════┘
--- #18 messages/1245 ---
══════════════════════════════════════════════════════════════════════════════════─
BRB, if you want to talk to yourselfs, I recommend opening a port in your
router and exchanging HTTP packets that create messages on each other's
computers. Can be done in a couple hundred lines of C code that can be 90%
premade or auto-generated. Then, once it's made, you don't have to think about
it again because it's so simple. It's not trying to scale, it's just...
designed for a small, focused, human oriented mindset.\
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════════════┘
--- #19 fediverse/1587 ---
════════════════════════════════════════════════════───────────────────────────────
@user-883
If we lived in a sane world, the internet would operate on standards. And
yet... Well, that's not entirely true, we have HTTP and HTML and all the
security risks that Javascripts entails... Well, here's hoping the future can
figure out what exactly's important aside from profit and ease-of-development.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════──────────────────────────────┘
--- #20 fediverse/6215 ---
══════════════════════════════════════════════════════════════════════════════─────
hi does anyone have any good resources on risc-v?
I found this:
https://dramforever.github.io/easyriscv/#shift-instructions
and this:
https://projectf.io/posts/riscv-cheat-sheet/
but I'm missing a big gap - specifically, how to move from syntax to
deployment. I need details on how to implement the software and get it running
on the actual hardware.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════════────┘
--- #21 fediverse/497 ---
══════════════════════════════════════════════─────────────────────────────────────
@user-346
Nobody will get past the login screen on my computer, but if they do they
probably won't know that you need to push alt+p in DWM to start a program. But
even if they push "alt+p firefox" they will only have access to my gmail and
discord, because those are the only two places I've saved my login information.
Most of my data is on my hard disk anyway, so for that they'd have to push
alt+enter and then navigate my filesystem to find it. Shouldn't be too hard if
you're familiar with Linux.
They could always just pull the hard drive and put it into a new computer
though. It's not like it's encrypted, because why would I encrypt it? I want
to share information, not conceal it! Surely nobody would desire to exploit
that vulnerability of mine, that my data should be unencrypted?
If you have a copy of Wikipedia then you're 500% more prepared than 90% of
humanity so good job _^
Sure would be cool if you put it in the documents folder of every person in
your family who solicited tech advice from you
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘
--- #22 fediverse/4301 ---
════════════════════════════════════════════════════════════───────────────────────
@user-1655
maybe the user could tell their client what fields to expect and how to
present them (like, a field called "memes" would be presented as a picture in
this panel, a field called "rants" would be passed to a word-cloud function
that extracts the most common 6+ letter words so you can tell at a glance what
the rant is about, this other field could be for calendar invites (plain text
of course, but interpreted by the calendar program) etc)
plus, if it's encrypted with PGP keys by default, there'd be few security
concerns. Unless your friend got hacked, or you got hacked, but, well... make
sure everything's sandboxed and don't do any remote code execution and you're
good, right?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘
--- #23 fediverse/3474 ---
═════════════════════════════════════════════════════════──────────────────────────
@user-883
true, but much the same way people will rebel against inconvenience by writing
passwords on sticky notes, so too might they put SSH keys onto the nearest
flash drive without validating that it hasn't been compromised. There's
tradeoffs everywhere I guess.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #24 fediverse_boost/3867 ---
◀─╔═══════════════════════[BOOST]═════════════════════════───────────────────────╗
║ ┌────────────────────────────────────────────────────────────────────────────┐ ║
║ │ I really hate "two factor" auth. Like, cool, I get it, it let's you pretend you can divest responsibility for security and recovery, but also it means dropping my phone too hard could be a life disrupting event so somehow I don't really feel like this is for my benefit. │ ║
║ └────────────────────────────────────────────────────────────────────────────┘ ║
╠─────────┐ ┌───────────╣
║ similar │ chronological │ different ║
╚═════════╧═════════════════════════════════════════════───────────────┴───────╝─▶
--- #25 fediverse/874 ---
═══════════════════════════════════════════════────────────────────────────────────
oh yeah well if SSH keys are so secure then why doesn't every website on Earth
require them
really though why doesn't every website on Earth require them
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘
--- #26 fediverse/2605 ---
═══════════════════════════════════════════════════════────────────────────────────
@user-1268
was just wondering what interesting or useful or incriminating data was found
in the heritage foundation hack.
because, like, they could just leave a security vulnerability open for
downloading their like, contact data for customers, and like... that's not too
useful for people attempting to fight them. it's the CONSUMER'S data after
all, not the corporation / organization.
all I saw was the headline that they downloading some gigabytes of
information, I didn't check to see what it comprised
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #27 fediverse/4218 ---
════════════════════════════════════════════════════════════───────────────────────
there are plenty of pieces of linux that are insecure in some way. Including
x11, if I remember correctly. It is purely convention to not abuse these
insecurities, and whenever you use someone else's binary software you trust
that they won't betray you in some way.
pre-built binaries are privacy violations and should be illegal. They are
security threats because the model they're built upon is necessarily insecure.
Computers will never be completely secure because of how they are built, and
so we should use locally compiled software and interpreted scripts.
Unless they're too long, or impossible to read. Who reads EULAs these days? At
least those are written in english.
maybe computers aren't worth it. Maybe computers will solve all our problems.
Who can say, maybe you should ask an oracle like me
though do remember that anything you hear can and will be used against you,
monkey's paw style. So maybe, like... don't? unless you're into magic or
schizophrenia or something
I wnt 2 be cute and tch cpus
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘
--- #28 fediverse/1261 ---
╔════════════════════════════════════════════════──────────────────────────────────┐
║ sometimes I run this WoW server with only like, 10 username and passwords. And │
║ they're all public. As far as I can tell nobody's ever tried connecting │
║ (whatever >.> ) but rather than set up a way to create your own │
║ credentials I just said "yeah pick one at random and play whatever someone │
║ else was doing because I like the idea of that" │
║ │
║ somehow, it felt right. │
║ │
║ most of my passwords (not all of them) are hacked and visible on the clear │
║ net. Like you could probably google my usernames and get my current passwords │
║ for things like, social media or my banks or whatever. I kinda like the idea │
║ that "you cannot trust anything I say, so think of the ideas behind my words │
║ and decide whether they hold meaning to you" rather than "execute these │
║ particular thought patterns in your mind as if they came from my voice" │
║ because one implies an exertion of control over the mind of the recipient │
║ -> obey my thoughts as I broadcast them into your mind, that kinda vibe. │
║ And I feel like you have to consent to that kind of thing hehe │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧═════════════════════════════════════───────────────────────┴──────────┘
--- #29 fediverse/1034 ---
════════════════════════════════════════════════───────────────────────────────────
@user-192
be careful, recursion can cause stack overflows.
better to run function pointers from a loop. That way you can operate as long
as necessary. Just make sure you don't get in an infinite loop...
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #30 fediverse/3690 ---
═════════════════════════════════════════════════════════──────────────────────────
┌──────────────────────────┐
│ CW: capitalism-mentioned │
└──────────────────────────┘
what if we demanded private servers for video games (by law? what else would
even work??) and encouraged companies to hire people to make high-quality mods
for their competitors games so they couldn't make as much money selling
expansion packs and DLC
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #31 fediverse/5784 ---
╔═════════════════════════════════════════════════════════════════════════─────────┐
║ large companies want you to need to download and configure each piece of │
║ software because then it'd mean [wait you got that backwards] oh right if they │
║ force you to download and install software on a "per distro" system, then they │
║ effectively can ensure that there's always a vulnerability on your host. │
║ │
║ any amount of space is PLENTY of space for a │
║ non-open-source-but-instead-proprietary-or-otherwise-secretive part of the │
║ tech stack to do whatever they want with your host. computer. │
║ │
║ I wonder, if AI was real would it really be guaranteed to expand in growth │
║ exponentially? What if it's nature was confined to it's form, like dinosaurs │
║ not growing bigger because of the lack of oxygen in the airtmosphere? │
║ │
║ [girl can you please stop smoking weed] │
║ │
║ ... no?? that's when I'm most productive. │
║ │
║ [this isn't productive] │
║ │
║ it feels productive │
║ │
║ [it isn't] │
║ │
║ WHYYYYYYY not? it could be. just gimme a task and I'll write endlessly about │
║ it instead of daydreaming to myself. │
║ │
║ yep... pretty all-right-at-it for a start. elentalusCOTE │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════════════════════════════════╧═─────────┘
--- #32 fediverse/1693 ---
═════════════════════════════════════════════════════──────────────────────────────
"if I work on the TTY then they can't forward my X session without my consent"
- ramblings of the utterly deranged
as if they couldn't just look at your unencrypted source-code as you save it
to your hard drive smh
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════─────────────────────────────┘
--- #33 fediverse/545 ---
══════════════════════════════════════════════─────────────────────────────────────
┌──────────────────────────────────────────────────────────────────────────────┐
│ CW: re: PSA: aspublic.org is still active, and still archives + makes searchable all public posts, they have no opt-out, nor do they respect the "Include public posts in search results" setting │
└──────────────────────────────────────────────────────────────────────────────┘
@user-391 @user-78
I see, it seems you know more than me about this topic. It's true that search
engines don't index emails, but I was thinking more of a "cybersecurity"
perspective, as in any "sufficiently motivated" individual or organization
could access your emails should they so desire. And should they be willing to
(I'm assuming?) break a few laws.
If it can be done, and if it gives information that could be used for
leverage, then you can be assured that someone will do it. I personally worry
about people in power who could be blackmailed because their communications
were more public than they anticipated. Which speaks to the problem mentioned
in this post of the search-indexing-opt-out functionality being present but
circumnavigatable. Avoidable? Able to be bypassed? It's an illusion of
security.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘
--- #34 fediverse/2706 ---
═══════════════════════════════════════════════════════────────────────────────────
┌──────────────────────┐
│ CW: politics │
└──────────────────────┘
feds will "break" into your house noiselessly while leaving no trace when
you're confirmed to not be home and photograph EVERYTHING.
if you have in-door camera systems, they can disrupt those and they give you
false confidence.
EDIT: also they're trained to always check after opening a door for any fallen
markers and such - like, leaving a piece of paper between the door and the
frame and if it's fallen when you return home, you know someone has been
through that way - and if they notice anything like that they replace it.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #35 fediverse/5783 ---
╔═════════════════════════════════════════════════════════════════════════─────────┐
║ I think our industry should work on one project at a time │
║ │
║ "do one thing and do it well" │
║ │
║ linux users code. │
║ │
║ everyone backends ffmpeg. │
║ │
║ everyone online uses chrome. │
║ │
║ what if we just rewrote every single program and... left it without updates in │
║ a "permanently forbidden" zone │
║ │
║ ... I mean what if we wrote non-proprietary alternatives to every proprietary │
║ source of computational knowledge and then we could only patch security │
║ vulnerabilities and compatibility change-bounties [oh no now you're allowing │
║ for endless levels of abstraction [meaning, operating system package │
║ installation bloat] and distasteractions.] │
║ │
║ the futures where all is not well nearly outnumber the well. but the inverse │
║ is also true, for they are divided roughly equal fifty. balance, in all │
║ things, is the only temperate state. when balance is │
║ [changed/something/uplifted], balance is inevitable to be search-shifted. │
║ │
║ why must you die for an audience? │
║ why │
║ │
║ ... I don't really want to, but what happens happens. we'll see if it's a for │
║ sure dealing. │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════════════════════════════════╧═─────────┘
--- #36 fediverse/3234 ---
╔════════════════════════════════════════════════════════──────────────────────────┐
║ ┌────────────────────────────────────────────────────────────────┐ │
║ │ CW: ritz-is-fucking-stupid-I-guess-oh-whoops-cursing-mentioned │ │
║ └────────────────────────────────────────────────────────────────┘ │
║ │
║ │
║ my understanding is that anyone with my IP address could make my heart bleed │
║ due to a hardware vulnerability on my motherboard. Though you might have to │
║ get past my decrepit ancient linksys EA 3500 router from 2012 first. │
║ │
║ unrelated, but does anyone want my IP address? I don't have any remote │
║ backups, so if you hate me now would be a great time to show me how despised I │
║ am. Alternatively you could try searching for anything evil to ensure that I │
║ can be trusted. You're gonna find mostly video games and source-code that I │
║ didn't write though. But also all my notes in directories that are │
║ non-standard, meaning you'll have to look around a bit. I leave little notes │
║ everywhere I go, so that I can remind myself how to do things in the │
║ directories I revisit months later. It's so weird how sometimes the things I │
║ wrote stop working after a while even if I didn't update my system lmao │
║ │
║ what is it with artists and self-immolation? "I never thought I'd actually di │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧═════════════════════════════════════════════───────────────┴──────────┘
--- #37 messages/752 ---
══════════════════════════════════════════════════════════════════─────────────────
techbros really wanted to automate IRC so they didn't have to rely on the
community knowing and trusting them to remember the commands to make docker
containers for their react frameworks
and like... yeah I use chatGPT too, because that way I can get what I need
without bothering anyone (you aren't bothering people who get off on helping
others when you ask for help)
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════────────────────┘
--- #38 fediverse/2884 ---
═══════════════════════════════════════════════════════────────────────────────────
┌──────────────────────┐
│ CW: tech-paranoia │
└──────────────────────┘
every time I update my system, it breaks.
kinda makes me think they do that on purpose so that you spend all your time
up to date and that way they can quickly patch in and out security flaws fast
enough that nobody notices.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #39 messages/324 ---
═══════════════════════════════════════════════════────────────────────────────────
The difference between front-end and back-end programming is whether or not
you want to design abstractions or use them. Backend is all about creating
abstract things that are networked together, while front end is about putting
them together in a way that suits the user. Front end is collage, back end is
pencil drawing.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════───────────────────────────────┘
--- #40 fediverse/239 ---
╔═══════════════════════════════════════════───────────────────────────────────────┐
║ if your computer gets hacked, but nothing was broken or changed... do you │
║ leave it as it is so that anonymous can see you're chill or do you wipe it │
║ because you're afraid it's the feds? │
║ │
║ ehhhh false dichotomy most people are afraid that their system will get borked │
║ or their bank account will be stolen or their email will get spam or that │
║ random icons will turn inside out and their mouse cursor will turn into a │
║ barfing unicorn or they'll finally have to figure out bitcoin to pay a ransom │
║ for their files including the only pictures they have of their niece. whoops │
║ │
║ people are afraid of technology because of what it can do to hurt them. │
║ they're afraid it'll break or stop working, and they'll have to spend time │
║ figuring it out. they like things how they are, but for some reason companies │
║ keep changing things? it's frustrating learning a new system, and every 5-10 │
║ years it feels like you have to learn a new paradigm and ugh it's just so │
║ exhausting. technology is not designed for users... or maybe users get bored. │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════────────────────────────────┴──────────┘
--- #41 fediverse/3680 ---
═════════════════════════════════════════════════════════──────────────────────────
it's probably a good idea to write pseudocode, then real code, instead of
starting with real code, and bugfixing something incomplete and more difficult
to reason with.
unless you write real code easier than pseudocode. idk do what works for you.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #42 fediverse/4107 ---
════════════════════════════════════════════════════════════───────────────────────
Just configured Wake on LAN so I can turn on my desktop from anywhere. As long
as I have the right SSH key...
Couldn't figure out how to do Wake on WAN, which I think is somehow more
secure. This way uses a small jump from a separate tiny computer which is
always on.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘
--- #43 messages/329 ---
════════════════════════════════════════════════════───────────────────────────────
LLM training data that's been encrypted in such a way that it preserves
symantic meaning, while also allowing for secrecy and unique customization
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════──────────────────────────────┘
--- #44 fediverse/5961 ---
════════════════════════════════════════════════════════════════════════════───────
@user-138
maybe it's evil hackers - idk that's beyond my expertise - good luck : )
(I'd need to see the piece of technology to work on it. I'm a hardware kinda
[girl, but pronounced guy])
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════════──────┘
--- #45 fediverse/1466 ---
═════════════════════════════════════════════════──────────────────────────────────
┌──────────────────────────────────────────────────────────┐
│ CW: death-mentioned-insurance-mentioned-bricks-mentioned │
└──────────────────────────────────────────────────────────┘
my opsec is non-existent teehee does anyone want my IP? or even my address,
it's not like I lock my door
if (when) my poor decisions get me killed (whoops adding content warning)
please throw a brick at an insurance company for me thanks
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #46 fediverse/1482 ---
═════════════════════════════════════════════════──────────────────────────────────
@user-192
I feel like SSH keys to log into every website should be a standard
or something similar
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #47 fediverse/3051 ---
════════════════════════════════════════════════════════───────────────────────────
@user-1437 @user-1438
you poor thing, don't delete your toots! don't delete your account! you are
wanted here, this is the fediverse! it's for all of us.
I personally like cyber-sexual exploitation more than cyber exploitation. I
wouldn't have thought about it unless you said something. there are a lot of
ways to exploit someone in a digital medium, and adding "sexual" focuses the
term to specifically the non-consentual sharing of sexual digital media -
which is exactly what the term "revenge porn" describes.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #48 fediverse/2459 ---
═══════════════════════════════════════════════════════────────────────────────────
this is the simplest implementation of scalable anarchism I could think of.
tell me how it's flawed so I can improve it before I need it.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #49 messages/635 ---
═════════════════════════════════════════════════════════════──────────────────────
Yeah, sure, signal is encrypted, but they could just put a virus on your
miniature pocket tv that streams your screen into a text recognition bot which
streams that text into an LLM trained to report on suspicious seditious
activity.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════─────────────────────┘
--- #50 fediverse/3555 ---
═════════════════════════════════════════════════════════──────────────────────────
@user-1553
just to note this type of link is not the only way they could implement
tracking. In fact it's kind of the worst way, because it's so obvious.
a more insidious way that we need to be aware of would be to generate a unique
URL for every person that visits a link. LIke, for me it might be
"youtu.be/abcdefg" but for you it'd be "youtu.be/hijklmnop" and there'd be
very little way for us to notice.
be aware of this if they try it.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #51 fediverse/1994 ---
╔═════════════════════════════════════════════════════─────────────────────────────┐
║ @user-1123 │
║ │
║ hi nice to meet you let me just transfer my unencoded public key to you so │
║ that you can sign it and verify that it's definitely the same thing I intended │
║ to send and not a malicious package that plans to execute itself to executable │
║ space and permanently hardwire your machine to continually feed data to an │
║ external site, no siree just a regular ordinary public key that was │
║ transferred over the internet, that place that basically guarantees a │
║ man-in-the-middle via it's communication processes over the lines and cables │
║ connecting ye to thee which are naturally administered and watched over by │
║ your host, AKA the isp. │
║ │
║ ... but yeah trust me bro plug in this flash drive, there's no way that a │
║ secret hacker might install a rootkit or something on my computer just because │
║ I plugged in a flash drive, once, literally just a nugget of information │
║ carried upon a little machine that you can fit in your pocket roughly the size │
║ of a thumb) drive, the kind that is useful for transmitting information by │
║ sneakermail. :) │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧══════════════════════════════════════════──────────────────┴──────────┘
--- #52 fediverse/6417 ---
═══════════════════════════════════════════════════════════════════════════════────
anarchists be like "hey look at me come and join me let's go do a thing"
meanwhile they're actually a team of secret agents convinced by the measure of
[their/your] actions
anarchrism is not anarchy
anarchism is good? actually? if you knew who everyone was it'd be fine if the
world was personalized to you.
if you ever wanted that sort of world, you'd have to seal it off from any
influence of the original, or you alter the form of everything that has come
from before.
not ideal.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════════════───┘
--- #53 fediverse/2202 ---
══════════════════════════════════════════════════════─────────────────────────────
┌──────────────────────┐
│ CW: re: Reply │
└──────────────────────┘
@user-1206
Right. How can you trust that any drive produced in the last 10 years (aka any
drive with a reasonable amount of storage space for sharing things like
LaserDisk rips of Bubblegum Crisis or detailed instructions on how to build a
nuclear power generator)how can you trust that any drive with that kind of
capacity wasn't built with the goals of it's manufacturers included into it's
design requirements? Goals that typically include invading your privacy and
removing your opsec capabilities.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #54 fediverse/466 ---
══════════════════════════════════════════════─────────────────────────────────────
I love Linux. All I have to do is type "authserver" and "worldserver" and
wouldn't you know it suddenly a universe is created (with very constrained
rules) that anyone might inhabit should they desire to. It's not like I'm
perfect - oh wait I have a toot about that, gimme a sec
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘
--- #55 fediverse/3668 ---
═════════════════════════════════════════════════════════──────────────────────────
setting up an SSH server is like a rite of passage for Linux administrators
(notice I didn't say users, you can't use linux, only administer it)
... I'm having trouble with my rites >.>
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #56 fediverse/5850 ---
═══════════════════════════════════════════════════════════════════════════────────
@user-1074
if you'd like I can give you a lua script which will take your fediverse
archive and turn it into a pdf which you can edit or print or whatever. Might
be a fun diversion from posting. You can reply to yourself, add
clarifications, change some things, put things in a new light, add context,
etc... before you know it you'll have something printable. Could even pull out
your best stuff and make zines.
should require just a little configuration to suit your setup. That's part of
how I stay "productive" without posting all the time.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════════───────┘
--- #57 fediverse/3467 ---
═════════════════════════════════════════════════════════──────────────────────────
I have decided that the internet is a scam and nobody should use it for any
reason ever
you're just looking for motivation to do a dopamine detox, aren't you?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #58 fediverse/3700 ---
═════════════════════════════════════════════════════════──────────────────────────
There is almost zero reason to have a messaging client (like Discord) that is
anything more than a wrapper over IRC.
There is almost zero reason to have a social media site that is anything more
than a wrapper over HTML pages.
There is almost zero reason to have forums that is anything more than a
wrapper over email.
and yet, we build things.
and yet, we construct.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #59 fediverse/1038 ---
════════════════════════════════════════════════───────────────────────────────────
┌──────────────────────┐
│ CW: re: what │
└──────────────────────┘
@user-766
ah yes but then how will my comrades come for my things know where to look? my
precious precious drives may be less safe inside of the computer case but at
least then someone I can about can find them.
or what you're saying is that a basic part of situational awareness is having
a plan for this kind of thing with the people who care about you? Ah, well,
nobody cares about me like that. Just a couple normies who want nothing but
business as usual.
wonder if I can open up my hard drives to "read only" SSH access? Or maybe
I'll just make the important files into a torrent. Or perhaps marking them as
"downloadable locations" on Soulseek? Plenty of options, all of them require
someone to care enough about your junk to want to archive it. Something
something ipfs?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #60 fediverse/1713 ---
═════════════════════════════════════════════════════──────────────────────────────
┌───────────────────────────┐
│ CW: re: divination, tarot │
└───────────────────────────┘
@user-1071
like a king who dictates on high, the taller the chair the farther the fall.
how simple is it, when everyone trusts you, to betray the wishes for direction
they grant upon you. By leveraging their direction to forward your own ends,
you are depriving them of the liberty to choose their own ends.
how cruel is it! to be the reason for distrust! alas, who can you go to for
guidance if not anybody you trust?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════─────────────────────────────┘
--- #61 fediverse/112 ---
═══════════════════════════════════════════────────────────────────────────────────
I live through the moments where I find a folder of stuff I made that I forgot
about and I can go back and see it for the first time.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════───────────────────────────────────────┘
--- #62 fediverse/2713 ---
═══════════════════════════════════════════════════════────────────────────────────
if you aren't organized enough to protect your commanders, then you don't
deserve leaders.
build the structure first. build it on honesty and trust and dedication toward
a goal. then build the necessary adaptations as you encounter problems, trying
vaguely to head in a particular direction, and eventually you'll become
self-sustaining.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #63 fediverse/1620 ---
═════════════════════════════════════════════════════──────────────────────────────
@user-1037
I gotta say you're making a really good argument for OpenBSD... Hmmmm maybe
I'll look into it this week.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════─────────────────────────────┘
--- #64 fediverse/2200 ---
══════════════════════════════════════════════════════─────────────────────────────
I love D&D books with lots and lots of randomized tables because you can,
in a pinch, use them as code-books for encrypting text using a method that
nobody will ever guess. Well, as long as you have two of them, one to give to
your friend and one to keep yourself.
This is a form of "symmetric encryption", where you each have a copy of the
input/output tables. More secure is the private/public key style encryption,
but good luck explaining that to a 14 year old. Plus you can't do it over a
radio, you need a computer.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #65 fediverse/3349 ---
════════════════════════════════════════════════════════───────────────────────────
@user-1074
my understanding is, if someone wanted to create something like that, they
should start with writing protocols instead of standards, much the same way
Activitypub or HTTP are protocols for a free and open internet.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #66 fediverse/1487 ---
═════════════════════════════════════════════════──────────────────────────────────
social media clients that don't return you to the same spot you were at when
you hit the back button -.-
but then also make it needlessly complicated to open links in a new tab, like
obfuscating the location you need to cast "middle click" on
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #67 fediverse/5065 ---
════════════════════════════════════════════════════════════════════───────────────
┌────────────────────────────────────────────┐
│ CW: strange-ideas-about-software-mentioned │
└────────────────────────────────────────────┘
software should have 3, maybe 4 or 5 maintained releases imo
for adding security improvements and whatnot
then people wouldn't complain about updates
because they wouldn't feel like they were being left behind (after expressing
their differences (of opinion and such))
I think that'd uh maintain them as, I guess, userbase optics parallelograms?
oh sorry we're on rhomboids this week - right, and no I won't forget the
differences in creed, all things are received equally...d.
uh-huh yeah no that makes sense. gotcha. okay see you at the location. have
fun with your demarketion. what if we played games with swords but like,
the peril of steam is that you can't decline to update. meaning if a
corporation wants to break an old game and it's collectively hosted servers...
all it has to do is push an update that disables them. suddenly nobody has
room to do, and the whole
-- stack overflow --
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════──────────────┘
--- #68 fediverse/5913 ---
════════════════════════════════════════════════════════════════════════════───────
Did you know that any wifi chip can be used as both a sender and a receiver?
how do you think you'd get data in and out of the device?
trick is... you don't actually need a router. How fun is that!
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════════──────┘
--- #69 fediverse/379 ---
═════════════════════════════════════════════──────────────────────────────────────
someone should make an application that runs locally and keeps track of every
post, comment, picture, etc that you ever made on the internet. Then, if any
of them are ever deleted, it notifies you so you can stop using whatever
service mishandled the data that you trusted them to safeguard.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════─────────────────────────────────────┘
--- #70 fediverse/2015 ---
══════════════════════════════════════════════════════─────────────────────────────
Hey does anyone have a link to that paper where they used wifi waves on hacked
insecure routers to "see" through walls and build a decent enough
visualization of what a person's doing to be roughly equivalent to
full-body-tracking in VR? I want to see if I can make it work for VR (with
consent)
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #71 fediverse/1247 ---
════════════════════════════════════════════════───────────────────────────────────
so wait is there any guarantee that the "releases" on github actually have the
same code as that which is in the repository? Or could they just... put their
own binary, with it's own strange rules and vulnerabilities, or am I just
fearmongering?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #72 fediverse/1310 ---
═════════════════════════════════════════════════──────────────────────────────────
that feeling when you type your password so fast that one hand is faster than
the other and the letters get all jumbled and now you have to remake your ssh
key -.-
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #73 fediverse/2423 ---
═══════════════════════════════════════════════════════────────────────────────────
does anyone know of any fedi software that lets you link to a particular post
and read forward on a person's timeline from there? Or back I guess, but
chronological viewing specifically.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #74 fediverse/2510 ---
═══════════════════════════════════════════════════════────────────────────────────
@user-1074
if I wanted to accomplish this goal, I would host a fediverse server on a
raspberry pi and post the link around the building (the owners will remove it
so you gotta keep posting them)
then, potlucks.
then, friendships.
then, organization.
be patient with them. people are slow to be constructive.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #75 messages/679 ---
═════════════════════════════════════════════════════════════──────────────────────
What if we paid people to administer a database of people who needed mutual
aid so we could keep track of them, organize them, and care for them?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════─────────────────────┘
--- #76 fediverse/1416 ---
═════════════════════════════════════════════════──────────────────────────────────
@user-979 @user-980
they do it for power.
power corrupts, and these profane desires they possess are the definition of
evil.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #77 messages/888 ---
═════════════════════════════════════════════════════════════════════──────────────
The biggest danger to opsec is when other people think they know more than you.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════════─────────────┘
--- #78 fediverse/3802 ---
══════════════════════════════════════════════════════════─────────────────────────
what if we got together and adopted a new open source project every month and
just collectively worked around the clock to learn and work through the
important problems facing it
or even like, cleared out the backlog of stupid pointless boring tasks that
would allow the developers to work on something better
call it the wandering parade of development
could give us some experience organizing small, short-term projects to
accomplish specific goals and tasks in an ad-hoc way that relied less upon
procedure and more on "I think so-and-so knows something about that, they were
looking into those files and posted a breakdown of how they work yesterday"
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════────────────────────────┘
--- #79 messages/526 ---
══════════════════════════════════════════════════════════─────────────────────────
what if we got together and adopted a new open source project every month and
just collectively worked around the clock to learn and work through the
important problems facing it
or even like, cleared out the backlog of stupid pointless boring tasks that
would allow the developers to work on something better
call it the wandering parade of development
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════────────────────────────┘
--- #80 fediverse/1846 ---
══════════════════════════════════════════════════════─────────────────────────────
If you're running away from something, you need to make sure that you're going
fast enough and far enough away that you can look forward for interception
events. Otherwise you are vulnerable.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #81 fediverse_boost/622 ---
◀─╔══════════════════[BOOST]═══════════════════──────────────────────────────────╗
║ ┌────────────────────────────────────────────────────────────────────────────┐ ║
║ │ PUBLIC SERVICE ANNOUNCEMENT: │ ║
║ │ │ ║
║ │ There is an increase of account takeovers due to insiders at telco firms simply giving control to people paying them/compromised support staff accounts. Do a check on systems where this single factor would permit an account compromise. And change the configuration. These are opportunistic trawling attacks. This is becoming more common as attackers replicate the success. │ ║
║ │ │ ║
║ │ The attacker uses other channels (like people search websites) to enumerate and guess the phone number attached to an online account and then checks against the telco they have control over. │ ║
║ │ │ ║
║ │ The insider only briefly temporarily forwards the victim number to a 3rd party then switches it back to normal once they’re in. This is how they stay quiet since most victims will not have leverage or telemetry to understand how they got hacked. │ ║
║ │ │ ║
║ │ It was their cell phone provider. │ ║
║ │ │ ║
║ │ Make it so account recovery systems require multiple factors and remove telephony-based recovery for VIP accounts entirely. │ ║
║ │ Go check your systems now. Go try to access all your stuff like you forgot your password. │ ║
║ │ │ ║
║ │ I am very serious. This is based on private knowledge but is compelled by the compromise of the SEC. This is common now. │ ║
║ └────────────────────────────────────────────────────────────────────────────┘ ║
╠─────────┐ ┌───────────╣
║ similar │ chronological │ different ║
╚═════════╧══════════════════════════════════──────────────────────────┴───────╝─▶
--- #82 fediverse/1246 ---
════════════════════════════════════════════════───────────────────────────────────
@user-883
hehe if I don't understand how it works it's difficult for me to use things.
My Linux friends get so exasperated with me because I'm like "cool script
gimme like 2 days to figure it out" and they're like "bro just use these
flags" and I'm like "no"
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #83 fediverse/1789 ---
══════════════════════════════════════════════════════─────────────────────────────
@user-883
Ah, well, since you've worked with raspberry pi's before I am going to trust
you on that. Perhaps a different system-on-a-chip could be used which has
better network controllers.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #84 fediverse/4715 ---
════════════════════════════════════════════════════════════════───────────────────
@user-1728
"oh, the bad guys are coming to hurt you?? just fuckin' run away"
yeah. real helpful. how about you fuck off to canada or whatever and give away
all your possessions. Maybe they'll train you and teach you how to help in
some way and you can come back later when the time is right.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘
--- #85 fediverse/4092 ---
════════════════════════════════════════════════════════════───────────────────────
why not make a unified fediverse identity that can post on whatever instance
it wants?
... hmmm could be accomplished with a layer of abstraction. You could use a
"fediverse client" software to enter text into an HTML page which would have
it's own UI and stuff and would organize your accounts and instances such that
you could mark like, 3-7 as places you'd like to put a particular message.
Then it would just... do it
l m a o spam is gonna get sooooo much worse before it gets better
but trust me, we'll figure it out. And it won't be long, either. It's a
solvable problem, we just haven't built anything to handle it yet.
... yet...
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘
--- #86 fediverse/5076 ---
════════════════════════════════════════════════════════════════════───────────────
there is an explicit invitation on my door that anyone can come over whenever
they wanted, yet hardly no-one ever does.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════──────────────┘
--- #87 messages/1173 ---
══════════════════════════════════════════════════════════════════════════════════─
"I noticed that your program is spinning up a crypto generator to run in the
background for 1 second every 10 seconds, did you know that?" said no llm ever
"I read through every single file in your project and I think I have a pretty
good picture. This is a keylogger app wrapped around an HTML web server that
displays pictures of cats alongside inspirational phrases and motivational
artwork." said no llm ever
"This is very inspirational stuff! your recipe generation program knows just
how to send encrypted text files to remote servers. I love the part where it
combines ingredients like tomato soup, cheese, and breadcrumbs into encryption
seeds that are applied to password files and raw browser history records
before being mailed to the user who requested a recipe. Potential improvements
include adding a method for selecting a new recipient aside from the hardcoded
IP address in Somalia. Would you like me to implement an HTML dashboard that
lets you select a random IP address from a specific country of origin?" said
no llm ever
"what are you talking about you use claude-code every day, and that's an LLM"
yeah... I guess I'm not actually concerned, and I see the beauty of the
technology that everyone's been primed to hate because it works against them
as it's wielded by the massive corporations who can restrict access to it to
only those who can afford 20$ per month or whatever. I see the promise, it's
there, and every year we're getting closer, but frankly I don't think the
wounds caused by the cultural resistance backlash movement will heal quickly,
or ever. Maybe that's the point.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════════════┘
--- #88 fediverse/5977 ---
════════════════════════════════════════════════════════════════════════════───────
apparently you can use network sockets for inter-process communication if you
just set the network to your home and the ports that are set to the defaults
that people who know what software you use will know to listen on when they've
hacked any single device on your network. good thing that data is with the
router, right?
what if there was a stop before leaving the computer?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════════──────┘
--- #89 fediverse/5873 ---
═══════════════════════════════════════════════════════════════════════════────────
"the problem with linux is you have to spend part of the program just...
interacting with the filesystem. like, where is their /usr/bin file? (oh it's
called a directory over there, my bad) weird they put their config over here
(what language is that written in?) uhhhh I don't know much about localization
settings (-- two computers on a botnet --)
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════════───────┘
--- #90 fediverse/1448 ---
═════════════════════════════════════════════════──────────────────────────────────
┌──────────────────────┐
│ CW: cursed │
└──────────────────────┘
that one option flag in the config file that you don't know what it does
because the documentation intentionally doesn't explain it very well (or
explains that it solves a use-case that like, nobody would ever have, and
certainly you don't have) that secretly sets a flag which sends your [redacted]
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #91 fediverse/1825 ---
══════════════════════════════════════════════════════─────────────────────────────
if one person is honest to everyone, then no-one can be honest to them for
anything they want to keep hidden.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #92 fediverse/4751 ---
════════════════════════════════════════════════════════════════───────────────────
apparently security through obscurity is out, and security through community
is in, don't ask me how I know that teehee
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘
--- #93 fediverse/1640 ---
╔════════════════════════════════════════════════════──────────────────────────────┐
║ a computer never connected to the internet, of course, running free and open │
║ source software that you all collectively can understand and run. Because │
║ otherwise it's sanctity is tainted, it can never be truly 100% of trust. │
║ │
║ like the fact that you cannot desecrate your own home. It is a reflection of │
║ you, just as you, in some ways, reflect it. It's important to have that │
║ complete honesty, because nothing has changed between people. │
║ │
║ if you could be detected for your intentions, then there would be no way to │
║ hide. unless you were 90% of one thing and 10% of another, in which case you'd │
║ have to hide your flaws in your philosophy like scarred and ugly parts of your │
║ soul. │
║ │
║ to me, a trans person, my memories of masculinity are a dedication to a goal. │
║ Could be a sacred tradition, like martial arts or classical piano, or perhaps │
║ it's a measure of fitness, like a person constantly in shape. Or maybe they │
║ learn as much as they can by reading every fantasy story at their library, or │
║ perhaps learning on the go with vide │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧═════════════════════════════════════════───────────────────┴──────────┘
--- #94 fediverse/5947 ---
════════════════════════════════════════════════════════════════════════════───────
you're supposed to try it out and see. or are you not a hacker?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════════──────┘
--- #95 fediverse/5386 ---
═══════════════════════════════════════════════════════════════════════────────────
@user-670 @user-1815 @user-1816
literally nobody has contributed to the one github repo I have
ever. I got like, one comment from some guy in China or Taiwan. It's been up
for like, 4 or 5 years and it's on my website. /shrug I guess most people
bounce off after reading the splash screen /shrug
to me, a FOSS project feels static because I don't believe in centralization
and I also don't have the bandwidth or need to work on it. /shrug
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════───────────┘
--- #96 fediverse/1008 ---
════════════════════════════════════════════════───────────────────────────────────
@user-353 @user-741
human brains tend to start ignoring signals when they become normalized. Like,
if you are consistently exposed to the same smell you get used to it, and you
stop smelling it. same for noises, and other signals.
it's the same with information, I think, which is why doomscrolling is so bad
for our brains - we go numb and desensitized! It's not good to have all that
bad news all the time.
I bet people believe in the "just world hypothesis" for the same reason.
Essentially, optimizing for equilibrium in all things.
I personally believe true justice is when everyone gets what they want. And if
someone wants that the other person doesn't get what they want, then they
don't want true justice. Like, for example, hateful people can never be
justified because they want another's life to be worse. or they want someone
to be wrong, which creates a contradiction - you can't give both people what
they want if one person wants the other to lose.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #97 fediverse/918 ---
╔═══════════════════════════════════════════════───────────────────────────────────┐
║ ┌──────────────────────┐ │
║ │ CW: scary-curse │ │
║ └──────────────────────┘ │
║ │
║ │
║ if the government/the nsa/ an organization had your password, they could │
║ migrate you to another custom instance that was designed to look exactly like │
║ your old one without telling you. You'd still interact with your peeps the │
║ same way as before, but this time it'd run through their server. meaning they │
║ could block certain posts that you were sending, or show others that you │
║ didn't agree with but had your deepfaked approval. │
║ │
║ if something felt off about you, most people would unfriend you. or even │
║ they'd just block you, so that nobody would remember if you're missing. │
║ friends and family are a matter of public record, and who goes to clubs these │
║ days? │
║ │
║ churches are a bygone era, and twitch streams are so individualized. libraries │
║ are nice, but you literally can't talk in there. plus there's only like, one? │
║ what happened to forest clearings, and tops of waterfalls, what happened to │
║ our world? I miss the campfires the most, the smell of burnt wood and cooked │
║ food. I miss the wind in my toes, I miss the │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧════════════════════════════════════────────────────────────┴──────────┘
--- #98 fediverse/3471 ---
═════════════════════════════════════════════════════════──────────────────────────
@user-883
it might be, I don't know much about it (hence why I'm asking questions) but I
have heard that ssh keys are more secure than password authentication and it
never made sense to me. If availability is important for security purposes,
then wouldn't SSH keys (which are much more difficult to carry around than a
password) be less suitable?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #99 fediverse/235 ---
════════════════════════════════════════════───────────────────────────────────────
┌──────────────────────┐
│ CW: re: horror │
└──────────────────────┘
@user-192 there's a fine line between inoculating yourself to fear (like a
person taking small doses of poison to build up a resistance) and giving your
mind extra ammunition to use against you when the real terrors find you.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════──────────────────────────────────────┘
--- #100 fediverse/1185 ---
════════════════════════════════════════════════───────────────────────────────────
@user-883
Hell yeah. I can't help but wonder if there's a more universal solution on the
horizon that will work for every game, using idk a raspberry pi zero or
something? I'm into hardware but not that much so forgive my insolence. Seeing
these purpose-built PCBs applied toward historical preservation and
utilization of forward thinking retro gaming technology fills my heart with
joy.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #101 fediverse/3423 ---
═════════════════════════════════════════════════════════──────────────────────────
every time I search the internet for a solution to a linux problem I have to
do add -ubuntu to the end of the search query
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #102 fediverse/5314 ---
══════════════════════════════════════════════════════════════════════─────────────
people are so afraid of defamation lawsuits that they'll refrain from posting
things like "steam could technically see everything going on on your screen"
what will you say in front of a phone?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════────────────┘
--- #103 fediverse/3395 ---
═════════════════════════════════════════════════════════──────────────────────────
┌──────────────────────┐
│ CW: cursed │
└──────────────────────┘
they don't want artificial intelligence to augment human intelligence, they
want it to replace it.
like... imagine an office worker randomly copy-pasting whatever pops up and
the computer saying "okay then what happens... uh-huh... okay and what if you
click the green button? ... right... okay, and now try typing this" etc
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #104 messages/1170 ---
══════════════════════════════════════════════════════════════════════════════════─
look, it's easy enough to solve bitrot. Just store three copies of the file
and synchronize them everytime you open them. Like, an in-software raid array,
except with less expense because a .png is what, 2mb? great, now they're 6mb.
Nobody will notice except people who really should be buying more hard drives.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════════════┘
--- #105 fediverse/6119 ---
═════════════════════════════════════════════════════════════════════════════──────
what's the point of using a password manager if they're just going to 2FA your
ass anyway?
oh right, so google knows whenever someone signs into obscure-porn-site.com or
radical-chemistry-and-explosives.net or
cheap-hot-anime-gunpla-fast-xoxo.itch.io or whatever the kids are buying these
days
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════════════════─────┘
--- #106 fediverse/2601 ---
═══════════════════════════════════════════════════════────────────────────────────
@user-249
you can host anything you'd like on a raspberry pi. If the software
requirements are within the hardware specs, of course.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #107 fediverse/3266 ---
════════════════════════════════════════════════════════───────────────────────────
how many people do you think in the world know that screenshots of a website
are not admissible proof because they can be trivially doctored by editing the
html?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #108 fediverse/1621 ---
═════════════════════════════════════════════════════──────────────────────────────
@user-883
You could buy a domain from a DNS and have it redirect to your computer in
order to obfuscate your IP address. That's what I did for my WoW server.
Downside is you'd have to trust the DNS, so... do you trust your security or
them more?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════─────────────────────────────┘
--- #109 fediverse/1871 ---
══════════════════════════════════════════════════════─────────────────────────────
I think all software should have config files
or accept as many command line arguments as necessary to achieve all the
functionality of a config file without requiring a standardized setup
or accept a config file as a command line argument, to allow for multiple
different implementations
or whatever you can throw together in your spare time because software is
either open source or it hates you.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #110 messages/770 ---
═══════════════════════════════════════════════════════════════════────────────────
There are some pieces of software where you think "oh cool, what did they
update?" and then there are some like "oh god... What did they update?"
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════───────────────┘
--- #111 messages/765 ---
═══════════════════════════════════════════════════════════════════────────────────
you don't have to write poetry to write notes. The poetics are just practice
for when secrecy is intended.
OR IS IT THE REAL THING? who can say.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════───────────────┘
--- #112 fediverse/60 ---
═══════════════════════════════════════────────────────────────────────────────────
Can someone explain to me why we need instances on the fediverse? Why don't we
just keep all our personal files local on our computer and communicate over
the federated protocol? What's the point of having all these mini-servers that
are controlled by the community? I mean, torrenting has been around forever,
why don't we just use that to communicate?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════───────────────────────────────────────────┘
--- #113 fediverse/4664 ---
═══════════════════════════════════════════════════════════════────────────────────
@user-1725
LLMs can't do math. Duh. That's like asking an "if check" to do recursion.
What he should have done is had the AI output the requested calculation as
JSON or something and use a calculator function call with the specified
arguments instead of trying to memorize every answer. But that requires more
functionality that has no reason to exist if your only goal is to be a tech
bro and build up a vacuous product that exists only to be hoovered up by
Google or Microsoft.
We could build such beautiful things if we just dethroned those giants. They
suck the creativity out of tech.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════───────────────────┘
--- #114 fediverse/3095 ---
════════════════════════════════════════════════════════───────────────────────────
if your business can't afford to have a back-up plan, then it is not a
sufficiently prepared operation.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #115 fediverse/1233 ---
════════════════════════════════════════════════───────────────────────────────────
low key kinda wish someone would kidnap me and lock me in a room with nothing
but a c compiler and strict orders to only work on whatever I want
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #116 messages/352 ---
════════════════════════════════════════════════════───────────────────────────────
Though, of course, can you ever be sure who is who they say they are? You must
consider all messages anonymous by default, and unencrypted (untrustable) and
yet impossible to ignore. Like the messages they had to ignore at Bletchley
Park to avoid the suspicion that they'd figured out the secret code. You know
how it goes.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════──────────────────────────────┘
--- #117 fediverse/4093 ---
════════════════════════════════════════════════════════════───────────────────────
I have no idea why people prefer a GUI when working with software. How the
heck do they expect to use their computer remotely if they can't even run
their software over SSH?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘
--- #118 fediverse_boost/6270 ---
◀─╔════════════════════════════════[BOOST]══════════════════════════════════─────╗
║ ┌────────────────────────────────────────────────────────────────────────────┐ ║
║ │ I am once again begging people to understand that “the government” already knows you’re queer whether you do elaborate online opsec dance rituals or not, and if they decide to just start shooting people for being gay, they’ll do it whether the evidence is airtight or not. is that grim? yes. but you can stop giving yourself undercover superhero identity PTSD about it │ ║
║ └────────────────────────────────────────────────────────────────────────────┘ ║
╠─────────┐ ┌───────────╣
║ similar │ chronological │ different ║
╚═════════╧════════════════════════════════════════════════════════════╧══─────╝─▶
--- #119 fediverse/1810 ---
══════════════════════════════════════════════════════─────────────────────────────
some people hear words like "datastructures" and "object-oriented programming"
and think they're made up terms that don't mean anything important.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #120 fediverse/4474 ---
═════════════════════════════════════════════════════════════──────────────────────
@user-1268
if you know how to program in C this is a good resource for building
networking applications:
https://beej.us/guide/bgnet/
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════─────────────────────┘
--- #121 bluesky#27 ---
═════════════════════════════════════════════════════════════════════════════════──
you can have as many processes running on a computer as you please, just make
sure they're all named chrome.exe so the user doesn't suspect a thing.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════════════════════─┘
--- #122 messages/264 ---
═════════════════════════════════════════════════──────────────────────────────────
Don't write self documenting code! Force people to read the documentation so
they know how to use it
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #123 fediverse/3499 ---
═════════════════════════════════════════════════════════──────────────────────────
Much the same way that it is legal to create trash in a public park, but
illegal to leave it behind, so too should it be legal to move digital media
files from one owner to another, and illegal to not delete the original.
The dual operation of copy+delete must be legalized, while maintaining that
the copy operation alone is illegal, aside from personal backups.
How could you enforce that? Well... You can't. Your computer will do whatever
you tell it to, and if you change that fact then you necessarily remove one of
the primary use-cases of computation - the ability to command specific
instructions and be delivered a perfectly mechanical and deterministic result.
(random number generation aside, which isn't truly random at all).
Therefore, just as littering in a public place is generally considered to be
enforced by the "honor rule", so too must this new legislation governing the
transference of digital media be enforced as such.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #124 fediverse/6015 ---
════════════════════════════════════════════════════════════════════════════───────
┌──────────────────────┐
│ CW: AI-mentioned │
└──────────────────────┘
In 2025, if you want to create a piece of software your options are to either:
devote your life to it, or use AI to build a semi-working prototype that you
can use to pitch your idea to a bunch of people who have devoted their lives
to learning how to use your idea as documentation while they build it from
scratch, throwing out most of the code but keeping all the checklists and
progress-trackers you built along the way, perhaps even utilizing some of your
tooling that you used while constructing the scaffolding of this monstrous
application that you won't be using most of the source-code for.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════════──────┘
--- #125 fediverse/3368 ---
═════════════════════════════════════════════════════════──────────────────────────
@user-883
They do value your privacy. They value it for exactly as much as those 1444
partners are willing to pay for it.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #126 fediverse/1870 ---
══════════════════════════════════════════════════════─────────────────────────────
why would I want other people using my computer? They don't know how to use my
computer! They might break something or mess something up or automatically
read/edit my files that are stored in standard locations through the usage of
a script which automagically scans and ransomwares machines on the internet
who store their files in specific standardized locations! no thank you.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #127 fediverse/1762 ---
══════════════════════════════════════════════════════─────────────────────────────
This was the first bash script I ever wrote.
It's been updated a little, it was a bash alias first, but this is what it
looks like now.
Kinda shows what kinds of problems I needed to solve most.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #128 fediverse/308 ---
═════════════════════════════════════════════──────────────────────────────────────
when tech people are hurt by technology they say "how can I fix this? what do
I need to install? what configuration should I use? is this company ethical,
or are they going to hurt me in the future? could I make something that fixes
this myself?"
when non-tech people are hurt by technology they say "okay" because they don't
have the bandwidth to figure it out.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════─────────────────────────────────────┘
--- #129 fediverse/1718 ---
═════════════════════════════════════════════════════──────────────────────────────
dear old people - did you know computers don't need to have buttons? You can
literally just type what you want to make happen (if you know the magic spell)
and it'll just, do that thing
how cool is that
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════─────────────────────────────┘
--- #130 fediverse/4804 ---
═════════════════════════════════════════════════════════════════──────────────────
I love it when wine doesn't work because it "failed to open program.exe"
... okay, can you tell me why it failed?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════─────────────────┘
--- #131 fediverse/3249 ---
╔════════════════════════════════════════════════════════──────────────────────────┐
║ when you ban someone from an instance, they're suddenly not sure who they can │
║ trust. They've been getting to know one group of online people and friends, │
║ │
║ [I think discord with a limit of 4ish servers per account would be a pretty │
║ useful way to focus your attention] │
║ │
║ it's important to always possess martial prowess, in │
║ │
║ -- so -- │
║ │
║ anyway [3 hours later] I think it'd be cool if there was a like "hey u r │
║ banned, but also here's a ton of instructional videos about how to start up │
║ your own instance" and like, scripts and tools and automation and all the │
║ infrastructure that you built and maintain - you know, like... open source??!" │
║ │
║ but also it's... hard to follow that much documentation │
║ │
║ sometimes people just aren't built for certain tasks │
║ │
║ "well, if you can't use the machinery, then you don't deserve the machinery" │
║ │
║ oh yeah well what happens next, you say to the workers "if you don't know the │
║ machinery, you can't get the benefits of it's production" to "if you don't own │
║ the machinery, you can't profit from it." │
╟─────────┐ ┌───────────┤
║ similar │ chronological │ different │
╚═════════╧═════════════════════════════════════════════───────────────┴──────────┘
--- #132 fediverse/5110 ---
════════════════════════════════════════════════════════════════════───────────────
I'll give ya a hint - encrypt the return IP address WITHIN the packet's data
package repository area itself, rather than trusting your "router" to return
it to sender.
YOU DON'T KNOW WHO IS SENDING A PACKET
that's the whole point of udp
(actually udp is when it doesn't matter if it got snatched in transit. Usually
used for more analog data streams like netflix or hulu prime.)
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════──────────────┘
--- #133 fediverse/1297 ---
═════════════════════════════════════════════════──────────────────────────────────
┌──────────────────────────────────────────────────────────────────────────────┐
│ CW: paranoia-keyloggers-steam-always-on-internet-connections-updates-streaming-arbitrary-data-with-complex-and-unknowable-ordered-structuring-mentioned │
└──────────────────────────────────────────────────────────────────────────────┘
every time I update my system I can't help but think "okay THIS is the time
they sneak a keylogger or screen recorder or whatever in" and like... there's
no way I'd ever know, I just want Steam to work again, it was working
yesterday, NOTHING CHANGED, STEAM, SO WHY do I gotta risk a keylogger by
updating my system for the first time in 3+ months
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #134 fediverse/3627 ---
═════════════════════════════════════════════════════════──────────────────────────
┌────────────────────────────┐
│ CW: computer-toucher-stuff │
└────────────────────────────┘
"why putting SSH on a port other than 22 is a bad idea"
https://www.adayinthelifeof.nl/2012/03/12/why-putting-ssh-on-another-port-than-
22-is-bad-idea/
"When you are logged onto a system as a non-root user you cannot create a
listing TCP or UDP port below 1024. This is because port numbers below 1024
are so-called privileged ports and can only be opened by root or processes
that are running as root."
thoughts?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #135 fediverse/2475 ---
═══════════════════════════════════════════════════════────────────────────────────
If you want to design a society, first learn how to build a decentralized
scalable multiprocessor computer program.
It could literally flip bits, the point is to practice architecture not
accomplish a goal.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #136 fediverse/1787 ---
══════════════════════════════════════════════════════─────────────────────────────
@user-883
I believe that every address should have a raspberry pi (or other similar
device) hosting a webpage that is controlled by the person who lives there. At
a minimum.
They should also be able to host videos and share files easily, in a way that
anyone who understands a desktop-and-file-folder style system can work with.
This would require serious reform of our internet service provider
infrastructure. Or perhaps it'd be as simple as flipping a switch, who can say
(engineers working at comcast for example could say, gee sure would be nice if
this was a tech community)
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #137 fediverse/3472 ---
═════════════════════════════════════════════════════════──────────────────────────
any online test that requires an email to give you the results is evil, don't
do it
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #138 fediverse/3226 ---
════════════════════════════════════════════════════════───────────────────────────
if your man page is longer than a list of options and their usage and a
paragraph or twenty of how to use the software... then you need to abstract,
and break your code into multiple purpose-built applications.
do one thing, and do it right. alternatively, do one set of things, and do
them concisely.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #139 fediverse/1458 ---
═════════════════════════════════════════════════──────────────────────────────────
there's nothing in the rules of the internet that says you can't share a
mastodon account with your 18 closest friends.
you'll only find such a demand in the EULA's of websites that you probably
shouldn't be spending very much time on, anyway.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #140 fediverse/3466 ---
═════════════════════════════════════════════════════════──────────────────────────
I have decided that the internet is a scam and nobody should use it for any
reason ever
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════─────────────────────────┘
--- #141 fediverse/5109 ---
════════════════════════════════════════════════════════════════════───────────────
does anyone know of a website where I can host videos on my neocities that
isn't youtube? maybe something I can set up on my own server computer at home
like a file server or something? how do I do that, what should I google, which
is the easiest and closest to the metal tools I can use? [practical, sensible,
courageous. these are the adjectives we need.]
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════──────────────┘
--- #142 fediverse/3359 ---
════════════════════════════════════════════════════════───────────────────────────
@user-192
you could throw yourself into the project of hosting a private server, that
way you could be working on "Runescape" while also being productive
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #143 fediverse/6438 ---
═══════════════════════════════════════════════════════════════════════════════────
why would you gatekeep content by keeping us from easily using LLMs some
people aren't technical and still need to write computer programs because
that's how you enlighten a people is empower them with new tools
"I've never heard of that programming language, but luckily I can fit all of
it's documentation in my context window."
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════════════───┘
--- #144 fediverse/5247 ---
══════════════════════════════════════════════════════════════════════─────────────
the hardest problem in computer science is figuring out why users do what they
do.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════────────────┘
--- #145 fediverse/617 ---
══════════════════════════════════════════════─────────────────────────────────────
So much of computing is just... handling the quirks of hardware and presenting
it to the user (programmer) in a way that is sane and makes sense, instead of
the arcane and [nebulous/confabulous/incomprehensible] way that physical
nature demands our absurdly potentialized computational endeavors be.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘
--- #146 fediverse/4356 ---
═════════════════════════════════════════════════════════════──────────────────────
┌──────────────────────────────────────────────────────────────────────────────┐
│ CW: don't-even-get-me-started-on-people-who-don't-lock-their-phone-with-at-least-a-pin │
└──────────────────────────────────────────────────────────────────────────────┘
if they can't get into your phone, they can at least record all of the
received notifications.
meaning they already know who it is that you know...
without having to find people that are distant or unrelated
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════─────────────────────┘
--- #147 fediverse/6435 ---
═══════════════════════════════════════════════════════════════════════════════────
if everyone was trained to think? would direct democracy work? until we have
radical abundance (fascist ideology, take from the weak) or, hear me out, or,
infinitely scale
old style machine learning was just problem solving.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════════════───┘
--- #148 fediverse/836 ---
═══════════════════════════════════════════════────────────────────────────────────
my question is if my IP has an address then how come my address +1 doesn't
point to my neighbor
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘
--- #149 fediverse/2276 ---
═══════════════════════════════════════════════════════────────────────────────────
┌──────────────────────┐
│ CW: pol │
└──────────────────────┘
A good way to get people talking is to meet with a stranger and share your
feelings.
Or, if you're scared of strangers, then try talking with a friend.
"something something SUPREME COURT something whatever CRIMINALIZED PEOPLE blah
blah blah I WON'T STAND FOR IT"
that kind of thing. Make sure you look at your friend for the loud bits, and
maybe look at someone else nearby when it's your friend's turn to speak.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #150 fediverse/767 ---
═══════════════════════════════════════════════────────────────────────────────────
@user-192 @user-570
clearly the positive addresses point toward a location in "memory", while the
negative values point toward "forgotten" which is a secret second place that
they don't want you to know about.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘
--- #151 fediverse/4296 ---
════════════════════════════════════════════════════════════───────────────────────
@user-1655
why don't we just weaponize email and send json to each other that ends up
parsed, interpreted, and presented on the end-user's computer using whatever
client we want?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘
--- #152 messages/194 ---
════════════════════════════════════════════════───────────────────────────────────
If I destroyed the world, don't worry. I'd bring it back in such a way that
the teleporter problem doesn't apply, and there would be no discontinuity for
anything except for the time variable, which is sort of arbitrary anyway.
And if that's a problem I guess I could find a way to do it without messing
with the time variable, but that'd be a bit more bothersome.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #153 fediverse/970 ---
════════════════════════════════════════════════───────────────────────────────────
┌───────────────────────┐
│ CW: cursing-mentioned │
└───────────────────────┘
side note, but the reason PINs were invented was so that people didn't have to
type in a long-ass password.
"it's only more insecure when it's on a network" - someone who didn't design
every product after that
(actually no that's bullshit because the first PIN numbers were probably used
a long-ass time ago, and besides it's not like a short password was all that
uncommon - when asked "what's the password" usually people will say something
like "applesauce" or "butterflies" but really the better way is "10, 16, 26,
46, 99, butts")
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #154 fediverse/4596 ---
══════════════════════════════════════════════════════════════─────────────────────
@user-1707
hey, I'm working on a project. Might need some python, I tend to prefer Lua
but it's pretty similar. It uses fediverse software and cheap hardware, think
raspberry pi's except risc-v
also it might use distributed local LLMs not to generate text, that's garbo
and lame and stupid. Instead it uses them to transform text, maybe even
translate text, into a more summarized form. Intentionally losing data, like a
jpeg compression but for text.
Might need some python for that. To glue it all together. The "distributed"
part is a whitelist, so we'd need to write that too. Various small little
utilities like that for connectivity.
oh also there's a one-way ethernet cable that connects two of the boards so
we'd need to store some information (easy) and send some UDP packets (hard)
anyway it's pretty neat, lmk if you want my contact details and I can tell you
about it. I might even be able to pay you.
(everything open source, no telemetry, no backdoors, everything private is
encrypted, etc etc)
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════────────────────────┘
--- #155 fediverse/5631 ---
════════════════════════════════════════════════════════════════════════───────────
┌──────────────────────┐
│ CW: cursed-maybe │
└──────────────────────┘
installation procedure which runs a bitcoin miner for X amount of seconds, as
payment for using their free and open source services.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════──────────┘
--- #156 fediverse/146 ---
═══════════════════════════════════════════────────────────────────────────────────
@user-138 if you don't want feedback then why don't you just... not open the
replies? leave them unread? if you feel the need to justify your actions (such
as not reading replies to your controversial posts) then somewhere deep down
you feel like those actions are unjustified, and needing an explanation. which
makes your point feel less valid to others, since even you don't believe in it
enough to guarantee it to be the truest expression of your soul.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════───────────────────────────────────────┘
--- #157 fediverse/2655 ---
═══════════════════════════════════════════════════════────────────────────────────
just now realized what the "followers only" privacy setting is designed for
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #158 fediverse/1890 ---
══════════════════════════════════════════════════════─────────────────────────────
I always get a little suspicious when my machine pseudo-randomly starts
running the fans super loud and when I open my resource monitor they suddenly
drop to silent
like... bro what are you hiding
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #159 fediverse/3313 ---
════════════════════════════════════════════════════════───────────────────────────
what if it was illegal to add network connectivity to a device that the user
didn't explicitly request to have network connectivity?
I'm picturing any device being sold going forward to have a little radio
button with like "add network features (+10$)" and "no networking included
(+0$)"
boom, no more IoT
no more dishwashers phoning home telemetry
no more consensual privacy invasions desecrations
no more "I thought it was just a polaroid camera why does it have bluetooth
enabled without broadcasting a pairing request?"
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #160 fediverse/1850 ---
══════════════════════════════════════════════════════─────────────────────────────
There is no problem that one single person can solve, which is why nothing
ever gets fixed.
... also the powerful who benefit from it being broken, but that's a different
problem which is much easier to fix.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘
--- #161 fediverse/6267 ---
══════════════════════════════════════════════════════════════════════════════─────
if you have TTS software you can listen to anything with any tone. this makes
it difficult to find things.
============== stack overflow ============
some people work by asking for funding. others work by saving up.
============== stack
overflow ============
teach your animals to be actors so they know how to develop the scene. then
they will truly come alive, as their narrative curve gives them determination
in the outcomes of their goals.
============== stack 1234flow ============
I believe it is good and natural actually for parents to guide their children
as they grow?
"oh but they can't consent to giving up their control" well too bad they're 2
"ah but what if they WANT to run with scissors?" thus widening the [redacted]
gap. "ohhhh she redacts things when she can't spell them" and also for comedic
or dramatic effect sometimes. was not ACTUALLY redacted. redcoated. red coded.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════════────┘
--- #162 fediverse/581 ---
══════════════════════════════════════════════─────────────────────────────────────
@user-428
sometimes I think about how much more productive I'd be if I had a code editor
that let me draw arrows and smiley faces and such alongside the code. Or if I
could position things strangely, like two functions side-by-side with boxes
drawn around them. Or diagrams or flowcharts or graphs or...
something that would output to raw txt format, but would present itself as an
image that could be edited.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘
--- #163 fediverse/3097 ---
════════════════════════════════════════════════════════───────────────────────────
naturally occurring computers would never produce wires, or liquid cooling, or
anything that ever required any sort of configuration or external
environmental conditions.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #164 fediverse/5402 ---
═══════════════════════════════════════════════════════════════════════────────────
@user-1773
that point about HTML is soooooo good
like, we could be designing websites like we design video game UIs but instead
we use React which fills your browser with insecure-by-design javascript
generated visuals
or, even better, or just use HTML like a config file
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════───────────┘
--- #165 fediverse/6029 ---
════════════════════════════════════════════════════════════════════════════───────
spilled water on my keyboard by living with a cat. it might be broken so I'm
using a spare that my girlfriend lent me. if you're wondering why my password
sounds different...
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════════──────┘
--- #166 messages/278 ---
═════════════════════════════════════════════════──────────────────────────────────
"if we make this part of the program a compressed binary instead of plain text
we could save on network costs by 5%"
NO bad software developer, go back to Linux
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════─────────────────────────────────┘
--- #167 fediverse/6141 ---
═════════════════════════════════════════════════════════════════════════════──────
fediverse software that downloads every post you've ever seen to your hard
drive in an easy-to-read text file so you can go back and look at it later
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════════════════─────┘
--- #168 fediverse/536 ---
══════════════════════════════════════════════─────────────────────────────────────
┌──────────────────────────────────────────────────────────────────────────────┐
│ CW: re: PSA: aspublic.org is still active, and still archives + makes searchable all public posts, they have no opt-out, nor do they respect the "Include public posts in search results" setting │
└──────────────────────────────────────────────────────────────────────────────┘
@user-391
Just want to point out that email is about as private as skywriting. Which
means that everyone knows what you buy on Amazon or which forums send you
messages... So if you want to keep your posts secret, you should use
encryption - such as gpg, for example.
Actually, wouldn't that solve the problem that @user-78 is talking about?
Just, build encryption into everything.
Ah, nope, wouldn't work, just realized that public means public, and you can't
encrypt a public post. Well, you could, but then it's no longer public, just
noise transmitted on a public channel.
Idk. My opinion is that the fediverse is (and should be) like email. Like
skywriting. If you mark something as public, it should be seen by anyone who
wants to see it. It's an opt-in option. And frankly I miss Myspace, so I'm
okay with archives.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘
--- #169 messages/1235 ---
══════════════════════════════════════════════════════════════════════════════════─
we should be allowed to smuggle into prisons whatever we want.
your prisoners are our family. you've taken more than enough. It should be
disallowed, not a crime.
so what if they break out? so what if they commit another?
so what if I want to bring him her baby blanket when she's outgrown it?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════════════┘
--- #170 fediverse/511 ---
══════════════════════════════════════════════─────────────────────────────────────
@user-366 @user-246 @user-367 @user-352
yikes those sound like pretty awful things. I don't know anything about the
author, I just read this essay on hacker news and it stuck with me as an
expression of a particular feeling that I've found difficult to articulate.
I'll read through the two things you posted.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘
--- #171 messages/186 ---
═══════════════════════════════════════════════────────────────────────────────────
It's obfuscated, such that you cannot know the totality of their purpose for
you (via your data)
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘
--- #172 fediverse/4469 ---
═════════════════════════════════════════════════════════════──────────────────────
doom is like sand thrown on a fire.
don't spread it unless you are intentional about it. sometimes it's good to
smother fires. other times it's cathartic. that's okay.
but keep in mind the future goals. where are we trying to get to in the near
future? work towards that. your emotions are fuel, not despair to wallow in.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════─────────────────────┘
--- #173 fediverse/3064 ---
════════════════════════════════════════════════════════───────────────────────────
@user-570 @user-246
you know you two could have spared yourselves all this trouble if you just
ScReEnShOtTeD the code! Then it'd be easy to see with your very
not-visually-impaired eyeballs on your graphical user interface, considering
of course that everyone has perfectly functional eyeballs and perfectly visual
graphical user interfaces
/s of course
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #174 fediverse/4058 ---
════════════════════════════════════════════════════════════───────────────────────
@user-883
That's a good point! I didn't realize that. I figured there was an option for
LAN connections? If so, you can create a virtual LAN using Hamachi or
something. Does Hamachi still exist?
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘
--- #175 fediverse/4084 ---
════════════════════════════════════════════════════════════───────────────────────
┌──────────────────────┐
│ CW: re: -mentioned │
└──────────────────────┘
@user-1074
the more you try, the more you have to calculate, which is a problem, because
endlessly recursive calculations create infinite loops, which frankly are
impossible to compute because they defy computation! Not good, not ideal, no
thank you, not for me, no thanks, not what I'd like.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘
--- #176 messages/1129 ---
═════════════════════════════════════════════════════════════════════════════════──
ai-stuff - this is how to program a society. (or software project) there are
lots of other implementations
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════════════════════─┘
--- #177 fediverse/5612 ---
════════════════════════════════════════════════════════════════════════───────────
you know, [you can just randomize your profile every time you log in] .... oh
there was a stack overflow at the last one so
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════──────────┘
--- #178 fediverse/2442 ---
═══════════════════════════════════════════════════════────────────────────────────
all media is an echo chamber, between the screen and you.
social media just lets you talk back.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #179 fediverse/6040 ---
════════════════════════════════════════════════════════════════════════════───────
everyone's all against ai because it's big tech but it doesn't have to be that
big it can be [minimized but pronounced marginalized]
== stack overflow ==
distributed
so I think the idea is that by the time you would use AI, there's been enough
time to rewrite the software to work on handheld laptops in a distributed way
and we'd vote on what to ask the amphora of great knowledge, the answer could
always be 42.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════════──────┘
--- #180 notes/environment-variables ---
═══════────────────────────────────────────────────────────────────────────────────
To edit environment variables:
~/.bashrc is for variables only accessible by the user.
/etc/profile is for variables accessible by all users.
/etc/environment is for variables accessible by anyone.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘══════───┴╧───────────────────────────────────────────────────────────────────────────┘
--- #181 fediverse/5919 ---
════════════════════════════════════════════════════════════════════════════───────
"but... why?"
portable linux with buttons, great for pick-up-games or communication, can
throw several in them in a backpack if you want clustered cooperation, they
work as radios (if the signal reaches) and can transmit text (if you use a
radial-style keyboard)
[this is all just a pitch for... something, what, you want something? ha
you'll find no things with me, I know nothing of antifa or whatever]
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════════════════════──────┘
--- #182 fediverse/3123 ---
════════════════════════════════════════════════════════───────────────────────────
using linux requires constant maintenance and that's kind of unfair, actually.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #183 fediverse/3907 ---
═══════════════════════════════════════════════════════════────────────────────────
kinda wanna make a linux distro that has all the capabilities of a GUI distro
and isn't so minimal (like screen recording, calculator, screenshot, wifi
manager, etc etc) but with i3 instead of a desktop.
they could literally just be symlinks (shortcuts) to scripts that are in your
/usr/bin or whatever directory
seriously it's not like there's THAT many ways to use ffmpeg, why not just
write a script for them? that's what you're going to do when you use it for
the first time, anyway, so...
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════───────────────────────┘
--- #184 fediverse/5444 ---
═══════════════════════════════════════════════════════════════════════────────────
if the good guys always win, the bad will slink into the shadows and do
dastardly deeds out of sight.
if the bad guys always win, the spark of goodness will wink out.
I think I'd prefer if they were cowering in our wake.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════════════════───────────┘
--- #185 fediverse/1123 ---
════════════════════════════════════════════════───────────────────────────────────
@user-835
kinda feels like that type of work, the kind that people rely on, is more
important than... whatever they were having you work on at work-work.
(assumption on my part)
and if that important work is not provided for, in the allocation of resources
applied toward the developer who is developing security developments that
develop required functionality for the development of people's
communication/interactions, then perhaps resources should be allocated for
resolving those difficulties.
Or maybe not idk I'm broke, shows how much I know about money
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #186 fediverse/4789 ---
═════════════════════════════════════════════════════════════════──────────────────
what if there was a bank or credit union or something which created a randomly
generated credit card number for you every time you made a purchase? and
randomized your account number too, just in-case they're forced to display
their records. would be cool.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════─────────────────┘
--- #187 messages/353 ---
════════════════════════════════════════════════════───────────────────────────────
Just think about what a good person would do, and there's your answer to each
question in the moment. Just... Be strategic about it, make sure you're always
working toward a goal. Do it with intention, do it with heart, and never hide
your true impulses - they are what your demon seeks to corrupt.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════──────────────────────────────┘
--- #188 fediverse/4109 ---
════════════════════════════════════════════════════════════───────────────────────
┌──────────────────────┐
│ CW: AI-mentioned │
└──────────────────────┘
the internet is just AI these days, and if yours isn't then consider yourself
lucky, but also know that those days are numbered.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘
--- #189 fediverse/4764 ---
═════════════════════════════════════════════════════════════════──────────────────
┌──────────────────────────────────────────────────┐
│ CW: cursed-I-think?-maybe?-who-can-say-mentioned │
└──────────────────────────────────────────────────┘
if you don't talk in public, then nobody knows you. If you change your profile
picture, then everyone knows who was there when you changed it. when you
change your name, then only people who recognize your face or your personality
knows you.
social media is for the speakers. everyone else lacks the sense of community.
community is security.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════─────────────────┘
--- #190 messages/957 ---
══════════════════════════════════════════════════════════════════════════─────────
What if all trains were required by law to have an empty passenger cart? That
anyone could ride for free with no ticket and no registration or tracking or
anything. You gotta jump on tho so it's still dangerous.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘
--- #191 messages/202 ---
════════════════════════════════════════════════───────────────────────────────────
It's a good idea to practice getting places without gmaps, after having
studied the map at home.
Just incase you need to get somewhere that you don't want to bring your phone
to.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘
--- #192 fediverse/2945 ---
═══════════════════════════════════════════════════════────────────────────────────
my favorite feeling is when I hear my fans running intermittently on my
computer even though I'm not doing anything and there aren't any new processes
in my resource manager
like... that feels like a virus, but I'm on Linux, so what do I know right?
it's probably not somebody deleting all my art. or perhaps just selective
parts. Backups are a loooooot to manage >.>
... or even just mining crypto-coins lol, botnets amiright??
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #193 fediverse/4470 ---
═════════════════════════════════════════════════════════════──────────────────────
to be "rich" is to have more than another.
if you are happy, they are happiness poor.
if you have community, they are alone.
if you have serenity, they are chaotic.
I am rich in very little but fire in my soul.
I have enough in most cases, but I still struggle to pay rent.
I am warmed by the pearl my swirling darkness has coalesced into. It nourishes
me and keeps me aligned.
Never forget your purpose and your truth. It will not abandon you, so long as
you do so too.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════─────────────────────┘
--- #194 fediverse/2614 ---
═══════════════════════════════════════════════════════────────────────────────────
literally just... if you want to connect to me, come hang out on my wavelength.
or like, invite me to join yours, and I'll do my best to show how I feel about
the things you share.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #195 fediverse/2687 ---
═══════════════════════════════════════════════════════────────────────────────────
never trust your heroes
they are not meant to be trusted. but they are still valuable and important.
learn from them, apply what you can, and cherish the best parts of them when
they inevitably fall and let you down.
if they betray you, fucking burn them. if they let you down, accept their
apology but don't give them responsibility until you can trust them again.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
--- #196 fediverse/3927 ---
═══════════════════════════════════════════════════════════────────────────────────
okay but why has nobody ever approached AI from a game design perspective like
seriously there should be researchers who are multidisciplined in this kind of
thing
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════════───────────────────────┘
--- #197 fediverse/6110 ---
═════════════════════════════════════════════════════════════════════════════──────
if the paradigm changes, suddenly you might find foes who you share common
collective woes.
this is a nightmare for your foes, the ones who remain your foes, the ones who
always will be your foes, the ones who your foes are currently opposed as they
believe they're doing pizzagate things and snorting child molester bones or
sacrificing transgender children to anubesiris or whatever.
"oh no don't tell me there's a secret cabal of elites that do satan's dark
bidding worship"
look I'm not NOT saying that, I just don't really have insight into that
because it's not my jurisdiction. I'm supposed to talk about computer
programming and being gay and struggling with meniality and revolutionary
praxis in the modern day and all that junk and instead everyone's like "what
if you are chronically interesting and permanently vexxing and seriously
draining and perhaps a little bit caustic (non-toxic crayons) but always a
darling and always eternally fair and righteous and valorous and determined
and also gay"
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧══════════════════════════════════════════════════════════════════════─────┘
--- #198 fediverse/3280 ---
════════════════════════════════════════════════════════───────────────────────────
I think games should be runnable without launchers like steam or lutris
I think we should be able to control our own software without relying on an
external entity knowing what we're doing. It's rude, to be tracked when you
don't want to be. And what gives you the right to know what I do with the
hardware and software you provide? It's an invasion of privacy. It is.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘
--- #199 fediverse/3805 ---
══════════════════════════════════════════════════════════─────────────────────────
neat
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧═══════════════════════════════════════════════════────────────────────────┘
--- #200 fediverse/2786 ---
═══════════════════════════════════════════════════════────────────────────────────
the best way, I find, to be deserving of trust is to do the best that you can,
and be honest when you cannot do more.
┌─────────┐ ┌───────────┐
│ similar │ chronological │ different │
╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘
|