vrighter

@[email protected]

This profile is from a federated server and may be incomplete. Browse more on the original instance.

vrighter,

well, yes of course i trust you less. It’s the whole point of wanting labelling in the first place, so I can know it’s not trustworthy in any way

vrighter,

but why? you’ll still measure things in football fields, elephants or “large boulders” so it won’t affect you much

vrighter,

telegram is not encrypted by default, and does its best to make you forget to enable it for each individual contact. if you want to do a group chat, you’re out of luck.

Telegram is only (partially) secure for pedantic power users, which most people aren’t.

vrighter,

so, relative to pretty much all other messaging services, it might as well not be.

You’re saying “by default not everyone can read your messages, only you, the recipient, telegram themselves and anyone who they might decide to share them with, with neither your consent, nor knowledge”

When compared to “nobody except you and the recipient” that becomes effectively equivalent to “nothing”.

also, not end-to-end ever when it comes to group chats

vrighter,

that would be very quickly caught by a network sniffer, because it would have to be sent from your own device. Otherwise they’d just be sharing the undecryptable ciphertext you sent to their servers

vrighter,

what does that have to do with anything? if you have to encrypt your messages manually yourself, that kind of proves the point that the service itself is not secure. And it’ll still show up on a network sniffer that they’re sending it to two places

vrighter,

not even close. They were always intended for different purposes. They never were in competition

vrighter,

it’s because taxes vary per state. I don’t think it’s a good one, but it is a reason

vrighter,

because it doesn’t work. case in point: it hasn’t. It improves on one aspect, and regresses (very very badly) in every single other aspect.

vrighter,

you’re wrong for valuing peace of mind.

/s

vrighter,

it’s an acronym (as opposed to initialisms, which are not pronounced as a single word). There is no rule on pronunciation.

scuba nato laser

We don’t do this for any other acronym. There is no rule about the pronunciation. It’s arbitrary. The creator chose “jif”, so that’s the “canonical” one.

vrighter,

it’s pretty much just arch without systemd then. which is enough of a dealbreaker for me, as I think that systemd is the best thing to happen to linux since sliced bread.

vrighter,

mandrake was my first linux distro. I got it from a german magazine in 2004

vrighter,

and even worse, sometimes they even reply days later!

vrighter,

don’t worry about it. I understand

vrighter,

cheers!

vrighter,

you replied too quickly! You’ve ruined it now.

Understanding init freedom?

I’m planning to move over to Guix over NixOS, as soon as my current situation improves and possibly import a new libre respecting laptop (Star Labs is thankfully available in India). I do have a very old laptop with a Celeron processor and 4GB of RAM with Guix installed already, and what has come to my attention is that it...

vrighter,

cat isn’t the one writing to the drive there.

vrighter, (edited )

cat is writing to a file descriptor. Which is pretty much transparent to it. it’s just sometimes redirected. What happens when cat writes to it is not up to cat. In fact, I looked at the source of coreutils. there are two sub implementations of cat. copy_cat, which uses copy_file_range when the input and output are a regular file, and simple_cat which does a simple read/write loop. In both cases the target file descriptor is STDOUT_FILENO. So the target file descriptor is hardcoded to 1. Cat is not aware of where the data is coming from, or where it’s going. It is hardcoded to only ever write to stdout.

edit: re the reflink thing, you were probably thinking of cp, not cat.

vrighter,

to be fair, ffxvi is not really an rpg either.

vrighter,

pretty hard to do computation on a pdf. which is what risc-v is. You need someone to design and build a chip according to what’s in those pdfs

vrighter,

i was replying to the point that all hardware is made by large corporations. That will not change, irrelevant of whether the isa is open source or not.

vrighter,

and arm do not manufacture chips. Usually tsmc or samsung do. The fact that chips exist is orthogonal to the argument of who ends up manufacturing them

vrighter,

there’s the part that google added on top, which isn’t open.

And then there’s rcs itself, which isn’t open either. You need to get a license from the gsma

vrighter,

and then steal it agaiiiiiin!

vrighter,

nope, it’s a waste of a button. I hate that button with a passion.

vrighter,

the entirety of the next, unreleased version of rhel will be in centos stream. Not the current version

vrighter,

suppose they do build rhel out of centos stream. You arrive an hour later and download centos stream. It has been updated since then. You don’t have rhel sources.

vrighter,

they use github to train copilot, which sometimes reproduces code without paying attention to the license of the code it’s regurgitating.

vrighter,

Modern cpus actually do have trng hardware built in. So yes, modern computers can create numbers out of nothing, because they have specialized hardware to do so

vrighter,

there exist other random distributions than the uniform distribution

vrighter,

the numbers do seem absurdly high. That’s 5 times higher energy density than the current state-of-the-art

vrighter,

not decades from feasibility. But a physical impossibility. Some of the stuff they were supposed to detect was literally not present in a detectable quantity in the single drop of blood they scanned.

vrighter,

so is anything in any computer

vrighter,

yeah, no you have a misconception of what risc-v is.

Risc-v is an isa not a chip. the isa is open, available to anyone.

Implementations of risc-v (actual working designs) are usually not open. They are just guaranteed to be able to execute risc-v instructions.

So risc-v is neither more nor less vulnerable to hardware backdoors than any other architecture

vrighter,

only half a million miles to walk. At an average walking speed of 2.8 mph, that’s only about 20 years of non-stop walking. 30 if you decide you stop to sleep 8 hours a day.

Better get started then, no time to lose.

Ps: remember that the moon might not be in the same place in 30 years. A map would be outdated by the time you arrive.

vrighter,

maybe try getting adopted by a street cat then

vrighter,

re plague tale 2: I found that it crashed (more like hung, process was still running) whenever I opened one of those screens. It seemed like the crash occurred for me when I scrolled through options on those menus too quickly. ex: switching to a different skill while the small preview video clip from the first one was still loading. I ended up scrolling really slowly through those trees

vrighter,

“the next generation cloud-native”

that’s as far as I got. Cloud native is an immediate, non-negotiable red flag for me

vrighter,

the cloud is just someone else’s pc. if it can work in my machine, it can work there. The hard part of cloud stuff is the stuff outside your image. setting mount points, port redirections etc. When stuff doesn’t work, you usually don’t fix it in the image, but probably some configuration of the container.

vrighter,

no, he wasn’t. The trip doesn’t last for 48 hours. He consumed the mushrooms 48 hours beforehand.

vrighter,

absolutely nothing outside of the recording studio. It’s useful when handling intermediate s when you’re mixing several recordings. Once the mix is done, it’s useless

Nightshade - A new data poisoning tool lets artists fight back against generative AI (lemmy.world)

The tool, called Nightshade, messes up training data in ways that could cause serious damage to image-generating AI models. Is intended as a way to fight back against AI companies that use artists’ work to train their models without the creator’s permission....

vrighter,

these don’t work for any longer than a couple of days, at most.

vrighter,

yeah but if you’re responsible enough to only spend money you actually have, you’re fucked

How does macOS manage virtual cores on Apple silicon? (eclecticlight.co)

One of the most distinctive features of Apple silicon chips is that they have two types of CPU core, E (Efficiency) cores that are energy efficient but slower than the P (Performance) cores, which normally run much of the code in the apps we use. Apps don’t decide directly which cores they will be run on, that’s a privilege...

vrighter,

one of the most distinctive features of their 2020 arm design is a thing that has existed since 2011 on pretty much all smartphone arm chips in use?

vrighter,

your hands would probably still be warm, due to holding on to a hot beverage

vrighter,

why are you speaking in german?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • uselessserver093
  • Food
  • aaaaaaacccccccce
  • test
  • CafeMeta
  • testmag
  • MUD
  • RhythmGameZone
  • RSS
  • dabs
  • KamenRider
  • TheResearchGuardian
  • KbinCafe
  • Socialism
  • oklahoma
  • SuperSentai
  • feritale
  • All magazines