Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)J
Posts
2
Comments
578
Joined
3 yr. ago

  • My thoughts exactly. It's a clickbait headline targeted at anyone who doesn't realize that a third of people believe literally everything is "god's plan."

  • The earlier the bubble pops, the less damage it does to us all. So yes, cheer for the burst.

  • A lot of technical answers, but consider a social driver: Linux users and developers are a lot more likely to prefer to do their computing on a "real" computer with a keyboard and large screen. Therefore, Linux as a desktop/laptop OS will always be significantly ahead of mobile offerings.

  • Earlier switches were primarily about cost-savings, so Microsoft would just swoop in with discounts and backroom deal$, or offer discounts to anyone considering copy-catting, isolating the early-adopters.

    This case is not about cost but data sovereignty, and it's also a smaller switch (keeping the Windows OS), so we can have hopes for better success.

  • Indeed. Best to think of disk encryption as protection from physical access -i.e., theft, but also accidentally recycled drives later on. It provides zero protection from somebody attacking your running system, that's the job of the operating system and client software like web browsers. While the system is running, the drive is decrypted and unprotected.

    I just prefer fde because it's simpler. There's no guessing about what needs to be encrypted and what doesn't. There isn't any human-noticiable performance impact on modern computers, so there's not really a downside besides having 2 password prompts whenever I actually do a full reboot.

  • Are these not locked-down corporate-type machines? Same with school chromebooks, they likely make it very hard to escape the control.

  • Yeah, since when is a form letter sent by constituents considered “spam”? Also, care about abused children? How many europeans have been prosecuted for their connections with Epstein?

  • Don’t forget /tmp, and maybe logs too. Theres docker storage and kvm image locations if you use that. Maybe others. FDE also makes an evil maid attack much less trivial too.

  • I would generally keep sync and backup separate, but if you are using a cow filesystem like zfs on your unraid machine, it could take reliable snapshots.

  • Restic is amazing. I use it to push to backblaze b2. I have a lot of redundant data (eg tar files of systems that are only slightly different) and it de-duplicates the data to an incredible degree.

  • I have a firehose folder on freshrss that has its own rotation rules such that posts are only retained for a couple days and are then deleted. It is also excluded from the “main” feed listing. Works great for news sites.

  • “Open source” was literally invented to make Free software palatable to capitol.

  • Certainly a tough question. Use Lemmy, okay, but would you send financial contributions to said Tankie? I wouldn't, and I would judge someone that did. I don't think anyone can be expected to evaluate the moral virtues of the developer for every technology they use. That's a supply chain nightmare. But, given the small number of people we directly sponsor, maybe then it's appropriate to have some standards?

    As a non-US citizen, I actually consider /any/ American company that has not moved to be complicit in fascism. At the same time, I havn't completely stopped patronizing American companies, so I'm not living up to my own standard. I suspect everyone is a little hypocritical.

  • In the article they mention videos with literal AI watermarks being passed around as if they were real. The targets want to believe they are true and will ignore anyone debunking them.

  • If Lemmy, or any other fediverse social network, ever got that big, you would be guaranteed there would be plenty of splinters of de-federation in the network. There would be small networks totally isolated from the mainstream cluster, and others that only federate parts of it. You could choose to hang out in some counter-cultural bubble, or choose a curated connection to the biggest networks, if you didn't want to engage in them fully. The trick would be finding "your people," but the tech works.

  • I think the article really makes the point that it doesn't matter. The videos can LITERALLY have a watermark on them from the AI software, and people just dgaf. The battle is lost before it begins.

    As with things like quotes and claims that could always be fake, it's back to the old journalistic practices of verifying sources with a second source. But that means being ignorant of things that were not being investigated by journalists, which creates a different filter bubble.

  • It doesn’t at all. It’s just text content. They could have put all the links at the end as a menu I guess, but it doesnt even have that.

  • Impossible? gopher://gopherpedia.com:70/1

  • Right after COVID, they used largely unnecessary back-to-work orders to trim the workforce. That was nice for them, as they don't pay severance if you quit over back-to-work.

    Now that is exhausted, they can still use AI as cover for hiring less and laying off workforce to avoid spooking investors into realizing they are contracting.

    Also remember that tech companies tend to be evaluated based on insane growth predictions, so anything less than that can spook investors and crash their stock price. They are desperate for cover. Same reason they make lots of fake job postings they will never actually hire for. It's all a shell game for the stock price.