Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)O
Posts
0
Comments
512
Joined
3 yr. ago

  • The doe has no concept of pronouns. I promise calling it "it" isn't doing anything to hurt it.

  • Hell yeah. It's my favorite piece of clothing. Got patches and pins all over it, a real battle jacket. Thing will probably outlive me, too, particularly at the rate we're going.

  • Dude this bugs me so much. More so when it's in a personal conversation, and the person says idk Google it. Particularly if it's something they're clearly interested in. I'm not looking for the information as much as I am the dialogue.

  • Man, nut milks (hah) and oat milk are fantastic. I'm not vegan, but I absolutely support reducing the animal products you consume. Milk is a big deal for me, and while they don't always quite satisfy in the same way, animal milk alternatives are pretty awesome.

  • So get mad at the parasite, not the person who likes his plants at living places.

  • Elsewhere, there was a giant hurricane. Demons now roam the world, more than used to at least, but they mostly appear as more unfavorable people. If you run into a big dude with a chunk of iron much too large to be a sword, massive, thick, heavy and far too rough, more a chunk of iron really, he's not a bad dude, just don't do anything to his girl.

  • But that's just circular. Girls can't be direct because guys are assholes. Guys can't be direct because they don't want to be assholes. If standards for one must change, guys being ok with being assholes but being direct with their assertions, then so too must the other change standards, i.e. being direct with their signs.

  • You never know what security holes exist until they're exploited. Nothing you can really do about that. Security and convenience have always, and will always, be a trade off and a matter of personal acceptability. If you host anything, it will be potentially vulnerable, way less so if you take proper precautions. If you're not just overtly insecure, you'll probably be fine, but there's no way to say for sure.

  • It's also dismissive of the fact that a lot of women give vague signs as their signs of interest. It's really just a damned if you do or don't situation. Either you interpret the vague signals as disinterest and move on, or you read them as a potential go ahead and you're a dick.

  • We all have to make judgements based on the information our tools feed us. These 3 are some a-grade tools, so just make sure you know how to interpret the information they put out, and you're fine.

  • Tech tried to tell them it was unnecessary, would take forever, and would be expensive. I'd agree with you if, for a second, the customer sounded like they wanted to drop the matter. No, this was the customer absolutely digging their heels in, and the tech did what they could to get an irate woman out of the store.

    At a certain point, you have to just let people make their mistakes, and get out of their way. This is exactly how I interpret the situation.

  • In a customer service setting, often times that's all you can do. The customer knows what they want, and particularly if there's money to be made, your employer will require you to do so. It sounds like this place wasn't exactly like that, but dude said multiple times this was unnecessary, and the customer still wanted it. He told them it'd be long and expensive. And unnecessary. They said do it. At a certain point, we have to trust that the customer really is their best advocate, and just do what they want.

  • Is it really a scam if you tell them up front the work is unnecessary, you don't want to do it, and they insist? At a certain point, it's the customer hoisting themselves by their own petards.

  • That seems to be the way of the world, lately. Kill whole departments and just kinda hope stuff keeps working, and ignore it when it doesn't.

  • There's nothing to be done, nor should be done, for anything someone individually creates, for their own individual use, never to see the light of day. Anything else is about one step removed from thought policing - afterall what's the difference between a personally created, private image and the thoughts on your brain?

    The other side of that is, we have to have protection for people who this has or will be used against. Strict laws regarding posting or sharing material. Easy and fast removal of abusive material. Actual enforcement. I know we have these things in place already, but they need to be stronger and more robust. The one absolute truth with generative AI, versus Photoshop etc is that it's significantly faster and easier, thus there will likely be an uptick in this kind of material, thus the need for re-examining current laws.

  • I think the biggest thing with that is trump and Putin live public lives. They live lives scrutinized by media and the public. They bought into those lives, they chose them. Due to that, there are certain things that we push that they wouldn't necessarily be illegal if we did them to a normal, private citizen, but because your life is already public we turn a bit of a blind eye. And yes, this applies to celebrities, too.

    I don't necessarily think the above is a good thing, I think everyone should be entitled to some privacy, having the same thing done to a normal person living a private life is a MUCH more clear violation of privacy.

  • Game theory would lead you, as the tortured, to realize that they're just going to beat you until death to extract any keys you may or may not have, so the proper answer is to give them 1 and no more. You're dead anyway, may as well actually protect what you thought was worth protecting. Giving 1 key that opens a dummy vault may get the torturers to stop at you, thinking this lead is a dead one.

  • If you set it up correctly, this is essentially what it does. You have a disc that is, say, 1tb. It's encrypted, so without a key, it's just a bunch of random noise. 2 keys decrypt different vaults, but they each have access to the full space. The files with the proper key get revealed, but the rest just looks like noise still, no way to tell if it's empty space or if it's a bunch of files.

    This does have an interesting effect. Since both drives share the same space, you can overfill one, and it'll start overwriting data from the second. Say you have a 1tb drive, and 2 vaults with 400gb spent. If you then go try to write like, 300gb of data to one vault, it'll allow you to do so, by overwriting 200gb of what the drive thinks is empty space, but is actually encrypted by another key.

    It's been a while since I've messed with this tech, and I'm mostly a layman, but this should be a fairly accurate depiction of what's actually happening.

  • Mp3s, standard def movies, HD movies, and 4k movies.