Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)G
Posts
0
Comments
323
Joined
1 yr. ago

  • I would put it down to censorship. Not of Linux directly but of information about noncomformity. Windows is the default OS for desktop PCs and I imagine it is easier to get exposed to the idea of searching an alternative in the west than in China. If you never question the oppressive bullshit corporations are doing to you, you will not think to break free and use Linux.

  • Have you seriously never though about how cool it would be to see where your friends are, live on a map?

    Its a realy useful feature when you want to meet up with someone and (at least) on person doesn't know the area, or just organizing multiple people.

    Having that posibility available is a good thing. But signal decided that having that capability in an app means it could be misused so they actively decided against implementing it.

  • I think its the machine part and not the literal "forged" part. A wooden club, rope or poison are all not forged but still made by man. Same with a fist.

  • There are reasobable situations where a bike isnt usable/allowed/suitable and you want to tell people about it.

    Just think of Pokémon games. You can't use that here!

  • You don't need something ever. Sometimes you just want something because the alternative is realy bad. I don't need to eat. I want to eat because I don't want to starve.

    I want to watch a movie with my partner at the agrees time because otherwise they will be mad. I want to access my digitalized documents to send a letter in time because otherwise I will have to pay late fees. I want to access my gameserver because that's the one time a week I get to have fun with my friends from my college time.

    There are many situations where I'd rather do the thing I want instead of doing maintenance.

  • There is still a good reason to know about problems early. Without any monitoring you will find out about problems exactly in that moment when you what to use the service that doesn't work. Sometimes you need something quick and you don't have time to debug and fix in that moment. If you get an alert early you can decide to fix it right away or in a few hours or tomorrow.

  • But that is also the worst part of boarderlands

  • Linux is famously both American and Corporate /s

    But yeah sytsem76 and valve are both american and valve is corporate. And around Lemmy you would think they are the only ones responsible for the Linux boom.

  • The verifier does not have the information which sites you use. That's the point of the setup. All communication goes through you, never the site to the verifier directly. You only pass cryptographic values between them that does not include identifiable information (neither about you to the website, nor about the website to the verifier). The verifier knows who you are, the website knows that you are old enough. Nothing else.

  • Looks better but is basically unusable for navigation in any sense. Mercator at least preserves direction but not size. Robinson preserves nothing. It combines all the drawbacks without adding any advantages except "looks nice". Which is actually the philosophy of the projection:

    I visualized the best-looking shapes and sizes. I worked with the variables until it got to the point where, if I changed one of them, it didn't get any better. Then I figured out the mathematical formula to produce that effect.

    I can respect that. 10/10 no notes.

  • This system does nothing to protect against an allowed user helping a not allowed user to gain access

    There is no system in the world that can fully prevent an authorized user to grant access to an unauthorized user. Even with an all time on camera and screensharing I can still find ways to have someone else control my computer while I "authorize" the connection with my face in the camera

  • Super easy. Technology has existed for quite some time and was already used in the encrpytion of web traffic.

    Basically: you sign up with your "age verification institution" (ideally a service of your government because they have your ID anyway and no profit motive). This involves createing a private key (reaaaaaaaaaaly long password that is saved in a file on your device) and saving the public key with that institution. They also check your ID to ensure your identity and your age.

    When you want to visit a 18+ website, the website sends you a nonce (loooooong random number). You take that nonce and send it to the verifier, along with a signature of your private key (and the age they want you verified against). The verifier verifies your signature using your public key. They then sign the nonce with their own private key, thereby verifying, that you, the owner of your private key (whos identity and age they have verified) are above the asked age theshould. You then send the signed nonce back to the 18+ website and they can verifiy the signature to confirm that a trusted age verifier has verified your age.

    The site never has access to your identity and the verifier never knows which site you visited, only that you wanted to visit a website that wants to know if you are of a certain age.

    (The corresponding technology was used for OCSP Stapling in TLS verification ... and has been discontinued last year because nobody was using it ...)

  • The cosmologies are difficult to compare because "power" in middle earth is just kinda ... power. Sauron doesn't need to have a "chain lightning lvl 10, 100.000 damage per second" ability. He can just ... exist, and all the evil (or just lesser willed) creatures around will just fully accept him as their leader and do whatever he says. It a cosmic force or aura that is never quantified in any way. Same with ganfalf. He does very little magic. His power is also mostly in his presence that compels the good guys to do good things.

  • Participate in closed platforms, where you can be reassured you’re engaging with real humans - but you’re also under total surveillance.

    Closed platforms where the only propaganda bots are the ones controlled by the platform. They can then remove ADs from the business model and instead finance the platform by selling access to the bot accounts. And people will think they are in the perfect social media without advertising and only RealPeople™ that they can completely trust.

  • Honestly, the next Democratic president might actually deserve one if they stop the active fashist takeover of democracy. Even if they do nothing else and continue all current wars etc. Not being Trump could probably save thousands if not millions of lives.

  • You can read right?

    Führer = HitlerSomething-Führer / Führer-Something = not Hitler

  • The word Führer is 99% used for Hitler. There are many variants that are OK to use though. Most notably Anführer (if Führer is leader, Anführer would be "the one who leads ahead") which is the common word to use for leader. Others are composites like Bergführer (mountain guide).

    The swastica also existed before the nazis but is now forever tainted.

  • A memory pointer? So it must have been a program sending a pointer using an API to itself so it ends up in the same process again?

  • I wouldnt blame that on stupidity as much as on ignorance and naivety. Many people simply don't think about anybody deliberately misusing their design. The idea that somebody could even want to access somebody elses receipts didn't occur to them. And if they were still doing their studies they might not have known that you can "combine" SQL queries and ask for two things at once.

    I don't blame the girl, but whoever chose her to design a system with sensitive information.