Skip Navigation

Posts
11
Comments
1490
Joined
7 mo. ago

  • This is the way. "I don't want to learn another operating system!" - My mom, dealing with Windows 10 EOL. All she needs is LibreOffice set to look like Excel/Word, and FF.

  • Amen to that.

  • Ahhh, yes Pandora. The Good Ol' Days.

    And I'm the only algorithm I need for finding Swedish power metal, because I put in the hours to find what I like. But, admittedly, my taste in music is generously called "eclectic" by some, and "trash" by my loved ones, so there's no algorithm that's ever even believed I was a real person and not just 3 raccoons in a trench coat.

  • I say the same thing, where "flying" is transit time between places, even if there's a layover. There's a difference being at home and "on duty" as in on-call and ready to go and being stuck in an airport for 10 hours because you're doing a Chicago-LA-Chicago return and stuck in LA because the shitter's broke on the plane you took there and need to get back to O'Hare.

    Seriously, that person is not at home and not able to really have control over their own time because of their job. It's more than being just "on duty" in a sense that they shouldn't be getting paid.

    1. I also love seeing the Vasquez Rocks for the same reason. Had a friend that lived in Antelope Valley and I would drive by them any time I went out to his place.
    2. Same trick is pulled across Africa. If a conference takes place a certain distance from the capital city, you get per diem. So you'll see clusters of hotels with fancy conference centers just outside the radius. It's just a day trip but people will play receipt fraud and make it look like they stayed the night and split the price with whoever is selling receipts.
  • The first time I ever had a meatball sub was at this small local deli. i was maybe 12, and it blew my mind how good it was. Consistently amazing for years. The first time I had a Subway meatball sub, I was sure that had messed up, it was so bad.

    But they hadn't, it was I who had messed up eating at Subway.

    And yes, turkey can hit if done well. It's just rarely done well.

  • Are you looking for the gems? Or making the gems? Either way, you're doing the Lord's work.

  • Absolutely fair point, and I agree with you to some degree. I imagine that it's somewhere in the middle, where bands have flooded the space so that if no technical means exists for discovery, we've traded off friction points. Instead of the 90's version where people would drive 40 minutes to the cool reord store in the next town over, now discerning listeners looking for gems have to wade through more and more bands they don't like. It's no one's fault, it's just how it is.

  • One of the main uses of email is communication with companies. And they won’t have a signal account just to exchange passwords with you

    No. Email is just a non-centralized protocol. While not everyone uses it the same way, most normal people never use email to communicate with companies, who are increasingly forcing people to use chatbots anyway. So it's not even a reasonable point to make. Password protected emails are meant to be between people who have an established relationship. If a company needs someone to send them encrypted message, they'll have a platform for that, just like Wikileaks or ProPublica, so you're not making a valid argument about that.

    If some Youtuber is someone that does anything privacy-related enough that they should be receiving encrypted emails, their public PGP key should be on their YT profile and you can send them an encrypted message anyway with that. Protocols and methods exist already to accomplish what you're talking about. You need to complain to the Youtuber for not practicing good security and privacy, not to Proton for not creating some mind-reading Diffie-Hellman scenario. Really, do you think that you can just send some random person a message that says "click link to open secret message!" and not expect it to just look like phishing?

    If you'd rather use signal, use signal and send them an attachment encrypted with their PGP public key. This isn't hard, I don't even know why you're trying to argue all these weird non-existent edge cases like they're everyday issues.

  • Do not cite the Deep Magic to me, Witch! I was there when MP3s were new. If it wasn't for a HD crash in 2003, I would still have MP3s from the 90s.

    Plus, I was agreeing with you. WTF?

    I'm not talking about sharing in particular, I'm talking about friction involved in discovery. You have to know someone to share the link, even today. So someone is out there spending 10 hours a day listening to random stuff on YT just to get something to share, not waiting around for the algorithm to give them music.

  • So you're saying that no one listens to music that isn't spoon-fed to them?

    My friend, algos won't show me Swedish power metal, I gotta go find it. No one waited for Rage to come on the radio, you sought it out at the record store or from friends that had copied demo tapes and mix tapes.

  • You're exactly right.

    WTF algorithm was there to serve us on demand copying mix and demo tapes? We had to touch physical media to get the songs. It took effort, sometimes $5 in gas money, a stack of blank tapes at home, and working two-deck stereo.

    Not just for Rage-type alt music and punk, but the entire early hip-hop and rap scenes were almost exclusively bootlegged and home-made.

    This isn't about "kids today have it so easy" - this is about good songs overcoming massive headwinds to get popular and simply heard. Music discovery was word of mouth, rumors, and who had what on hand. The thrill of the hunt got you amazing results.

    Right now there's probably someone making killer music and posting to YT or peertube with like 3 views because everyone just accepts the algo slop and no one looks for the gems.

  • Also the name of a floating raft clusterfuck in the middle of the Pacific in the novel Snowcrash

  • Seriously. Am I the only one that doesn't ever get a turkey sandwich while out because I do it better at home?

    This is the at home sandwich, and I would slum it for Subway? No thanks.

  • Dark Ages II: Flooding the Zone with Shit

  • Someone was posting on I think PrivacyGuides about Eich also being part of developing JS, which is why I mentioned it. I'm not a dev, so great, he also did Rust? OK. Well, great for him I guess?

    I don't like Chromium browsers, so I use Vivaldi rarely when I need one.

  • I hate to get all conspiracy theory, but the guy knew that a Congressional hearing on the Epstein Files was happening. He is a skilled manipulator. So what does he do to suck all the air out of DC? Nothing. He takes a few days off, his social media goons see the "is he dead?" stuff on X - I'm not even sure that they didn't push it - and then anything he did at any point would be the lead news. So he trots out a super-size nothingburger and the media can. not. get. enough.

    Did that hearing make the "Breaking!" Fox News chiron? Nope. Totally drown out by this guy.

  • I generally don't care about personalities involved in tech. I mean, Peter Theil money also started Brave. If that's not a dealbreaker, then I don't know what is. But tech people get weird at a certain point, and until they do something like sieg heil someone a couple times in a room full of wannabe Nazis, I'm pretty ambivalent if the product works.

    That being said, Brave doesn't spoof or mask canvas info when I've tested it, and IIRC audio info, leaving very specific aspects of browser fingerprinting open. It does spoof fonts, which is great, so maybe they'll get there one day. So it's not a silver bullet or Tor by any means.

    Speaking of which, JS is a very easy way to track people across the internet as well. So I have to manage JS exposure when I need real privacy. So nothing's perfect. No one is superhuman, and everything is subjective. If Brave works for you, cool. I've never trusted it, but I'll use it when the moment demands something more than Vivaldi.

  • Signal message should be good enough. Though I think part of the Proton version is that by virtue of opening the email you are validated to open the message. Not sure if that means it can be forwarded or what.