Skip Navigation

𞋴𝛂𝛋𝛆

@ j4k3 @lemmy.world

Posts
224
Comments
1943
Joined
3 yr. ago

  • I think we should consider adding political philosophy to the cultural zeitgeist. We are unlikely to find Plato's lofty philosopher king in the form of low quality reality TV or musical artist celebrity.

  • You are solely responsible for vetting the software that you choose to run.

    I do not review or care about the tools a person uses to create their projects. I appreciate the disclaimer when the person discloses their aptitude and confidence in their code.

    Free software and Unix culture is a culture of hackers. Stallman's very degree is in AI. Emacs is mostly a thing because lisp was adapted early on for AI development many decades ago.

    Junk code is nothing new. X11 is notoriously bad, yet you likely have parts of it running on your hardware. Proprietary code is far far worse than anything a hacker posts as open source, yet you are running proprietary blobs on whatever device you are looking at now. Even if you are like myself with a libreboot machine, Leah readily admits that you need to run the core duo microcode if you want it to run right, and are not using that hardware for your primary device. The culture of antiAI is dogmatic nonsense. It is a tool, not a religion. It can be used harmfully or helpfully. I can't fix stupid in anyone except myself. I do not fault anyone for what they run, the projects they share, or the background they come from. I encourage everyone to be positive and help their fellow hackers. I value participation and enthusiasm. Dogma and negativity are toxic.

    I am ultra liberal. You have a right to all information, a right to skepticism, a right to error, and a right to protest in non violent forms aka the right to offend others. You do not have a right to infringe the rights of others.

    This anti AI populism infringes the rights to all information and right to error if any administrative actions are taken. Your right to protest and skepticism is duly noted. If these become toxic in any ways that alter the dissemination of information, or toxic/harmful to the individual sharing information, I will remove the offending comments. If the person continues, I will escalate. I am only the janitor here. I clean up the messes. I do not matter, but neither does anyone else here. It is a community, and only the community matters. Garbage software is bog standard. Crusade against things that matter like proprietary software leveraged hardware theft and SaaS.

  • The Colonies were a Puritan jihad of which the Confederacy was heretical.

  • Thanks for sharing.

  • It is not a laser beam.

  • No. The primary way of blocking radio is by raising the noise floor across the band. The type of radio is irrelevant. The protocol is irrelevant. It is all only the electromagnetic spectrum from infrared light, to visible spectrum light, to radio light, through to xray or gamma ray light. How we divide that up into protocols, bands, and names is totally irrelevant. When transmitting radio light, we are all restricted in how much power we are allowed to send. All receiver circuits are listening for meaningful information above the noise floor. Bands are allocated to try to create spaces for certain types of communications. This controls the noise floor. Then electrical engineers design the hardware you buy to operate within this specification. If that noise floor is raised, the physical hardware is unable to retrieve information and effectively makes it useless. If you are a radio wizard and build your own transmitter that has more power, you just created a giant beacon that anyone will track easily to your location. Transmitting always reveals your exact location. In military operations, you constantly hear about some entity going radio silent. This is why. If you are a soldier, you may not carry a cell phone at all when on the job because it is constantly revealing your location. The only way to avoid this is with actually hard wire connections. You are able to use lasers for line of sight communications, but in practice, you will be limited by the optical lens focusing complexity and atmospheric distortion even from the ground with point to point regional communication. If anyone crosses the beam it will still be detected and is likely to leak some light depending on conditions and design.

    Ultimately, your only real option is the sneaker net which is damn near useless in US suburbia hell. Don't forget that the freeway system was not created for the citizenry. It is only about military mobility. That is why the Germans made the autobahn and why the USA and others had to copy the idea. Your only defense is in the democratic political space.

  • Crew 11

    Jump
  • That is one of the original Ole Hanson homes. That far row are the ones on the sea cliff. Sucks because the train is just below them, and the cliffs are sedimentary marine deposition that has been uplifted on geological time scales. When it rains here in SoCal, and you hear about houses falling in landslides, this is one of those areas. None of these places are single family homes. That Ole Hanson one has six units IIRC. Only the ones on the cliff are super expensive.

  • Sure

  • I have never used or cared about this W11. It has never seen the internet. I only keep it around for my keyboard's RGB controller app if I ever need it. So I have no clue if this is everything or whatnot, but that is a screenshot of my access to the windows file system from within the file manager of Fedora. That is a dual boot partition. Fedora is particularly good at coexisting with a dual boot partition.

  • Use offline open weights.

  • It is the tiny URL link that has a unique identifier. The normal website links are just the regular website address root for redditcom. Tiny URL links stand out more to me because I use a DNS whitelist firewall and will never approve any of these forwarding connections.

  • Why the reddit tracking link?

  • DNS filtering usually only filters on incoming packets, but for bot stuff that should catch issues.

    In general, most routers run everything from a serial flash chip on the board. These are usually 8, 16, or 32 megabytes. They have a simple bootloader like U-Boot. This is what loads the operating system. These devices have a UART serial port on the PCB. You can use a USB to serial UART adaptor to see what is happening in the device. With a proprietary OS, you are still likely to see the pre-init boot sequence that the bootloader prints to terminal. Most operating systems also print information to this interface, at least of the couple dozen junk devices I have been given and messed around with. I make a little mount for a USB to serial adaptor and add it to all of my routers when new, so I only need to plug in USB to get to the internal bootloader and tty terminal interface of OpenWRT. You will need to know the default baud rate of the device, although it is probably listed somewhere online or can be guessed as one of the common high values at or above 9600.

    Getting into this further gets complicated. It is probably better to look for any CVE that is relevant to the device or software and work backwards. Look for any software updates that have obfuscated the risk for each CVE. If the issue was not fixed, that is where to look to see if someone has exploited the device. Ultimately, they need clock cycles from the CPU scheduler. So it must be a process or some way of executing code from unregistered memory.

    This is getting to the edge of what I have messed around with and understand. There may be a way to get a memory map that includes unused pages, and compare that with a hex dump of the flash memory. This is outside of your scope of a proprietary OS, but hopefully frames the abstract scope of what is possible on this class of device when you have an open source stack. The main advantage of this kind of device and issue is that you can physically remove the flash chip and then see and manipulate every page and memory location. The device likely doesn't have microcode loaded into the CPU(s) that make it challenging to determine what is going on.

    There is probably an easier way, but a hex dump of the current system can be hashed against the factory updated version to see if any differences are present. It is likely that any exploit will include a string with the address to connect to somewhere in flash memory. It could be obfuscated through encryption or a cypher, but a simple check for strings in the hex dump and a grep for "http" is a simple way to looks for issues.

    The OpenWRT forum is a good general source. The people behind the bootloaders for these devices are also Linux kernel developers and on the OpenWRT forum.

  • The first life did not possess a sentient consciousness. Yet here you are reading this now. No one even tried to direct that. Quite the opposite, everything has been trying to kill you from the very start.

  • How do you punch holes in that dogma? I can think if many logical ways, but that is meaningless against the tribal structure.

    • If family is so valuable, why didn't strong families usher in the present age of technology
    • intelligence, business acumen, and competency are not hereditary.
    • team sports are a capitalist marketing scam. Putting a blue jersey on your sperm does not make it relevant or better than purple jersey'd sperm.
    • patriarchal male culture is chauvinistic ineptitude and masochism marketed as a replacement for intelligence. It is an admission of subservience to those that dominate by thought and fundamental logic. Fools only fear a brute, civilizations fear a physicist.
    • Strong families are only peripherally useful if capable of creating the opportunities and support needed to produce a physicist.
    • We are all only a product of our environment. That environment is primarily a result of the opportunities and support given freely by its members. So if your family is not strong, one should look in the mirror first.
    • A plant dies because you did not water it, not because of the room it was placed within.
  • bike wrench @lemmy.world

    Smol footprint

  • You Should Know @lemmy.world

    No LUFS regulations are the reason you use subtitles to watch TV – Tom Scott YT (7:58)

  • Ask Lemmy @lemmy.world

    What are the unknowable traits of one's self?

  • Ask Lemmy @lemmy.world

    Is the expectation of an apology ultimately narcissistic?

  • memes @lemmy.world

    T is for rex

  • A Boring Dystopia @lemmy.world

    New paint scheme just in after Delta moves toward eliminating set prices in favor of AI that determines how much you personally will pay for a ticket in a classic price fixing scam

  • Fediverse @lemmy.world

    I want a community to exist like 4chan greentext here

  • Ask Science @lemmy.world

    What hard evidence is there to establish geologic epics or do they even really exist?

  • Ask Lemmy @lemmy.world

    Does "social news site" hold meaning to you as the (Wikipedia) category for Lemmy/Reddit?

  • 3DPrinting @lemmy.world

    6.3mm spade terminal with wire retaining clip printed in

  • Science @mander.xyz

    Mindat.org open mineral database and reference

  • Do-It-Yourself, Repairs and Fixes @lemmy.ml

    Waterproof biodegradable outdoor cardboard furniture and stuff – NightHawkInLight (29:32)

  • Asklemmy @lemmy.ml

    What is your strong opinion on the best executed box design?

  • 3DPrinting @lemmy.world

    I made an audio thing

  • MealtimeVideos Cafe @lemmy.cafe

    Is Society Getting Stupider? A Serious Exploration. – William C. Fox (15:56)

  • What is this thing? @lemmy.world

    What is this brand?

  • cats @lemmy.world

    Livin in da projects

  • Asklemmy @lemmy.ml

    What are you using to play a guitar/instrument while listening to a song, looping, and slowing down the track to learn by ear?

  • Asklemmy @lemmy.ml

    Where is the best place to source a basic highschool chemistry set for cheap?

  • 3DPrinting @lemmy.world

    USB chorded keyset – Adafruit YT (1:52)