

If I could momentarily be a douchebag for a good cause: I’ve been to Japan and visited gardens there, and when I saw this photo I thought it was a photo from a place I’ve been in Japan, so this garden seems pretty legit to me! Beautiful!
If I could momentarily be a douchebag for a good cause: I’ve been to Japan and visited gardens there, and when I saw this photo I thought it was a photo from a place I’ve been in Japan, so this garden seems pretty legit to me! Beautiful!
You might actually like Taler, it’s fundamentally different from blockchain based systems, to the point of being a cryptocurrency only in the technical sense, but not having any of the properties people associate with that word culturally.
Taler doesn’t use any kind of proof of work, and so doesn’t consume excess power or other resources, at least not more than, like, visiting any normal webpage. It’s also not decentralized, and only partially anonymous, so I can acquire money anonymously and no one can trace the money I got to a particular spend, but the only place I can reasonably spend it has to be registered to the centralized issuer and is firmly not anonymous. And the only things they can do with the tokens they receive is redeem them, which means there’s no place for tax evasion because the issuing authority can track every dollar the registered vendors redeem with them. And you can’t really transfer money from random person to person, so there’s no black market opportunity, etc.
So basically the only thing Taler “protects” is that the buyer’s identity can be anonymous, but any vendor accepting Taler must not be and are highly trackable.
These are things I actually don’t like about Taler, but we may be on opposite sides of a few issues, which is fair.
Who? Vivian’s dad?
I think at least part of the problem is that Democrats believe in The System. So when someone cheats and whines about fake votes and stuff, they can resist that with faith that the system is working, but when the system willingly chooses the other side they have no choice but to concede that this must just be the Will of the People. And who are they to stand against the system they uphold…
I’m going to give you the benefit of the doubt and assume what you said was simply confusing, but not wrong.
So just to be clear if your raid array fails, and you’re using software raid, you can plug all of the disks into a new machine and use it there. But you can’t just take a single disk out of a raid 5 array, for example, and plug it in and use it as a normal USB hard drive that just had some of the files on it, or something. Even if you built the array using soft-raid.
I don’t want to sound like I’m just correcting you for the sake of it, but it’s actually important. Mastodon is the most popular right now, but Mastodon actually wasn’t around at the beginning! Before that was StatusNet, and before that was identi.ca and laconi.ca
So those services already existed, they were the ones built for federation, and so Mastodon was started as another compatible implementation of an existing network protocol. All of that is to say that Mastodon didn’t need to make the right choices at the beginning, and they have already benefitted from this kind of network dynamic! The system has already worked once!
Maybe I’m just pedantic, but if it’s on a phone or tablet, isn’t it not “PC gaming”? I’m honestly a little confused what they’re going for. I guess “mobile games of the graphical calibre expected of PC games”? But, like, Myst is a PC game. Monkey Island is a PC game. Thomas Was Alone is a PC game. There’s a wide range there in graphics… And phones are mobile…
I’m not disagreeing with you, but am genuinely curious how “fairness” was counted. I feel we have a thing right now where one side will present a well reasoned, data driven, argument. And the other side will hastily throw together something based on vibes that mostly doesn’t address the issue at all. But out of a sense of fairness our current media feels like it has to present both as though they’re two equally effective tradeoffs when actually one is empty noise.
So I’d be very curious if this system has a way of preserving true fairness without devolving into false equality in some way. Obviously nothing is perfect, but I’m curious.
It’s also worth mentioning that localsend has specific Linux support, so the app should run fine. I use it on my Linux laptop all the time!
I think it’s great! If we’re Mr and Mrs MyLastName we know they know me and assumed she was the same. If it’s Mr and Mrs HerLastName it means they know us through her, and assumed she must have gotten the name from me! It’s like putting the name of the company in the email you’re giving the email to, it tracks the source. At least that’s the game we play, because it mostly doesn’t matter to us.
I think the reason people are jumping to BDSM community terms is because BDSM people fucking love terms. They’ve got taxonomy for days, and they live to whip it out, so to speak.
You should look up IPFS! It’s trying to be kinda like that.
It’ll always be slower than a CDN, though, partly because CDNs pay big money to be that fast, but also anything p2p is always going to have some overhead while the swarm tries to find something. It’s just a more complicated problem that necessarily has more layers.
But that doesn’t mean it’s not possible for it to be “fast enough”
Knowing the folks at IA I’m sure they would love a backup. They would love a community. I’m sure they don’t want to be the only ones doing this. But dang, they’ve got like 99 Petabytes of data. I don’t know about you, but my NAS doesn’t have that laying around…
a spokesperson for the honeyseller, Vladimir Dmitriev
Listen, obviously people with names like that can be totally normal and great people. For sure. But this name, connected financially to this candidate, at this time. Guys… It’s not a good look…
I’m not the person you’re replying to, and I don’t have any videos, but I do love dumping explanation on people! So here’s some terms:
File System: This is the way data is laid out in terms of actual bytes on the drive. It’s in charge of things like where to look to find the name of this file, or how to “last modified” date is stored, or how do I find out which files are in this folder. NTFS is a filesystem, whereas ext4 is probably the file system your linux machine is using. FAT is the older Windows one that’s still used on, like, SD Cards and stuff. That having been said File System is sometimes also used to refer to the particular data on a particular partition of a disk, like “the filesystem will allow” which really means the data on your NTFS partition. Filesystem is often abbreviated “fs”, and is in fact the “FS” of “NTFS”
Mounting: In unix systems, such as Linux, file systems are “mounted” to a place in the folder hierarchy. Everything in unix lives somewhere under the “root” folder /
, so mounting is basically saying “Okay, you want to see the files in this filesystem. Where should I put them?”, and if you say /home/user/stuff
then the file “one.txt” at the root of your filesystem will now be visible at /home/user/stuff/one.txt
", and if you mounted it at /mnt/things
it would be /mnt/things/one.txt
. The term mount is used like “attach” to mean “where do you want me to hang this new directory hierarchy on your existing one”.
fstab: There are a few ways to mount things in modern linux. The classic is the mount
command which looks something like mount /dev/sda1 /home/user/stuff
which would take the device with the name /dev/sda1
and mounts it to the given path. Devices in linux usually live in /dev
, and in this case are often given names like sda1
to represent the first hard drive (a
), and the first partition of that drive (1
). But, there are other ways! You can also click on the partition in your file browser and it will mount the disk for you, often auto-creating a mount path and cleaning it up when you’re done, so you don’t even have to think about it. Another way is fstab
, which is a kind of config file that controls mounting devices. In here you can give default options for how you want drives to be mounted, and can even specify that you’d like some devices to be automatically mounted by the system on startup. This is actually an important part of how unix systems start, and how the root filesystem and other important ones get going. If you wanted your NTFS drive to always be available at a permanent location, you would edit this file to set that up. If this is something you wanted only periodically, then just clicking may be fine.
Permissions: Virtually all unix filesystems store the permissions of files and directories as a “user” and “group” that owns the files, and then a set of whether or not the owner can “read” “write” and “execute” the file, whether other members of the group can, and then whether everyone else can. If two people were on the same computer, these would allow a person to be able to see their own documents, but not see the documents by other users. Or maybe they can see them but can’t make changes. And it also prevents random users of a system from changing important system configuration, when those config files are owned by the administrative user (called root
by convention). Some config files will be read-only to normal users, and some contain secrets and so are permissioned so normal users can’t even see them. But! NFTS doesn’t follow these same conventions, so when mounting an NTFS drive on unix the driver has to produce a set of permissions that are unix-compatible, but it doesn’t have anything to work off on the disk. So the person above was saying by default it assumes the safest option is to make all files owned by the user root
, and so if the permissions are the only the owner can write the files, and the owner is root
, this will mean it’s effectively “read-only” to you. The terms uid
and gid
stand for “user ID” and “group ID”, which are the numbers that represent a user in the data. User names are basically a convenience that allows us to give a name to a uid, but it’s more efficient to store one number everywhere on disk for owner rather than a name.
So putting it all together, what they’re suggesting is that you can use the /etc/fstab
file, which has a very particular format, to specify default options when mounting your drive. These options include setting the uid
option and gid
option to your user’s uid and gid, so that when the filesystem is mounted, it will appear that all the files are owned by you, so you’ll have full permissions on them. They’ve assumed your uid
and gid
will be 1000
because that’s a common convention, but if you’re comfortable you can run the id
command on the command line to output your actual uid and gid (you can ignore all the other groups your user is in for now)
They also mentioned that when mounting you can specify if you want to mount the filesystem as “read-only” or “read-write”, etc. If you mount the whole filesystem read-only, then the write permissions stored on the individual files are ignored, basically. So if you were mounting with a command, or through fstab, you should make sure the rw
option is present to clarify that you’re looking for “read write” permissions on your mount.
That having been said, it’s possible none of that is relevant to you if you’re mounting the fs by just clicking in your file browser. One way to tell is if you right-click on some file you aren’t allowed to edit and look at the properties there should be a Permissions
tab thing. And it will list the owner of the file and what access you have. If those permissions are already set to be owned by you, then this uid
thing is already taken care of for you by the file browser. In that case it might be something more fundamental to the NTFS filesystem, like the locks other people are talking about.
So those are some words and their meanings! Probably more than you wanted to know, but that’s okay. I liked typing it
I think I may have contracted some kind of brain worm, because the other day I needed to do some photo manipulation and couldn’t get krita to do what I wanted, but I went into gimp and just knocked it out. I’ve hated gimp for years, but I guess I’ve used it enough that I’ve figured out how it works… and now I don’t hate it anymore…
I think I may need help.
Oh, but I always use it in single window mode ever since that came out. The multiple windows floating panel thing drove me nuts!
Actually, that Hertha Ayrton quote at the end? About the cats or whatever? That was actually me. I said that.
I’m not 100% deep on the crypto, but my understanding is they use blind signatures (which have been around for a long time) to do their issuing. If you’re unfamiliar, these are kinda like an envelope with a hole cut in it, so you can put a document in it with a hidden unique key, and they can see some info through the hole, and can stamp their signature through the hole to validate that it’s legit without knowing the hidden info.
Then the user can remove it from the envelope (unblind) and now have a certified valid coin without the issuer knowing which coin is theirs.
So in the context of an ATM, the ATM wouldn’t “issue” coins, it would be given a request for coins from your wallet, it would certify the validity of that request, and then give your wallet back that certification in such a way that the wallet could unblind it and have the anonymous secret. So ultimately your wallet is the one that’s in charge of producing the unique parts.
It seems there’s also a system for making sure you don’t produce bad transactions by asking you to generate N, promping you to unwrap a bunch of them to prove there’s nothing weird about them, and then signing one of the remaining ones under the assumption it’s also legit. At least it sounds like it, but I’m even less familiar with that part. But even if you did spoof someone else’s secrets… it doesn’t allow you to steal their money I don’t think… because in order to have your transaction validated in the first place you had to truly give the ATM your money… so you could I guess pay $10 to screw over your friend for $10 because it’ll look like they spent money they didn’t… but you still spent $10… so it’s less like stealing their money and more like paying to throw their wallet off a bridge? You don’t gain anything, but they lose something? Maybe there’s another exploit I don’t know about in the like “renewal” or “refund” or “transfer” protocols that make that more important.
Anyway, I’m still not a Taler fan, but in this case I think it’s possible to do what they claim. Now, if the bank or ATM or whatever asks for ID or an account to use their services, they could track that you withdrew money, and how much. That’s data they can collect. The anonymous buyer part just means they can’t tie the coin they issued you to a spent deposit they receive later. So they know you got $10 out, and they can assume you probably spent it, but they can’t know what you spent it on.