Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)T
Posts
1
Comments
344
Joined
3 yr. ago

  • Yes but we’re talking about zsh. I know zsh wasn’t on TiVo.

  • Shit I didn’t know this was a problem. What devices are these? I’m assuming we’ve got a few in every home?

  • If you use the Inspect tool (click the Inspect button then a specific clue) it will give you all the necessary definitions for the clue. Would this have given you what you needed?

    If not don’t be afraid to tag me on future posts; I’m happy to help you as well.

    Going into the weekend where the puzzles get harder you’ll definitely need to use tags to figure things out. I wanted to make sure you’d seen that because I remember your frustration yesterday too.

  • Neither of those things are CAN-SPAM enforcement. I’m not trying to move the goalposts on you; that’s what this thread is about.

    As for what you linked, the number of robocalls has not gone down and there’s still no real penalty for being one unless you’re terribly egregious (combine both our sources). Neither fiber nor cable have the same protections as phone lines so it doesn’t really matter. All the FCC has done is deregulated the transition, which is a reduction in consumer protection. Remember how we’ve already been charged for the fiber upgrade? Carr just made it easier for us to pay for it yet again.

  • Right now the FCC is under regulatory capture and wants to deregulate as much as possible. It’s very excited to approve big mergers and attack journalism. Despite robocalls being a huge issue, they continue to do fuck to really combat them. I don’t know that the FCC did anything with CAN-SPAM in 2025 and given the pervasive capitulation to broadband providers (aside from the squashed and panned attempt at net neutrality) , especially under this administration and its previous iteration, it is not reasonable to assume the FCC gives a shit about cable companies spamming you.

  • The FCC has stopped doing stuff about this.

  • Software co-ops are often indistinguishable from startups in the US. Without money they don’t matter and getting money turns you into a shitshow or requires full-time staff fighting for grants and other forms of not blood money. Maybe this is easier outside the US.

    Fuck big tech tho

  • It’s a cynical way to view the C-staff of a company. I think it’s also inaccurate: from my limited experience, the people who run large tech companies really do want to deliver good software to users.

    From my much broader experience, this is missing the required cynicism that C-staff want to deliver software they think is good based on the criteria cynical yes staff tell them constantly is good. I’ve never met an exec that didn’t want to deliver something good; most execs I’ve met don’t actually understand what good is or how to benefit people.

  • No, that’s disappointing enough. Thanks for the info!

  • Can you share some background on Jane? I really enjoy his stuff and would hate to have to stop recommending him.

  • This user wanted to audit the dependencies of cargo vet which is not shipped to an end user. It is part your toolchain in the same way your OS is. One might assume the Linux or BSD kernel has been audited; it is not reasonable to assume the UI stack has because it’s open source. It is equally unreasonable to assume the Windows anything has been audited. It is only slightly reasonable to assume parts of macOS have been audited.

    You’re only partially correct. If you are not securing the environment in which you code, your code is vulnerable to supply chain attacks. The chances are incredibly low, of course, but nonzero. You also can’t get away with, say, running your editor in a read-only image that only mounts your code because that read-only image could be exfiltrating your data.

    Edit: here’s a great example from this year; while the exploit came from a package the attack vector was social engineering. Job postings and related files are a common entry point outside of dev tools.

  • How long did it take you to audit the source code for your OS?

  • Please don’t take me as a GH shill because I’m not. I’m not sure we read the same email given your projects. Actions on GH runners are dropping in cost and there’s a new fractional cost for self-hosted. For the average user, especially those on GH runners, costs are going down. Looking at your repo, you haven’t run anything since July. Your workflow files use GH runners. Nothing in your history suggests you’re leaving the free tier so I don’t get this FUD at all. General Microsoft hate? Fuck yeah. Shitty GH service? Fuck yeah. Plenty of reasons to dunk but this was not one of them. M

  • She’s 2nd gen and follows the same patterns other active higher Scientologists show with social media blocking of large anti bullshit creators. It could be a coincidence that a major star whose parents were Scientologists blocks a bunch of folks who are rabidly anti-Hubbard but it would certainly be a very odd one.

  • One of their current leads is huge into Scientology too. I’m all for them taking some flak right now.

  • LinkedinLunatics @sh.itjust.works

    Hiring a technical archivist to be a technical architect really sets everyone up for success