Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)JA
Posts
11
Comments
607
Joined
2 yr. ago

  • Given that sunaurus has explicitly declined to defederate from unpopular and highly-blocked instances, stating that disliking content is not a reason to invoke defederation, I'd have to say this is the least-censoring instance I'm aware of. At least at the admin level.

    At the community level, communities can moderate and censor themselves however they like, but I certainly can't think of any examples I'd call censor-heavy.

  • I decided to split the difference, by leaving in the gates, but fusing off the functionality. That way, if I was right about Itanium and what AMD would do, Intel could very quickly get back in the game with x86. As far as I'm concerned, that's exactly what did happen.

    I'm sure he got a massive bonus for this decision, when all the suits realized he was right and he'd saved their asses. /s

  • A country putting tariffs on imports doesn't necessarily mean it's being anti-competitive, or anything nefarious.

    In this example, the argument generally goes that China's EV market is so cheap, compared to the US's, because the Chinese government subsidizes it, I.E. gives EV makers free money so they can lower costs or expand infrastructure, which in turn leads to lower prices. Thus, a US tarrif is just attempting to re-level the playing field. How much truth there is to this, I don't really know.

    And this, in TURN, doesn't necessarily mean that China is being anti-competitive either. There's nothing wrong with them saying "Having a robust EV infrastructure is good for our country, and we think it's going to be very important for our future, so we're going to invest heavily into that."

  • Option 2 seems like the optimal idea, on paper, if Option 1 isn't feasible, but Option 3 doesn't really bother me, if there's trouble with Option 2's implementation. I don't consider privacy at an IP-tracking level really that much of a concern. This is a social media platform, my privacy is my anonymity.

    It sounds like maybe Lemmy itself coupd use some enhancement with regard to how and when it decides to proxy, and what it does when proxying fails. If we can get a better experience by swapping to Option 3, until such enhancements are maybe made in the future, that sounds fair to me.

  • The issue last year was with someone, or many someones, uploading CSAM (child sexual abuse material, I.E. child porn). Like, SPAMMING it out to a bunch of Lemmy servers, which then federated it out across the whole network, in REALLY high volume. Obviously, no one wants to see that, but the legal concern is liability. For some servers, depending on where they're hosted, that means they can be held responsible for "hosting" the content, once it's been federated to them.

  • As I understand it (and assuming you know what asymmetric keys are)...

    It's about using public/private key pairs and swapping them in wherever you would use a password. Except, passwords are things users can actually remember in their head, and are short enough to be typed in to a UI. Asymmetric keys are neither of these things, so trying to actually implement passkeys means solving this newly-created problem of "how the hell do users manage them" and the tech world seems to be collectively failing to realize that the benefit isn't worth the cost. That last bit is subjective opinion, of course, but I've yet to see any end-users actually be enthusiastic about passkeys.

    If that's still flying over your head, there's a direct real-world corollary that you're probably already familiar with, but I haven't seen mentioned yet: Chip-enabled Credit Cards. Chip cards still use symmetric cryptography, instead of asymmetric, but the "proper" implementation of passkeys, in my mind, would be basically chip cards. The card keeps your public/private key pair on it, with embedded circuitry that allows it to do encryption with the private key, without ever having to expose it. Of course, the problem would be the same as the problem with chip cards in the US, the one that quite nearly killed the existence of them: everyone that wants to support or use passkeys would then need to have a passkey reader, that you plug into when you want to login somewhere. We could probably make a lot of headway on this by just using USB, but that would make passkey cards more complicated, more expensive, and more prone to being damaged over time. Plus, that doesn't really help people wanting to login to shit with their phones.

  • Automated certificate lifecycle management is going to be the norm for businesses moving forward.

    This seems counter-intuitive to the goal of "improving internet security". Automation is a double-edged sword. Convenient, sure, but also an attack vector, one where malicious activity is less likely to be noticed, because actual people aren't involved in tbe process, anymore.

    We've got ample evidence of this kinda thing with passwords: increasing complexity requirements and lifetime requirements improves security, only up to a point. Push it too far, and it actually ends up DECREASING security, because it encourages bad practices to get around the increased burden of implementation.

  • The hell is that summary, AI-generated? Why yes, people DO work inside the TikToc building.

    Talk about burying the lede, by not elaborating on that title, like the article does. "Stripping" does not mean that teenagers are being "stripped" from the platform, or from feeds, like I figured. It literally means that THEY are stripping. OnlyFans style. For gifts. Jesus fuck.

  • Yeah, "lack of vision", that's definitely the problem.

    The "vision" of the Israeli government has been clear for quite a while, now: Israeli ownership and settlement of the entire region, achieved by killing off or convincing to leave everyone that's already there.

  • Also related to reddit, since that's where I was always inundated with this shit, before moving here: the constant stream of Genshin Impact leaks that come out, that the whole obnoxious subculture is built around, are just released by Mihoyo, intentionally, under the guise of all the anonymous leakers that constantly come and go. Seems to me like the only explanation for how CONSTANTLY leaks come out, and how they're basically never actually damaging to the game or the company, while being REALLY effective at stirring up obsession in the fanbase, and driving people to invest more time and money into the game to be prepped to get the next new character immediately on release.

    Also how so many of the leakers would release extremely accurate stats and numbers, but then drop statements like "if I release any more than this, I'd be risking my safety" or "since everyone's been asking about it, I'll go ahead and confirm X, but after this I'm gonna have to go on hiatus for a while, until things cool down". Seems like nonsense meant to either inflate the leaker's ego, or rile up the fanbase.

  • First game I ever played where I was like "yo, I actively WANT to do the speedrun achievement, and the deathless achievement." So, first game where I ever did those things. Maybe I'm just crazy, but I found them way easier than I expected.

    Also, a prime example of storytelling through music.