Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)KH
Posts
1
Comments
420
Joined
2 yr. ago

  • Yeah.

    Just like how people are more likely to want to stay standing up after having to sit for 8 hours for work/school.

    There's a social rubberbanding effect, just gotta get it out of our collective system so the tension is released, and then better content will come after that release.

  • Yeah. Wireless charging helps some of that, especially if the pad is itself connected through a USB-C cable.

    Ideally, in my mind, someday phones themselves will be able to charge wireless devices, so we'll connect the phone through the USB-C cable and place the watch on top and they'll both be ready to go in the morning.

  • Well, assuming no one will have direct experience, there's two safe options.

    You can get a virtual machine and install it there, and run every virus scanner you can find on it before installing it on your normal machine, or you can just leave it on the virtual machine and permanently sandbox it.

    You can do the same with an old computer, too, just disconnect the internet after downloading.

  • Poker chip maybe.

    You can also get a custom AirTag skin and put that skin around something else (probably the poker chip, or a broken AirTag) to have a perfectly sized photo for the slot.

  • Possibly. I'm not a big crypto guy, but it's my understanding that any kind of transaction has a chance of being repeated. If there were a bad actor, and that bad actor used a VPN to swap identities, he could narrow this down considerably and weaken encryption. My code is as dumb as it gets, willing to consider 1 as a valid encryption key, but smarter code would be a lot more efficient.

    On top of that, you wanted this minimum code to run on A's computer. If you do not trust A, then you've given a potential bad actor a program that could be decompiled to unencrypt your keys.

    It sounds to me like in your current state, you need to trust A before you do this operation, and if you do, you can just share an unencrypted B.

  • If A can run this program at will and it determines the minimum value, it's O(log(n)) to determine what B is, even with perfect encryption, by using arbitrary values of A.

    INT X = MAX INT PREV_X = 0 BOOL B_IS_MIN = True

    While (X != PREV_X){

    PREV_X = X B_IS_MIN = Encrypted_Min(X,B)

    If(B_IS_MIN), X = X/2 If(!B_IS_MIN), X = X*1.5

    }

    Unless I've made a typo, this psuedocode will step to B in log time, and will break the while loop once it's found, even if the user has no way to know the value of B besides the minimum.

  • Encyclopedia is "general education", referring to its broad scope. Wikipedia added wiki as a reference to the source, so the best one would be {source}pedia.

    Fedepedia isn't awful but feels... bland, in my opinion.

    Something like consolidate is a good synonym for it, but consolipedia also doesn't feel right to me, so if we're not referring to the federated part, we'd have to refer to the decentralized part. Decentropedia is fairly decent, but I'm fond of Micropedia, because the root word is very common, and I feel it's catchier than decentropedia. Either of those are good though.

  • Not as obsessed but damn are those great fantasy books. A staple that I recommend to everyone along with Tolkein and all of them.

    I didn't even know what I had with them, my grandma got a paperback set at mardens for like 2$ and thought I'd like it.

    Honestly one of my favorite parts is the enemies that get stronger whenever you kill one.

  • Dang I didn't think of that.

    Could definitely play it on a computer and link the sound to a recording device, although then you lose all the metadata like chapter info and get some loss. But as a personal copy, that's arguably fine.

  • Piracy and libraries can mix. Once you have your file, use calibre or similar to strip out the DRM and then return the book immediately.

    Raises the borrowings in the library's records, showing use, lets someone else borrow the book, and now you don't have to return your DRM-free copy.

  • You can't really avoid it in any easy way. If you could, the field of statistics would get a decent amount simpler. The only way to deal with the bias is with a survey pulled from random people, which you can't really do easily here.

    But this one will have a lot of bias, all the same.

  • Given you seem to be against adding extra info, based on the other comments, the only correct answer is "whichever one works best for you".

    The answer is quite useless, but I can't be more specific. "Better" is vague. Faster, smoother, less taxing on system resources, there's options and they may conflict. Good luck.

  • You say there's no internet but we're using a banking app at one point. Do you mean no home service, but you have cell service? If so, you can use your phone's web browser to do online banking, or use your phone's hotspot to enable a computer.

    Failing that, the weekly check with your pin is the next angle of attack. I make my pins and passwords based on a rule. That way, it doesn't matter if I forget it, I can use the rule to recreate it. For instance, let's say I bank at Citigroup. To make a pin, I take the first 4 letters and convert them to numbers using a standard keypad. Citi becomes 2484, although I'll just remember to type in the first 4 letters of the bank.

    This is a simple example rule, and isn't secure enough for my standards, but once you've defined a rule, you just follow the recipe, and you'll get the same pin every time. For my actual rule, I have clarifying rules like "always use the full name", and rules to create secondary pins when something demands I change one.

    These rules stay the same no matter what thing I'm doing, and I find rules that make sense to me are far easier to remember than numbers.