Skip Navigation

User banner
Melody Fwygon
Melody Fwygon @ Melody @lemmy.one
Posts
4
Comments
518
Joined
2 yr. ago

  • Godspeed. May this measure succeed with all haste and become the new normal.

    For once it overtakes one country; others can choose to follow suit as best as they can.

  • Amen.

    These tools should be secured so that only a properly Appointed, Licensed and Barred Judge may use the facial recognition software. It's clear that Officers shouldn't be allowed...they misuse the tools too often.

  • It's clear that they made an end run around the rules, laws and agreements they made.

    I hope some judge throws the book in their face for it and forces them to pay out of their profits to the artists at the rate they agreed was fair before they began selling audiobooks.

  • This is why laws requiring excessive documentation should be considered Kafkaesque; and summarily rejected and ripped out of legislation. Someone like this should've been able to simply prove residence by simply gathering enough citizen signatures on an affadavit or something like that. Surely somebody can attest they remember him; and surely there's some record of his house fire which by itself could prove he lived there in the late 90s.

  • It's almost like they don't want to help people prosper. That stance is going to cost them dearly at the polls most likely.

    I wouldn't be surprised if Texas turns inexplicably purple. :)

  • I have a /48 that I can basically roll through.

    A /64 is more than enough though to prevent most casual attempts at entry; and does force more work / enumeration to be done to break into a network and do damage with. I'm not saying the privacy extensions are the greatest; but they do work to slightly increase the difficulty of tracking and exploitation.

    With a /48 or even a /56; I can subdivide things and hand out several /64s to each device too; which would shake up things if tracking expects a /64 explicitly.

    I actually use /55s to cordon off blocks inside the /48 that aren't used too. So dialing a random prefix won't help. You'd be surprised how often I get intrusive portsweeps trying to enumerate my /64s this way...and it doesn't work because I'm not subnetting on any standard behavior.

  • In most sharing channels you could possibly just report those to the channel ops (@/&/!/~) and get them kicked or devoiced (removing their (+ or %) state depending on the channel)

    I don't know any channel that would put up with people who wasted your time with DRM'ed files back in the day. It's less problematic now yes; but still something they don't want people doing...since you have to be signed in as the purchasing account to de-drm something.

  • I run both because of this; and because SLAAC enables features in Desktop OSes that offer some level of additional privacy.

    For example; Windows can do "Temporary IPv6 Addressing" that it will hand out to various applications and browsers. That IPv6 address rotates on a periodic basis; once every 24 hours by default; and can be configured to behave differently depending on your needs via registry keys.

    This could for example, allow you to quickly spin up a small application server for something; like a gaming session; and let you use/bind that IPv6 address for it. Once the application stops using it and the time period has elapsed; Windows drops the IP address and statelessly configures itself a new one.

  • What happens is what's intended.

    Everyone is going to do it; and it will cause companies, artists and creatives to step back and rethink a bit on how they monetize their creations responsibly. The ones that refuse to rethink and adapt will fail and flounder under the tiny handful of straw that Piracy adds to the load.

    That's a GOOD thing.

    What's unfortunate is that companies and people still think it's productive to worry and handwring over piracy as if it's killing someone; instead of being the thing you "don't fly too close to, lest your wax wings get melted off and you plummet to the ground."

  • I get a free /64 and /48 directly from Hurricane Electric using their TunnelBroker and use PFSense to deploy that v6 locally on my LAN. Everything in the house has a v6 and is protected by the necessary firewalling too.

  • This is why I use PFSense and Hurricane Electric as a v6 tunnelbroker. I have working functional IPv6 with SLAAC and DHCPv6 and full Routing Advertisements on my LAN running side-by-side so that no matter which the device implements how poorly; it gets an IPv6 address and it works and is protected by the firewall.

  • You can automate this; but you have to make sure that the automation you create is going to respect the ratelimits. I'd recommend something simple like using a command alias or short script written for your specific IRC client.

    It's what I used to do with that sort of thing; and there are plenty of well known Open Source scripts in the wild as well

    As an example; I would use mIRC with it's scripting system and write my own event trigger scripts to automatically request, wait for and then accept the DCC chat requests and route them appropriately in the interface. There were also scripts that helped with getting the lists; unpacking them, and displaying those lists in my client...so I didn't have to extract the text from the zip myself, and could select what I needed from the bot.

    All of this was lightweight automation that was intended not to flood the bot with commands and fed into command queueing modules that let the bots have time to process.

    Sometimes in those days you could get actually (+b)anned, Auto/KILL'ed or /(G/K):LINE'ed for causing a bot to crash...so you had to be careful and respectful with regard to scripts.

    TL;DR; know your bot, source channel & network rules, and write your own scripts for safety or read any scripts you import in carefully and understand what they're doing.

  • That signal might be insignificant to us; but it may be their way of establishing a timescale.

    The time may be derived from how long their planet takes to rotate...aka the length of one sub-unit of their day...aka 1/24th of their day.

  • I'd argue that a more precise timing like 53.8 minutes is more attention grabbing. It shows finer grained control of technology; a "look here! we can do this too!" sort of demonstration.

    If we are the "more advanced" neighbor; then I could see that being done.

  • Personally I think the more complex pattern of having 3 different states being cycled through once an hour is significantly less likely to be natural.

    That, of course, doesn't mean much by itself; it still is possible that it is natural and we just don't understand why. More research into how and why that is happening is absolutely required to answer the question. I just don't know if we will do it, or if we have the tech needed to fully investigate it yet.

  • Your comment missed the mark entirely. Please don't reply-guy me; I know what I'm talking about.

  • I, luckily, had a bulldog for a parent who took none of that kind of bullshit from my teachers. Not that I was ever particularly careless about taking things to school that I didn't want to lose.

    The few times I did get something confiscated; it was truly unfair and I had the item back within a day or two...nobody particularly cared to deal with my parents being angry, and the admins all knew they would descend upon them with the fury of a thousand suns if it had truly been something that was not me being stupid or childishly careless.

  • Is it still likely that there is at least one republican? I think it is possible.

    All it would take is one allied republican on the jury to potentially leak juror identities.