Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)WO
Posts
0
Comments
761
Joined
1 yr. ago

  • It’s actually not really wrong. There are many VR games you can get away with low specs for.

    Yes when you suggested a 3070 it just took that and rolled with it.

    It’s basically advanced autocomplete, so when you suggest a 3070 it thinks the best answer should probably use a 3070. It’s not good at knowing when to say “no”.

    Interesting it did know to come up with a newer AMD card to match the 3070, as well as increasing the other specs to more modern values.

  • Ways open source projects get paid for:

    • people do it as a hobby and don’t get paid
    • people rely on donations
    • government funded software projects are usually open source
    • software created in an academic setting is usually released as open source (this often overlaps with government funding, but not always). Many important open source projects started in academia. Many open source licenses were initially written by academia for those projects (BSD was created by UC Berkeley, and the MIT license was created by MIT).
    • Sometimes companies have a business model that doesn’t involve selling software, and they don’t really benefit from having that software be proprietary. They may open source their software because it gets other people to use it, and by extension gets people to buy their paid products. For example, there are some free, open source software projects by Nvidia, but you would need to buy one of their graphics cards to take advantage of it.
    • Dual licensing. One strategy is to release your code as open source but under a copyleft license so it isn’t business-friendly. When a business wants to use it, they pay for a proprietary-licensed copy instead of using the open source copyleft version.
  • Sanctum (and its sequel Sanctum 2)

    It’s a tower defense where you also have guns and go fight alongside your towers as a first person shooter.

    Both Sanctum and Sanctum 2 are worth playing and have slightly different vibes. Sanctum 1 is simpler while Sanctum 2 has more complex build crafting. Also Sanctum uses a square grid while Sanctum 2 uses a hexagonal grid, and Sanctum 2 has some tweaked enemy mechanics, including enemies that target destroy the towers or killing the players over just going for the core. I think Sanctum 2 tries to make the player feel more important instead of the towers being the main focus.

  • Honestly if you buy a Mac give macOS a try. It’s Unix based so you’ll feel at home in the command line. It doesn’t come with a command line package manager but there are two popular ones you can install (homebrew and macports).

  • A pet peeve of mine is when a work of fiction either breaks its own rules or real physics in a way that isn’t justified.

    I’ve had people go “what do you mean X is unrealistic? It has magic flying creatures of course it’s unrealistic!”

    A fiction should still follow its own rules, and should follow real physics to the extent it borrows from it! Anything else is just lazy.

  • Unfortunately it really doesn’t. And it’s actually Linux that’s the bigger problem: whenever it decides to updates GRUB it looks for OSes on all of your drives to make grub entries for them. It also doesn’t necessarily modify the version of grub on the booted drive.

    Yes I’m sure there’s a way to manually configure everything perfectly but my goal is a setup where I don’t have to constantly manually fix things.

  • I played the previous mobile version of the Pokemon TCG. The problem is, the game doesn’t even try to be balanced. Whoever has the most valuable cards wins - full stop. The more valuable cards are just straight up more powerful, rarely with any cost difference or drawbacks.

    There are plenty of good mobile TCGs out there though.

  • I think the thickening products just try to coat your hairs in oil or something to make each individual hair appear thicker to make the overall hair appear more full.

    There are products like minoxidil that actually promote hair growth.

  • a small hacking group years in advance to plan and execute a voting machine manipulation without anyone noticing

    This is actually incredibly difficult. Finding vulnerabilities isn’t easy, and exploiting them often isn’t easy either. Sometimes a vulnerability requires the user of the device to do something specific, and sometimes it requires direct access to the device. This comes back to social engineering, as a hacker may have to trick a poll worker into triggering the vulnerability. Also some vulnerabilities might be less impactful than others, e.g. leaking some information rather than allowing a hacker to manipulate votes. Finally, vulnerabilities are discovered and patched all the time. The problems discovered at this year’s DefCon, maybe not all of them will be patched before the election. But planning an attack years in advance? That’s not happening.

    What about a 150 million or more country, what would be easier, manipulation of paper votes across the country involving a lot, and I mean a lot, of people using ballot stuffing and count rigging

    So here’s a list of actual vote manipulation techniques that are commonly used in this country:

    • gerrymandering
    • laws that make it harder for certain people to vote (e.g. laws where your huge city is only allowed one polling booth and you have to take a day off work to vote and there’s strict time requirements and you aren’t allowed water while in the long line)
    • people intimidating people they don’t think will “vote correctly” to stay away from polls

    Here’s a list of vote manipulation techniques that were attempted but failed:

    • bringing a fake set of electors to declare votes that didn’t match with what the people voted for
    • interrupting the official counting and certification of the voting process
    • potentially the killing of government officials in charge of the vote certification process (this didn’t happen, but the mob raiding the capital had constructed a gallows…)

    I really, deeply think that some unspecified electronic vulnerabilities are the least of our concerns for this upcoming election.