Skip Navigation

Posts
4
Comments
500
Joined
2 yr. ago

  • It’s not the protocol, it’s the users. There’s a vocal group that would rather stay small, niche, and remain in obscurity away from the rest of the world. They fear that they’re going to lose their pedestal and megaphone because their quirky skewed view of the world will be drowned out by mainstream worldviews. They’ll then mask it with claims of “privacy”, “EEE”, or “anti-blahblahblah_that_I_dont_like”.

    Big companies did wonders for Mastadon’s adoption, and will likely do the same here. The lack of users and content will be resolved when it happens, and I just hope I can hold out long enough until that happens.

  • Phones learn from what you’re typing. The more you type (typo) something, the more they will recommend it to you. Vicious cycle if it auto corrupts it for you, and you miss it/ignore it thinking the other party will understand you fine. Eventually it learns the ironic typos as actual words and then you’re stuck with them when you type. I kind of wish there’s a way to review / manage the autocomplete dictionaries, but I haven’t tried hard enough to find out yet.

  • Tin foil hat: Spy phone/app/browser looking at what you’re reading and adding it to your keyboard hints. That particular company was mentioned in a recently linked article about the company triggering an earthquake from fracking in northern BC, as well as being sued by the state of California.

  • Sounds like a bunch of people fell for a mass phishing attack, or a new leak with lots of reused password, so Apple is locking those accounts out to prevent fraudulent purchases / ratings.

  • You are advocating piracy, and were never going to spent a cent anyway.

    Like it or not, this is how IP laws work. Direct your attention at your local law makers to abolish outdated IP laws.

  • I received DMCA from Nintendo in 2015 from dmca@millernash.com which was also confirmed to be legitimate as authorized agents.

    Big companies like Nintendo doesn’t have to use their own in house corporate counsel for this kind of enforcement. They can and often do task it out to firms that’ll take on both discovery and take down based on given directive on an agreed rate that’d be cheaper than them doing it in house, so they don’t need to train up an entire department on the skill set required.

  • Can’t wait to see how these compares to the M series from Apple. More competitions should be good for both platforms, forcing them to push performance further.

  • Had some silly idea about embedding ESP-32 into a cartridge and write custom software to allow the Game Boy to go online. Then I did some quick reading to find there’s already a Game Boy Pocket Sonar attachment. Holy moly, what an ecosystem!

  • Say you’re a movie studio director making the next big movie with some big name celebs. Filming is in progress, and one of the actor dies in the most on brand way possible. Everyone decides that the film must be finished to honor the actor’s legacy, but how can you film someone who is dead? This technology would enable you to create footage the VFX team can use to lay over top of stand-in actor’s face and provide a better experience for your audience.

    I’m sure there are other uses, but this one pops to mind as a very legitimate use case that could’ve benefited from the technology.

  • I, too, have read the article and it doesn’t say that. The closest thing is this paragraph here:

    Vestager’s comments come within the context of EU’s Digital Markets Act or DMA, a flagship law that imposes rules and obligations on digital gatekeepers, including Apple. Among the DMA’s obligations is a requirement that Apple permit app developers to direct users to alternative sources, outside of Apple’s App Store, to download apps and make transactions. Vestager asserts that Apple’s security based claims are a diversion and improperly support Apple’s purported desire to keep a 30% commission for doing business in the App Store.

    This primarily argument here targets the inability to download from external sources and leaps to the conclusion that it is to guard their commission. It also uses the top line 30% figure which is incorrect as vast majority of businesses fall into the lower tier and is much lower.

    Despite the claims, the security implications remains true. By limiting installation mechanisms and requiring everything to be centrally notarized, this enabled Apple to rapidly block malicious applications across all devices. They’ve gone out of their way to implement a secure mechanism for DMA which allows them to continue to have the ability to rapidly stop malwares dead in their tracks.

    Apple devices are much harder to compromise. Security researchers have noted this time and again. Even the recent malware that’s allegedly “cross platform” turns out to be greatly nerfed on iOS due to the security frameworks.

    Law makers want to claim monopoly, they should call it for what it is, but not try to conflate things they clearly do not understand sufficiently and have not spoken with enough industry experts in.

    Edit: you can see my comment from the GoldPick discussion a couple months back demonstrating the vast level of differences between the two platforms on the alleged cross platform trojan here: https://lemmy.chiisana.net/comment/498511

  • Have they seen the amount of security researchers commenting on how much more difficult it is to penetrate an iOS/macOS device as compared to android/windows device? I’d say the security defense mechanisms are indeed much more effective.

  • At least from the nerd side of Lemmy, communities pertaining to technology, self-hosting, etc. — which I’d imagine to be the larger drivers due to how complicated it is to join compared to a traditional centralized setup (see also same hurdle for mastodon vs Twitter; which doesn’t gain adoption until Thread and BlueSky started to attract the less technical users), I’m seeing troubling signs of slowing down and shrinking.

    If people actually want Lemmy in these areas to grow, it is important to be a lot more inclusive, and understand when to not participate in order to foster better community growth.

    What I mean on the inclusive side is those FOSS advocates need to back off with the “You don’t understand FOSS, and go make your own instance” comments so other users don’t just bounce right off and leave after being bored with nothing to interact with.

    What I mean by understand when not to participate is literally don’t participate in niche communities that doesn’t apply to you. So many Android users commenting irrelevant anti-Apple sentiments in Apple Enthusiasts community, for example. This is driving away actual users who are interested in discussions.

    The charts don’t lie. Lemmy is shrinking, not growing. After getting a new lease on life with 0.19 due to what is essentially clever accounting, the community is still slowing down/shrinking. And for the nerdier side of the userbase, unless the community by and large start to interact more inclusively, the whole thing is sadly going to be just a small blip that’ll soon fizzle out.

  • I’d imagine it is just a matter of time before Nintendo sends Apple a C&D, before this gets taken down?

    Edit: Welp, that didn’t take long. Hopefully anyone who cares got a copy on their phone and don’t change phones for the foreseeable future.

  • Approx 35k power on hours. Tested with 0 errors, 0 bad sectors, 0 defects. SMART details intact.

    That’s about 4 years of power on time. Considering they’re enterprise grade equipment, they should still be good for many years to come, but it is worth taking into consideration.

    I’ve bought from these guys before, packaging was super professional. Card board box with special designed drive holders made of foam; each drive is also individually packed with anti-static bags and silica packs.

    Highly recommend.

  • Security when you’re on untrusted network. I can trust Google to snoop my banking data and update the spending power info on my ad profile, I can’t trust the random dude in trench coat also using the public wifi when I am traveling out of my roaming coverage.

    I joke of course, but the security aspect is still valid.

  • I don’t use NPM but if “Cache Assets” means what it means in the traditional sense, it wouldn’t affect most home deployments.

    Historically, resources are limited and getting Apache to load images/javascript/CSS files from disk each time they’re requested, even if the OS kernel eventually caches them to RAM, was a resources intensive process. Reverse proxies stepped up and identifies assets (images, JS and CSS), and stores them in memory for subsequent requests. This reduces the load on the Apache web server and reduces the hops required to serve the request. Thereby making everything faster.

    For homelabs, and single user systems, this is essentially irrelevant, as you’re not going to be putting so much load on the back end system to notice the difference. May be good to still turn it on, but if you’re noticing odd behaviors (ie updates to CSS or images not taking), it may be a good idea to turn it off to see if that’s the culprit.

  • Filled it!

    I understand your experiment is already under way, so it is unlikely that you’d be able to change your methodologies at this point. One small feedback on the questions, however. As presented (to me, maybe the system is randomized, I don’t know) the questions felt leaning towards difficult/complex to use, which may lead the user skewing their responses negatively. While this may be counterweighted by the fact that you’re asking a niche community using these systems already to complete the survey, it may still be a good idea to ask more neutral questions and allowing the users to select from a spectrum instead.

    For example; instead of “I find the system unnecessarily complex; Strongly Disagree… Strongly Agree”, it may potentially be better to ask “How do you find the system? Very Straightforward … Very Complex”. Your score for each of the selection would be consistent (1 is less complex while 5 is more complex), but you’re not impressing a negative sentiment on the user.

    Anyway, good luck with your study! Looking forward to your published results!

  • Could be a fun category extension. LLM Dragon% RSG: Using a fixed system such as AWS g5.xlarge for example (for fairness of frame rate), players are allowed to use LLM of their choice, using a consistent screen parser to generate a string describing the screen state to be filled as part of their LLM prompt, that’d navigate through the game from start to finish.

  • Docker inside LXC adds not only the overhead they’d individually add — probably not significant enough for it to matter in a homelab setting — but with it also the added layer of complexity that you’re going to hit when it comes to debugging anything. You’re much better off dropping docker in a full fledged VM instead of running it inside LXC. With a full VM, if nothing else, you can allow the virtual networking to be treated as it’s own separate device on your network, which should reduce a layer of complexity in the problem you’re trying to solve.

    As for your original problem… it sounds like you’re not exposing the docker container layer’s network to your host. Without knowing exactly how you’re launching them (beyond the quirky docker inside LXC setup), it is hard to say where the issue may be. If you’re using compose, try setting the network to external, or bridge, and see if you can expose the service’s port that way. Once you’ve got the port exposure thing figured out, you’re probably better off unexposing the service, setup a proper reverse proxy, and wiring the service to go through your reverse proxy instead.