Salta al contenuto principale


in reply to jankforlife

Was NATO really built by Nazis?

No. It was built by western states and diplomats. It did however let some Nazis in to the command structure primarily because they had experience fighting the soviets. Both sides of the cold war started recruiting nazis around the 1950s which is why you start seeing tons of books from famous nazi generals about how they absolutely could've beaten the soviets. It was more or less a grift to get paperclipped to America or given an advisor position in a NATO country. The soviets also did this a ton too, the nazis in the warsaw pact just didn't need to sell books to get recruited.

reddit.com/r/tankiejerk/commen…

in reply to jankforlife

And did you know that Putin would become Shitler? A second rate knock off of Hitler.

in reply to geneva_convenience

It is a disgrace, though it comes to mind that Marjorie Taylor Green does say this kind of thing about Jews with little consequence. She recently called Ben Shapiro an invader over the rumor he might take over TP USA.

A disturbingly large enough portion of Americans seem fine with the Christian fascism that's been fermenting in our country for a while now.

in reply to TheAlbatross

I recall her saying stuff about Jewish donors but has she also said no Jew should be in congress?

in reply to ☆ Yσɠƚԋσʂ ☆

4 peoples recount to the press the time they were stranded on a small uninhabited island. 3 of them talk about how hard the 4th made it for them because he would eat almost everything that they fished, hunted and harvested by himself and leave only leftovers for the 3 and didn't fish, hunt or harvest anything himself.

An economist cut them off and says that, actually, the 4th did them a favor because he generated almost all the demand for fish, meat and fruits and without him they wouldn't have had a job on the island.

in reply to ☆ Yσɠƚԋσʂ ☆

Three men survive a plane crash on a remote island and start thinking about how to escape. The first says, ‘I’m a carpenter, I’ll build us a boat.’ The second says, ‘I’m a fisherman, I’ll catch fish to feed us.’ The third says, ‘I’m an economist, let’s assume we have a ship.’

in reply to jackeroni

I recall watching an interview with Jacques Baud, who was a colonel in Swiss intelligence, and he pointed out that Russian propaganda works in support of material reality where western propaganda tries to invent a whole alternate reality.
in reply to jackeroni

.world and .ml. The eternal rivalry. Never change, Lemmy. Never change.


World Bank’s Favoritism for Ukraine Over Africa Highlights Prioritization of War Over Development




Is there a phone I can buy that out the box is rooted, private, and does not install bloat apps?


I'm frustrated. I'm a long time fan of Motorola. Their phones have been pretty simple and easy to remove junk apps. Recently I got an update that forced perplexity on my phone.
in reply to LAN_Mower

You should never buy a phone that's rooted out of the box, no matter what the company promises. Never.
in reply to LAN_Mower

shop.fairphone.com/the-fairpho… is an option


Tar did a weird thing today


I'm so baffled I had to ask – why this behaviour?

cd /var/www/html
tar czf ~/package.tgz admin/* api/* mobile/*

I do this, and the resulting package doesn't include a couple of hidden files – api/.htaccess and admin/.htaccess. However...
cd /var/www/html
tar czf ~/package.tgz *

This time the hidden .htaccess files are there.

Does anybody have enlightenment to offer as to why?

in reply to tasankovasara

This is potentially a great 'weeder' question for junior Unix admin interviews, as it requires some knowledge about shell globbing and tar dir traversal.

I admit it took me a sec (and a second read) before I got it, so it was a fun "hey what" exercise.

Excellent question.

in reply to corsicanguppy

Dang as soon as you said globbing I realized what had happened but didn't see it right away either


Louisiana immigration judge orders Palestinian activist Mahmoud Khalil deported to Syria or Algeria


On Wednesday, a Louisiana immigration judge’s order to deport Palestinian activist and Columbia University graduate Mahmoud Khalil to either Syria or Algeria was made public.

The order by Judge Jamee Comans is a significant escalation of the Trump administration’s efforts to criminalize free speech and target opponents of the Gaza genocide for removal from the US...

The ruling is notable for its transparent political purpose. Trump administration immigration authorities are pursuing a vendetta against Khalil who has no criminal record and has steadfastly refused to be intimidated.


in reply to technocrit

The order specifies deportation to either Syria, where Khalil was born to Palestinian refugee parents, or Algeria, from which he holds citizenship through a distant relative. Comans justified the dual destinations under statutes governing removal of stateless persons and nationals of more than one country. Sending Khalil to Syria may well be a death sentence. As for Algeria, he possesses no meaningful ties to that country.


"Just send em back anyhow! There ain't a difference where"

Death to Amerikkka and the Euroanglo-Zionazi entity. Send the settler judge back to Europe while it's going down too.



Israel “falsifying” Palestinian rapes to further Gaza genocide


Israel is “falsifying claims” of Palestinian rape against Israelis on 7 October 2023 to “to justify a further genocide” in Gaza, a groundbreaking new report says.

Published by the Sexual Violence Prevention Association this week, the report documents how Israel is deploying “wartime rape propaganda” and the “weaponization of sexual violence as a tool of war” in Palestine.

The report deploys a framework the group has dubbed SORVO – Systemic Oppression, Reverse Victim and Offender: “a tactic employed by oppressive groups to weaponize sexual violence, and accusations thereof, to justify their oppression.”

Omny Miranda Martone, the report’s lead author, said, “I am seeing SORVO employed against Palestinians every single day. We cannot allow Israel and the US government to use sexual violence to justify genocide.”

The report details how Israel has created a false narrative of Palestinian rapists as a way to both cover up the reality that Israeli soldiers are raping Palestinian detainees and as a way to justify their genocide in Gaza.

Questa voce è stata modificata (1 mese fa)


A 1978 promo for Intellivision—just a year before it hit shelves


Even 47 years later, this thing gets me hyped. The “Master Component” had a 16-bit microprocessor?! Three-part harmony music? A display they called an “extraordinarily high level of resolution”? That sounded like the future. Sign me up.

And when they start hyping up ROM cartridges to a general audience, most people probably had no clue what that meant. But it must have felt like home electronics had just landed on the moon.

This was the first real console war: Intellivision vs Atari 2600. And wild to think—two years ago, Atari finally bought Intellivision.



Is the Intel FSP blob a backdoor?


Libreboot supports the Dell 3050 Micro and the Lenovo T480. I was wondering, since it requires the FSP blob, could it be a backdoor? Does anyone know how it works? Compared to the T440p and 9020, those boards are 100% free BIOS, but lack newer microcode updates.

in reply to ColdWater

I've put a GNU sticker over one, and a Tux sticker over another. I should see if there's a Debian spiral sticker I can get (or even custom keycaps) for future keyboards.


Together for Gaza! German comrades: Join us next week in Berlin!


I don't know if there is a better place to post this, but let's make this the biggest demonstration for Gaza in the history of Germany.
Questa voce è stata modificata (1 mese fa)
in reply to mathemachristian [he/him]

Thank you very much! I'll try to make another account tomorrow. 😀 I'll reach out if I need any help. Again thank you very much!
in reply to redbear

Oh please its nothing at all, thank you for your outreach efforts



Giga vaxxed


(im pro non-nudged-vax, fr)
in reply to lol669

Can I just get all the vaccines so that I become invincible?


Software taking the principle of Track-Me-Not and AdNauseam further?


Is there more software that, like TrackMeNot and AdNauseam, generate random internet activity so as to reduce the accuracy of any profiles tracking companies keep about you? E.g. software that carries out complete plausible-looking surfing journeys in the background: not just issuing searches (like TrackMeNot) and following ads (like AdNauseam), but also clicking on other links, scrolling, going back, perhaps even watching a YouTube video every once in a while and browsing Facebook? (All this, of course, respectful of the environment and the limited resources of small projects.) Or apps for the smartphone to generate false but plausible-looking position data and the like?

(Background: As many of you know, trackmenot is a browser extension that enhances your privacy by generating random search queries in the background, watering out the profiles that Google, Microsoft (and Yahoo, Baidu and AOL) have of you. It's available in the Firefox extension store; whereas for Chrome, Google has banned it from its store for unfathomable reasons. There's also AdNauseam, which works towards the same goal by randomly clicking ads in the background.)

Questa voce è stata modificata (1 mese fa)
in reply to Novi Sad

I'm actually not in favour of obfuscation methods, as recent events have shown - authorities questioning a dude for wearing the same innocuous shirt?

Random traffic might turn out to be 'traffic of interest' for just being the at the wrong place, wrong time. I would prefer actual strong cryptography and isolation.

Questa voce è stata modificata (1 mese fa)
in reply to icelimit

I agree, it could be a last resort when things like ghostery or such fail, but otherwise there's enough crap saturating the wires, no need to artificially inflate that
in reply to icelimit

authorities questioning a dude for wearing the same innocuous shirt?


Why wouldn't they tho? Both persons had the same shirt on. That seems like a no brainer to me. Maybe I'm missing something. It's one of the reasons when I go out in public, I do not wear clothing that are emblazoned with logos, graphics, words, etc. For one, it doesn't do anything for me to wear logos, graphics, words. To me, it's akin to having a political yard sign or bumper sticker. What do you gain from it? What's it do for you? Some guy wearing a t-shirt with a cannabis leaf across the front, again why?, and it's an easy identifier and puts another tick mark for complimentary evidence.

I’m actually not in favour of obfuscation methods


I'm a big fan of it all.

in reply to irmadlad

Maybe I should clarify - I'm not a fan of human noise (there's probably a more precise term) - I'm more in favour of privacy/anonymity in the midst of actual, randomized noise, that isn't just random human activity.

I don't even mean t shirts with a logo. It could've been a pair of jeans on a specific date at a place in conjunction with 5 other (random obfuscated) things that a poi also happened to do. Like googled 'how to fold a swan' or whatever.

Even if you didn't do these things but was instead random generated traffic, it would generate unnecessary attention.

One might argue that if enough people adopted such methods, authorities would have too many leads to follow up. But then again, the chances of a random string of generated activity coinciding with that of a poi isn't high, so there likely will be a manageable number of leads.

Even if the number were higher, they have proven to have no qualms about skipping due process. As long as they might've gotten the actual poi, they have no problems subjecting many more unrelated to the same treatment because everyone is some sort of terrorist now.

They could also arrest you just because you have higher than normal randomized traffic and activity that you can't or won't answer for.

"Why did you search how to fix a sink leak and then how to fold a parachute within 2 minutes of each other?? You must be a terrorist generating random activity to hide your true actions. What do you have to hide?" - "found coke stuffed in all the couches and beds boss"

Questa voce è stata modificata (1 mese fa)
in reply to icelimit

They could also arrest you just because you have higher than normal randomized traffic and activity that you can’t or won’t answer for.


I hear what you're saying, and I'm not going to call it paranoia, however, that isn't in my threat model. Entities that can come into your home, arrest you, and ship you off to Guantanamo for buying a parachute and a drain kit for the sink are not in my scope. Frankly speaking, that is probably not in 90% of most people's threat model, who care about privacy, anonymity, and security. Those entities don't even need to fabricate an excuse like a couch full of coke, to give you that full Guantanamo experience.

To tell the truth, I probably couldn't account for 75%+ of the websites I've visited just today. When I get to researching something, it's usually pages and pages, from many, many different sites. Highlight, search, read, nothing here, go back, highlight, search, bingo! Now for more in depth reading. Highlight, search....ad nauseam. This process happens very quickly. I don't watch TV at all, and I don't read fiction. 99.99% of what I do read tho, comes off the internet. So, they'd have to sift through a bunch of data.

Even if you didn’t do these things but was instead random generated traffic, it would generate unnecessary attention.


I'm quite certain that all of my privacy, anonymity, security, and obfuscation efforts has put me on someone's list, but again, that's not in my threat model. I'm not hiding from the government. I send them tax forms every year. I vote prolifically in both local and nationwide elections. I pay property taxes, etc. They know who, and where, when it comes to finding me. If I were a person of interest, they'd come visit. Now, I'm certainly not going to overshare with them in the least either. Hell, I'm not hiding from anyone. I'm just preventing unauthorized access. That is what keys and locks do.

Rock on bro!

in reply to Novi Sad

There’s also AdNauseam, which works towards the same goal by randomly clicking ads in the background.)


Funny thing that I found out is that you actually have to have advertisements allowed on your network for it to work. LOL



Samsung Embeds Israeli Surveillance App on Phones Across MENA


A nonprofit organization dedicated to advancing human rights in digital spaces across West Asia and North Africa — is warning that Israeli-linked software secretly embedded in Samsung phones across the MENA region poses a serious surveillance threat.

According to SMEX, Samsung’s A and M series devices either come preloaded with the app “Aura” or install it automatically through system updates, without the user’s consent. The application reportedly collects a wide range of personal and device-specific data, including IP addresses, device fingerprints, hardware details, and network information.

​​In 2022, Samsung MENA partnered with Israeli tech company IronSource, integrating its Aura software into Galaxy A and M series phones across the region. The partnership was publicly marketed as a way to “enhance user experience” with AI-powered apps and content suggestions.

https://www.moroccoworldnews.com/2025/06/212144/samsung-embeds-israeli-surveillance-app-on-phones-across-mena/

Unknown parent

lemmy - Collegamento all'originale
IndustryStandard
Godot for the win
in reply to IndustryStandard

After everything that has happened in the past 2 years, that entire region should entirely boycott Samsung until they're clear all Israeli spyware is cleared out of phones. The Middle East is a fairly large Market and everything Samsung should be forbidden entry by leaders of those countries until this is fixed.
in reply to hector

Morocco is a prime Israeli weapons customer they probably asked for it themselves.
in reply to hector

Agree but knowing people from there many workplaces don’t leave you a choice.


[Video] Documentary - Owen Jones goes to Palestine


Questa voce è stata modificata (1 mese fa)

in reply to SugarCatDestroyer

Don't worry! There won't be a future for very long! Ecological collapse will save us!
in reply to SugarCatDestroyer

Is there a black market for Doctors (other than charities) ? Feels like an opportunity for an enterprising group of doctors.

Forking the medical industry with free treatment probably needs a gofundme . . . . . Or what the rest of the world calls a national health service.


in reply to Plum

I used to work at a gas station decades ago that charged $20 for the 1 gallon Jerrycans. It was really rough anytime I had to sell one, because the only people who need them are already desperate. Anytime I was working alone I would give them away.


Announcing the Soft Launch of Fedora Forge


in reply to illusionist

FYI

We are thrilled to announce the soft launch of Fedora Forge, our new home for Fedora Project subprojects and Special Interest Groups (SIGs)!
in reply to minimalfootprint

Yes, it's the first line in the excerpt. Not really sure why it needed to be repeated in a comment too. 😀
in reply to Strit

Because the title didn't tell me what the Fedora Forge is. I figured I might not be the only one and wanted to save someone a click.
in reply to minimalfootprint

Some clients show an excerpt (I ain't complaining about you putting it in a comment though) so probably to that guy it looked like you just copy/pasted this thing

Questa voce è stata modificata (1 mese fa)
in reply to dreadbeef

it's hard to imagine anyone using lemmy wo excerpts to articles since lemmy is 90% links to articles.
in reply to eldavi

On Thunder I have no excerpt and I find really annoying all those who post link without comments. They are just doing clickbait like any news aggregator. If I want that there is already google news for instance...
So I value those who add a comment to their post and say why they post it and find it interesting. Isn't Lemmy all about sharing thought, so does poster except other to do it for him and just want to have popular posts?
Questa voce è stata modificata (1 mese fa)
in reply to Matth78

i wish i understood why people use those apps to browse lemmy. i used to think that they were pointless, but watching them drive up the userbase numbers up for .world and .ee made it seem like i must be missing something so i tried all of the ones i could find and the experience was the same for me as it is with a browser.
in reply to illusionist

Whoohoo! I wad just saying how cool it would be if big projects like Fedora, OpenSuse, the free desktop foundation, kde, gnome, etc moved to forgeo because of the impending federation support linking them all together

in reply to sabreW4K3

Only took two years for Corporate media to start reporting what these Zionist psychopaths say to each other in their language rather than rely on official propaganda.
in reply to Mrkawfee

They will probably scold them in two more years


in reply to Viking_Hippie

The term Liberal Zionist is like Liberal Nazi. Or Liberal Liberal.



Developer / Potential Contributor Question: how to add a custom post/comment ranking algorithm to Lemmy?


How would I add a new ranking algorithm to Lemmy as a contributor? I'm a developer by trade, but unfamiliar with Rust and the codebase of Lemmy specifically. It doesn't seem like Lemmy has a concept of 'ranking plugins', so whatever I do would have to involve an MR.

Specifically, I'd like to introduce a ranking system that approximates Proportional Approval Voting, specifically using Thiele's elimination methods, like is used in LiquidFeedback.

I'm pretty sure that with a few tweaks to Thiele's rules, I can compute a complete ranking of all comments in a thread in O(ClogC + E + VlogC), where C is the number of comments, E is the total number of likes, and V is the number of users. This would also support partial approvals, upvotes could decay with age.

I believe this would mitigate the tendency towards echo chambers that Lemmy inherits from Reddit. Lemmy effectively uses Block Approval Voting with decays to rank comments and posts, leading to the same people dominating every conversation.

in reply to Nutomic

I was thinking of it as a drop-in replacement for "hot" just so that it doesn't require any changes on the UI to implement. I'm a bit rusty with UI development, lol. The frontends wouldn't have to add a new button, and the Lemmy API wouldn't need to add a new sort type. That said, maybe that sort of thing is easy to do?

As far as it would work, Thiele's elimination rules is computed roughly as follows (I'm assuming that only upvotes are counted; I haven't considered yet if the process works if disapprovals count as a vote of "-1" or how the process could remain scalable if an abstention counts as a vote of "0.5":

begin with the list of posts, list of users, and list of votes

# initial weighting, takes O(E)
for each post:
    for each vote on the post:
        lookup the user that voted on the post
        based on the number of votes the user has given, determine how much the user would be made "unhappy" if the current post was removed
        # the basic idea here is that if the user didn't vote for a post, then they won't care if its removed
        # if the user did vote for a post, but also voted for 100 others, then they probably won't care if one gets removed as long as 99 remain
        # if the user did vote for a post, but only voted for 2 or 1 others, then they'll care more if this one gets removed
        # if this is the only post the user voted for, then they'll care a lot if it gets removed
        # LiquidFeedback uses a formula of "1/r", where r is the total number of votes the user has given
        # as posts get removed, the votes get removed too, so surviving votes get more weight
        # for the sake of efficiency, I'll probably use a formula like "if r > 20 then 0 else 1/r" so that users only start to contribute weight to posts once they only have 20 approvals left. Replace 20 with a constant of your choice
        add the user's resistance to the post being removed to the post

# initial heap construction, takes O(C)
construct a min-heap of the posts based on the sum of the users' resistances to the post being removed

# iterative removal of posts
while posts remain in the heap: # O(C)
    remove the first post in the heap - this has the least resistance to this post being marked 'last' in the current set # O(logC)
    yield the removed post

    for each vote for the removed post: # in total, O(E) - every vote is iterated once, across the entire lifetime of the heap
        lookup the user that voted on the post
        compute this user's resistance to this post being removed
        remove this vote from the user
        based on the number of remaining votes the user has given, compute the user's resistance to the next post being removed
        compute how much the user's resistance to their next post being removed increased (let this be "resistance increase")
        if "resistance increase" is nonzero (based on my formula, this will happen whenever they have less than 20 votes remaining, but not if they have more than 20 votes remaining):
            for each vote for a different post by this user:
                increase the post resistance to removal by "resistance increase"
                perform an "increase_key" operation on the min-heap for this post # this will be O(logC)

               # worst-case, each user will perform 20 + 19 + 18 + ... "increase_key" operations - 
               # they only begin once there are 20 votes remaining 

               # when they have 20 votes remaining, they have 20 increase_key's to do
               # when they have 19 votes remaining, they have 19 increase_key's to do
               # etc.

               # because this is a constant, it doesn't contribute to the time complexity analysis.
               # so each user performs at worst a constant number of O(logC) operations
               # so the overall time complexity of the "increase_key" operations is O(VlogC)

For this algorithm, the yield the removed post statement will return the sorted posts in reverse order. So worst to best. You could also interpret that statement as "Give the post a rank in the final sorting of count(posts) - (i++)".

Thiele says that process can be used to elect a committee of size N by stopping your removal when N votes remain. But because it's a "house monotonic" process (electoral speak for "increasing the size of the committee by one and re-running an election is guaranteed not to cost any existing members their seat), I figure it could be repurposed to produce a ranking as well - the top one item is "best one", the top two items are the best two, the top three are the best three, etc.

To make the above process work for approvals that decay over time, we'd just treat a decayed approval as a partial approval. I still have some work to do on how exactly to integrate partial approvals into the "resistance to removing each post" calculations without ruining my time complexity. But basically it's a proportional score voting election instead of proportional approval.

in reply to CrashLoopBackOff

Adding a new sort type is not a big deal, so dont worry about it. And a new admin setting for this would also require UI changes, so the new sort type is easier overall.

The current sort options calculate the rank for each post only from the data on that post (number of votes, creation time). Your suggested algorithm looks much more complicated than that, as it requires two iterations and needs to access data from multiple posts at once. Im not sure if this can really be implemented in a way thats performant enough for production use. Anyway feel free to open a pull request, then hopefully other contributors can help you to get it working.

Questa voce è stata modificata (1 mese fa)


How to protect my identity while running an online store?


Hello, Sorry if this is the wrong place for this.

I am looking to start an online store for some art projects/crafts/stickers mostly as a creative outlet for some of my current frustrations.

Since some kinds of people take art way too personally, I want to take precautions from doxxing or being harassed.

What are some best practices for an online shop? Are there any recommended storefronts or something like that? I’m sure there’s a lot of things I’m not even considering.

Any help would be much appreciated, Thanks

in reply to philophilsaurus

Whatever you do don't get a domain name (website) and register it with your name and other info they want like email, phone nunber and address. Anyone could whois you and find out all that information in literally 1 second by just typing in your website and it's usually public data unless you request and pay extra for them to hide your info
in reply to Aether Crescent 🌙

Most domain registrars make whois info private by default these days. It's typically just a toggle. Same with DNSSEC


Contractor Used Classified CIA Systems as ‘His Own Personal Google’




Contractor Used Classified CIA Systems as ‘His Own Personal Google’


This article was produced in collaboration with Court Watch, an independent outlet that unearths overlooked court records. Subscribe to them here.

A former CIA official and contractor, who at the time of his employment dug through classified systems for information he then sold to a U.S. lobbying firm and foreign clients, used access to those CIA systems as “his own personal Google,” according to a court record reviewed by 404 Media and Court Watch.

💡
Do you know anything else about this case? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

Dale Britt Bendler, 68, was a long running CIA officer before retiring in 2014 with a full pension. He rejoined the agency as a contractor and sold a wealth of classified information, according to the government’s sentencing memorandum filed on Wednesday. His clients included a U.S. lobbying firm working for a foreigner being investigated for embezzlement and another foreign national trying to secure a U.S. visa, according to the court record.

This post is for subscribers only


Become a member to get access to all content
Subscribe now


in reply to Five

I'm pretty sure he's far from the only one. Databases with such a vast amount of "forbidden" knowledge will always be misused.

That's why we shouldn't have global surveillance, espionage and "highly classified material" wherever it's possible for agencies to do their jobs without them.

And I'd argue most of the data the contractor had access to was neither relevant for his own work, nor for the work of all of the CIA.

in reply to Helix 🧬

We’ve known since Snowden that these people browse private info for fun, and exchange anything spicy they find with each other. But this guy was straight up selling classified info to anyone who would buy it.

I’m shocked they’re letting this guy off with a plea deal. This was so far beyond misuse of systems. This was full on treason.

Questa voce è stata modificata (1 mese fa)
in reply to surph_ninja

I’m shocked they’re letting this guy off with a plea deal. This was so far beyond misuse of systems. This was full on treason.


but he didn't try to run or get caught running in russia; so he's ok. lol

in reply to eldavi

More likely they didn’t want to set a precedent of prosecuting people for selling state secrets, since they’re all doing it.
in reply to surph_ninja

either that or the people in charge are saving up lol
in reply to surph_ninja

He probably kept it all in cardboard boxes in his bathroom, which as we all know is totally fine now.
in reply to Random Dent

Depends which kind of partisan you’re talking to. One kind believes it’s ok to keep them in boxes in a bathroom. The other kind thinks ok to keep them in the trunk of a car or a private server.

Reasonable people want both kinds held accountable.

in reply to Five

this happens unsurprisingly often. the NSA calls it LOVEINT


Fact : what's really behind the Swiss E-ID


End of September, Switzerland will vote for E-ID.
A big threat for our privacy as it will widely used for tons of new use cases.

Behind the government pitch of an "open source project, completely optional" hides big tech industry... Which will make it mandatory to access their services.

What are your thoughts on that ?

#Switzerland #Privacymatters

Questa voce è stata modificata (1 mese fa)
in reply to harfang

private ids where always the scope of the privacy movement. However, it may as such present other challenges which can include age based discrimination. It as such must be implemented wisely.

Age is already being weaponised against us (child protection, etc), this shouldn't be like that - We can already see what kind of power governments hold. Ageism is what will ultimately destroy us.



Filter Your Files Directly in Zsh, Without Long Pipelines | Bread on Penguins


Sections
0:00 zsh opts
1:31 wildcards
2:46 when to glob!
4:08 special patterns
4:50 filtering, sorting
7:10 $f example
8:25 when not to glob!
in reply to Otter Raft

i use zsh on my work macs and now i'm thinking of doing so too on my linux machines because of this lady's videos.

i've been using bash for 20+ years and my work macs keep reminding me that the transition is going to have hiccups because bash has become muscle memory for me.


in reply to Bluefalcon

Our president will say something idiotic. Is that what you are waiting for?
in reply to Bluefalcon

this is like the homophobes and gay marriage; a mayor in new york has literally nothing to do w him in texas, but he feels like it does.
in reply to eldavi

In my city we have people coming from out of state, to protest our mayor. It's bollocks.



A Reforma Administrativa avança para destruir o Estado brasileiro


cross-posted from: lemmy.eco.br/post/16758437


How L.A.'s Playbook Can Guide Chicago's Fight Against ICE




Of course, Bernie couldn't have it any other way


sanders.senate.gov/op-eds/it-i…


I'm all in on linux. [Damien Wilde]


windows is ass. i use only linux now.
in reply to CocaineShrimp

Yeah the Insta360 desktop app runs through WINE just fine!
in reply to Ulrich

Have you got hardware acceleration working? I'll often take half a TB of 360 footage on a trip, and stitching it on Linux via Bottles isn't viable due to me not having hardware acceleration working. It takes days on my current Linux setup, as compared to less than a day with HW acceleration on Windows.

I have been just considering getting a Mac Mini M4 for 450 bucks next time it's on sale and using that as a DaVinci/Insta360 render server.

Questa voce è stata modificata (1 mese fa)


Best way to transport a computer out of country?


So I have a job that will be getting me out of the US. For most things I’m not to worried, except for my computer. What would be the best way to securely move it and also not potentially worry about damaging it?

It’ll be a given that I have an encrypted off-site (cloud) back up, but I’m torn about removing the drives to hand carry and then shipping the chassis. My only worry about that would be customs stopping me because of carrying hard drives… more specifically 3x M.2, which I’m not as worried about and 4x 2.5” SSDs

Thoughts?

in reply to ramble81

When I briefly moved to US end 1990s I put the motherboard and hard drives in hand luggage so I only had to buy the chassis and power supply there. This earned me a wipedown for explosive traces at the control. Asking "this is because of Lockerby, isn't it?" did not help things.
in reply to ramble81

Definitely take the GPU out and heatsink off the CPU, when it gets banged around both of those things because of their mass can fuck up your motherboard. I moved a lot for about a decade of my lifr and had multiple desktops get fucked up.

I'd also check these out: amazon.com/Shipping-Temperatur…



TIL about EMF paints that purportedly block em radiation


Given that EM serves as a lense into our homes, would this provide an effective counter measure??
Questa voce è stata modificata (1 mese fa)
in reply to BrilliantantTurd4361

RAM (Radar Absorbing Material) coatings have existed for quite awhile. We use them for all kinds of stuff in the military industrial complex. The main question I have is who is doing upkeep to make sure that material/paint is intact and still maintains efficacy. And also how much is that going to cost? This isn't new tech, but it sounds like some company is trying to market it to people afraid of 5G based entirely on the commentary here.
in reply to BrilliantantTurd4361

It's nice to know about, but imho, that's fairly high level paronia for the average citizen.

Reminds me of this picture.



TankieTube First Anniversary


cross-posted from: hexbear.net/post/6162015

Can you believe it? It's been a year since our official launch.

Statistics


Users: 957

Videos: 35,305 (38,135 including unlisted and private videos)

Views: 253,009

Comments: 1,468

Hosted Video: 24.2 TB

tankie.tube/

P.S. Live streaming (and other developments) coming soon!™^[Dependent on my time management and other priorities agony-wholesome ]




Your Therapists’ Notes Could Become Fodder For AI


in reply to Novi Sad

This is why I self medicate with cannabis instead of going to therapy. Never have to worry about my dumbass high thoughts getting stolen. /s /s
Questa voce è stata modificata (1 mese fa)