jeffhykin

joined 2 years ago
[–] jeffhykin@lemm.ee 1 points 4 months ago* (last edited 4 months ago)

I'm saying one of the big downsides has nothing to do with self discipline.

  • Even if we never click an advertisement.
  • Even if we never eat from the candy bowl.
  • Even if we never use the bad phone apps.

Merely living in a world covered in advertisements, living next to a delicious smelling candy bowl, living 30 seconds away from memes, rage-bait, doom scrolling, sports gambling, and other slop -- just living next to those things are bad for our mental health.

Some sources if you're curious on the research behind it. https://pmc.ncbi.nlm.nih.gov/articles/PMC4731333/

https://ajph.aphapublications.org/doi/full/10.2105/AJPH.2013.301694

https://scholarworks.uark.edu/mgmtuht/31/

[–] jeffhykin@lemm.ee 4 points 4 months ago* (last edited 4 months ago) (6 children)

I disagree. Yes there can be good intermediate steps, but deleting slop is not even half as healthy as locking a phone away.

  1. Interruptions

Not just phone calls or texts, but things like typing an email on the phone and then seeing a text or having the GPS interrupt your train of thought by yelling "Continue straight for 5 miles". Brains hate interruptions. Those are still going to exist even when the slop is gone.

  1. Resisting a temptation is exhausting. "not eating candy is healthy"... yes but having a candy bowl right next to your desk is exhausting. It takes 2sec to open a twitter link in the browser. Uninstalling an app is like moving the candy bowl to a nearby room, yeah its better, but it only takes 30 sec to reinstall.

Turning off the dopamine machine (not eating candy) is one thing. But Eddy was showing something a lot bigger than that; deleting his access to the temptation. He didnt know the code to unlock the phone.

[–] jeffhykin@lemm.ee 3 points 4 months ago* (last edited 4 months ago) (1 children)

less than 5% of Americans support using economic strong-arming, and less than 1% support military force for Greenland or Canada (source below). Annexing is overwhelming unpopular for both conservatives and liberals. The people, including people in the military, will revolt if Trump uses force to annex any country. And the people of Canada and Greenland have made it very very clear: force will be necessary.

No comment from me about the rest. Expectations can be bad but keep them in check.

https://angusreid.org/canada-51st-state-trump/

[–] jeffhykin@lemm.ee 2 points 5 months ago

Fair enough 😁 but think of the portability

[–] jeffhykin@lemm.ee 5 points 5 months ago* (last edited 5 months ago) (1 children)

My guess, 10,000x the cost on CL1. Even with the tech perfected, bio neurons fire much much slower than logic gates and electricity in a circuit board. If you have an ASIC (custom built board that isn't really using a CPU), the ASIC would be much much faster for deterministic calculations at high speed with an active cooling system.

Bio neurons are great at self-organizing. If you already know how they need to be organized (e.g. a hashing algorithm), and you need max-speed output there's no real advantage.

It's not wrong to say bio neurons are power efficient, its just that power efficiency depends on what the activity is.

[–] jeffhykin@lemm.ee 3 points 5 months ago* (last edited 5 months ago)

Don't worry all neurons are cage free, grass fed, open range

For real though, where the neurons come from is as interesting/impressive as the computation itself. The guys at Cortical, at least in prototyping, give blood samples, revert blood cells into a stem cell state, and then (over the course of 6 months) they convert their stem cells into neurons before putting them into a dish. (To be clear, Cortical did not invent the stem cell tech at all. Apparently its standard practice and nobody in the bio engineering world cared to tell the rest of the world.)

Meaning... You could theoretically build a computer out of your own neurons and then program them.

[–] jeffhykin@lemm.ee 3 points 5 months ago

The neurons in the machine (or at least the prototypes idk about every CL1) are neurons from the lab lead (Hans). And he has given consent 😁

[–] jeffhykin@lemm.ee 5 points 5 months ago

I'll ask them, I happen to see them in a zoom meeting occasionally.

I very very very much doubt its a new machine, however you might need to send your machine back to get it refilled as I imagine there is a precise integration between bio neurons and electrical hardware.

[–] jeffhykin@lemm.ee 6 points 5 months ago (1 children)

You actually legit feed it snacks haha. There's a nutrient mixture/sludge to keep them alive.

[–] jeffhykin@lemm.ee 3 points 5 months ago

Sounds good. Given its creeky all over the place, I'll probably try mapping out the joists first. I'll (hopefully) post an update after my attempt.

Thanks for the advice!

[–] jeffhykin@lemm.ee 2 points 5 months ago (1 children)
[–] jeffhykin@lemm.ee 2 points 5 months ago

Yeah I'd say that'd be pretty tough with carpet

 

Fingerprinting isn't always possible to defeat, and its not always possible to avoid making accounts (work and school accounts)

However, it should be possible to fill up tracked data with meaningless garbage and reduce the signal-to-noise ratio. Ex: a bot that browses random products on amazon to reduce profiling accuracy.

Do you guys know of any tools that do this? Anything from browser extensions to command line scripts, to anonymous group-accounts.

25
submitted 1 year ago* (last edited 1 year ago) by jeffhykin@lemm.ee to c/privacy@lemmy.ml
 

I'm asking for existing tools/systems that let me programmatically say: "here is my public key, BUT if each of these 5 other public keys all send a signed message saying that my public key has been compromised, then you should mark my public key as compromised, and use the new one they provide". (This is not for a particular task, I'm just curious if any existing auth systems are capable of this)

I call the idea "guardian keys" because it could be friends' public keys or or just more-securely-stored less-frequently-used keys that you control.

NOTE: I know this would not work for data encryption. Encrypted data is simply gone if a key is lost. But, for proving an identity, like a login, there could be a system like this but I don't know of any

 

I don't think I've seen any solarpunk art (much less real world construction) with transparent wood, so I wanted to share

Not only is transparent wood real but apparently it has been around in labs for a bit. Take a look! (And let me know if this is old news for you)

Article: https://arstechnica.com/science/2023/12/why-scientists-are-making-transparent-wood/

Wikipedia with video: https://en.m.wikipedia.org/wiki/Transparent_wood_composite

Original paper publication: https://45-79-48-20.ip.linodeusercontent.com/s/trDsHKKWwsHsQZ5

 

Why doesn't every computer have 256 char domain name, along with a private key to prove it is the sole owner of the address?

Edits: For those technically inclined: Stuff like DHCP seems unnecessary if every device has a serial number based address that's known not to collide. It seems way more simple and faster than leasing dynamic addresses. On top of that with VOIP I can get phone calls even without cell service, even behind a NAT. Why is the network designed in such a way where that is possible, but I can't buy a static address that will persist across networks endpoint changes (e.g. laptop connecting to a new unconfigured wifi connection) such that I can initiate a connection to my laptop while it is behind a NAT.

  • Yes, it would be a privacy nightmare, I want to know why it didnt turn out that way
  • When I say phone number, I mean including area/country code
  • AFAIK IP addresses (even static public ones) are not equivlent to phone numbers. I don't get a new phone number every time I connect to a new cell tower. Even if a static IP is assigned to a device, my understanding is that connecting the device to a new uncontrolled WiFi, especially a router with a NAT, will make it so that people who try to connect to the static IP will simply fail.
  • No, MAC addresses are not equivalent phone numbers. 1. Phone numbers have one unique owner, MAC addresses can have many owners because they can be changed at any time to any thing on most laptops. 2. A message can't be sent directly to a MAC address in the same way as a phone number
  • Yes, IMEI is unique, but my laptop doesn't have one and even if it did its not the same as an eSim or sim card. We can send a message to an activated Sim, we can't send a message to an IMEI or serial number
 
  • I make websites
  • If someone is banned twice (two accounts) I want it to take them more than 5min and a VPN to make a 3rd account
  • I'm okay with extreme solutions, like requiring everyone to have a Yubikey-or-similar physical key
  • I really hate the trend of relying on a phone number or Google capcha as a not-a-bot detection. Both have tons of problems
  • but spam (automated account creation) is a real problem

What kind of auth should I use for my websites?

 

Often we dig our own grave making people "defend" their opinion. Instead of winning them over, we push them to become more and more entrenched in their opinion as they build larger mental defenses against the challenges we present. So I want to hear from you:

How do you avoid putting people on the defensive? (Even though those people had a strong alternative opinion)

What was a time where the opposite happened; all the facts were there, but absolutely no one was convinced by the talk?

I feel like solarpunk has a lot of obvious-once-seen ideas and powerful "ahh-ha" moments. But if we can't convince others to take a glimpse from our perspective, not much benefit will come from it.

31
submitted 2 years ago* (last edited 2 years ago) by jeffhykin@lemm.ee to c/programming@programming.dev
 

My friends and I did this a while ago and it was quite fun.

 

JSON and YAML work great for passing data between languages.

However, sometimes, I have a pure function like y = mx + b, that I would like to pass between languages (for making plots).

What operators should be available? I think jsonnet's standard library(skip to the math operators) is the perfect example of a useful set of operations that could be shared across basically all programming languages. The operations would take/return json values rather than working with language-specific data types.

My question is does such a language exist already?

Close candidates:

  • Dhall and jsonnet are pure languages that generate json. But AFAIK they can't actually serialize pure functions. They can only use pure functions as a shorthand for generating json. I want to actually save/send functions over the wire.
43
submitted 2 years ago* (last edited 2 years ago) by jeffhykin@lemm.ee to c/asklemmy@lemmy.world
 

This might be a limitation of Lemmy or voyager, but is there some option for me to "watch" or "subscribe" to a post and be notified of new comments?

Especially relevant to asklemmy since occasionally I see a post before there's any answers.

10
submitted 2 years ago* (last edited 2 years ago) by jeffhykin@lemm.ee to c/adhd@lemmy.world
 

I'd like a small group with strict/well-defined meeting times that has a coach/conversation-conductor to keep topics on track. I feel like it would work really well if advice was given/received by others with ADHD, while having a leader do stuff like

  • make sure 1 person doesn't dominate the conversation
  • keep meeting notes
  • call/text people who miss a meeting
  • follow up with people who said they were going to do something

But I've never really heard of such a system.

I've found at least two online services, but I don't really know if they're worth trying. I'm curious on your opinion and/or if any of you have tried something similar.

There's "Study Hall" which I'm not sure is what I'm really looking for https://adult-study-hall-by-adhd-rewired.mn.co/sign_up?plan_id=230880

Then this site seems to have good coaching https://news.ycombinator.com/item?id=37252231

25
submitted 2 years ago* (last edited 2 years ago) by jeffhykin@lemm.ee to c/fediverse@lemmy.world
 

If a human posted every 5 min, got 0 upvotes for 20 posts straight, we would ban them for spam. If bots would limit themselves to posting once a day, or once a week, and only post the top-voted non-duplicate post of that timeframe, it would be a dramatic improvement. For once, we might actually see real-lemmy posts along side bot posts, instead of the community being exclusively bots (or 99% bot posts) or exclusively Lemmy users.

I would tell the bot creators myself, except I don't know how to get in contact with them. Is there a consistent way to contact a bot creator?

22
submitted 2 years ago* (last edited 2 years ago) by jeffhykin@lemm.ee to c/solarpunk@slrpnk.net
 

I plan to speak to my city council about creating a tool library, where citizens use their existing library card to checkout tools. To make the idea a bit more robust, I'm also planning to require citizens deposit something as collateral when checking out a tool.

However.

I live in Texas (I love Texas). Thankfully my city council is receptive, but I know they're going to need compelling evidence before approving something like this.

So, if you guys have any advice, or examples, particularly of this kind of system working in the US, I would love to hear about it!

view more: ‹ prev next ›