jim3692

joined 9 months ago
[–] jim3692@discuss.online -2 points 2 days ago* (last edited 1 day ago)

It was the last remaining exam before my deletion from university. I wish I could attend the lectures, but, due to work, it was impossible. Also, my degree is not fully related to my work field. I work as a software developer, and my degree is about electronics engineering. I just need a degree to get promoted.

[–] jim3692@discuss.online 4 points 2 days ago* (last edited 2 days ago) (8 children)

What models have you tried? I used local Llama 3.1 to help me with university math.

It seemed capable of solving differential equations and doing LaPlace transform. It did some mistakes during the calculations, like a math professor in a hurry.

What I found best, was getting a solution from Llama, and validating each step using WolframAlpha.

[–] jim3692@discuss.online 3 points 2 days ago (3 children)

Υπάρχει το Piped και το Invidious, που είναι open source web frontend για το YouTube.

Το Piped βασίζεται στον κώδικα του NewPipe.

Πάνω στο Piped, έχει φτιαχτεί και το Hyperpipe, που είναι frontend για το YouTube Music.

[–] jim3692@discuss.online 4 points 2 days ago* (last edited 2 days ago) (5 children)

Tuta Mail, Bitwarden, Mullvad VPN, Spotify Family

Θα ήθελα πάρα πολύ να αφήσω το Spotify, αλλά το Hyperpipe χρειάζεται αρκετή δουλειά.

Τα άλλα 3 ίσως τα έκλεινα και πήγαινα σε Proton, αλλά όχι στο άμεσο μέλλον.

[–] jim3692@discuss.online 11 points 3 days ago

I don't think they care about the budget. They probably care more about impressions and clicks. So, just use an adblocker, to lower their ad impressions.

[–] jim3692@discuss.online 3 points 4 days ago* (last edited 4 days ago) (1 children)

Sure, in many cases the dev's computer is powerful enough to handle that.

However:

  • The more the dependencies, the more likely it is to pull-off a supply chain attack. Any of those thousands modules can be compromised and infect either the user or the developer.
  • Not all computers are optimized for working with so many tiny files. Have you ever worked in a company that uses McAfee Antivirus? Even Defender can be a massive performance hit in some cases.
[–] jim3692@discuss.online 1 points 5 days ago

I had read about it on another thread, which was about using old smartphones as servers (they used Termux).

Those old lithium batteries, although sometimes seemingly healthy, can catch fire any time. Having them connected to the charger 24/7 is only making matters worse.

I wouldn't trust the battery of old devices. I would probably buy a used UPS (without battery) and slap a new battery to it. This would cost more, but it would allow me to also connect other important devices to it - like the router and some lights.

[–] jim3692@discuss.online 2 points 5 days ago (1 children)

I have a Wyse 5010. Be careful with your SSD plans. Mine had an mSATA SSD. Luckily, after removing the chassis of a SATA SSD, and only keeping the board, it could fit in there.

[–] jim3692@discuss.online -3 points 5 days ago (5 children)

Don't such satellites have a major flaw, that they revolve? Considering that earth is spherical, those satellites can only monitor some half of the earth each moment, given their sensors have such high FOV.

[–] jim3692@discuss.online 1 points 5 days ago

I feel the importance of user privileges distinction, as I see it from a server perspective and organization managed devices. Some would argue the insignificance of this in the personal desktops.

However, I believe that the community structure of Linux is benefiting everyone. It is a general purpose kernel, that gets improvements from various different sectors. In the current space, where most servers run Linux and most desktops run Windows, desktops are not benefiting from filesystem or scheduling optimizations implemented for servers.

[–] jim3692@discuss.online 1 points 5 days ago (2 children)

I had a look at Haiku some months ago. Its single user architecture is an interesting choice. I mean, you don't need to worry about privilege escalation exploits, if you are always fully privileged /s

[–] jim3692@discuss.online 2 points 5 days ago (2 children)

It's the first time I see the concept of bootstrappability in the context of security.

Is it really worth the effort?

There are multiple ways to run a supply chain attack. With bootstrappability, one can be sure that the compiler is trusted, but what about the code that the compiler compiles? There was this recent attack to XZ utils, which shows that more attention is needed on the code being merged and compiled.

I think that this just creates a false sense of security.

Contrary to that, I had read about a BSD team (I think FreeBSD) that reviews all the code before each release. This way they have achieved ~5 RCE exploits throughout their entire history.

 

I just discovered this open source obfuscator for mobile apps, that is funded by the European Union.

This has me wondering about the motives, since:

  1. the EU seems to be trying to move towards open source projects for their public domain, so no reason to obfuscate
  2. obfuscation methods should, by definition, be secret
 
 

cross-posted from: https://discuss.online/post/16753570

In 28/2/2023, at Tempi, 57 people lost their lives because trains in Greece lack the required equipment and personnel to operate safely.

Since then, the government has been tirelessly trying to make people believe that they are overreacting, in many cases completely disrespecting the families telling bullshit in the news channels. Such recent example was our Minister for Health, Adonis Georgiadis, saying that those families mostly care about the money from the compensations.

Today, I am proud that people all around the world have gotten to know about the tragedy and are trying to spread the message.

 

In 28/2/2023, at Tempi, 57 people lost their lives because trains in Greece lack the required equipment and personnel to operate safely.

Since then, the government has been tirelessly trying to make people believe that they are overreacting, in many cases completely disrespecting the families telling bullshit in the news channels. Such recent example was our Minister for Health, Adonis Georgiadis, saying that those families mostly care about the money from the compensations.

Today, I am proud that people all around the world have gotten to know about the tragedy and are trying to spread the message.

 

I had a conversation with some sys-admins that are trying to limit what their kids can access on the internet. One was worried about how to implement a YouTube channel whitelist on his network.

So, an idea came to my mind. Wouldn't it be relatively easy to implement this using Piped's API?

Given that the kids' devices are using self-signed certificates, allowing full traffic monitoring, it should be possible to filter YouTube videos using the data provided by Piped API.

Do you guys think it's a good idea? I could start this project, if people think that it's useful.

 

I recently learned that my company prefers closed-source tools for privacy and security.

I don't know whether the person who said that was just confused, but I am trying to come up with reasons to opt to closed-source for privacy.

 

This little monster chews cables. So, I ran power cords through water hoses.

view more: next ›