planish

joined 2 years ago
[–] planish@sh.itjust.works 4 points 1 week ago (1 children)

Yeah, a TPM is, essentially, a piece of bondage gear. It's shackles put on you to try and convince someone else of what you can't do. It has niche applications but it's not a valid thing to require of the general population.

[–] planish@sh.itjust.works 43 points 1 week ago* (last edited 1 week ago)

Computers have systems (BIOS, EFI, ACPI) that give the people who make the machine responsibility for providing a standard, publicly-defined way for the OS to enumerate the hardware, and to use the hardware in a basic way even if the OS has never heard of it. Linux can get a kernel panic on the screen even if it has no idea what your GPU is, because EFI understands it and Linux understands EFI. It is set up this way partly because there's a real possibility of hardware being added or removed, partly because people routinely mix and match parts, and partly because IBM mistakenly designed a good system that was easy to work in and not one that kept them in business.

Phones (and phone-derived systems like the Raspberry Pi and other single-board computers) don't implement a standard. The hardware and its boot process assumes tight integration between the hardware and the software, usually to the point where the bootloader refuses to load anything not signed by the device manufacturer, unless it is satisfied that it has been given that manufacturer's permission to be unlocked. (Computer secure boot implementations generally trust, for example, Microsoft, as well as the machine owner, who can load their own keys.)

Instead of the CPU developers releasing example EFI implementations, they release forks of the Linux kernel that they maintain as long as that chip is the latest chip they sell, and then fork off the mainline kernel again for their next chip. And the device makers ship devices by starting with the chip maker's kernel, customizing it for the device, giving it a "device tree" that tells it everything that is supposed to be in that particular device, and shipping it. For a few years they port patches from the current kernel onto this forked kernel, and then they stop. With no standard to develop software against, and no documentation for what's in a device and how to use it like there is for the standard's interfaces, the only practical way to run software on a device is to start with that patched kernel.

Mainline Linux refuses to adopt and maintain the chip and device makers' low-quality, chip-and-board-specific kernel changes (often because they break the kernel for other uses), so you can't generally use a mainline Linux kernel instead. If you tried to tease out and improve the device-specific patches to the point where mainline Linux would take them, the device would be hopelessly outdated by the time you were done and you would have dozens of job offers to occupy your time as a highly skilled embedded Linux developer. The work is not practical given the tiny number of people who would benefit from it for a particular device, and how little it pays off compared to just buying a new device with a more up to date forked kernel available.

"Maintaining" a device for LineageOS or other open software eventually collapses under the weight of mainline Linux's changes and the necessary chip and device maker patches no longer being practically reconcileable.

[–] planish@sh.itjust.works 6 points 1 week ago (3 children)

I don't think this is going to change the overall situation, it's just a single point new system requirement, like the plausible GPU was for Vista.

Now, if they start expiring the old TPMs every few years, and Windows 12 needs a TPM 4.0 or something, then this will change the overall situation. At least on the Windows side.

[–] planish@sh.itjust.works 2 points 1 week ago

“hanging with the bad crow"

That's my favorite Sonic mission.

[–] planish@sh.itjust.works 4 points 1 week ago (1 children)

Etsy IIRC is not meant to be a general marketplace: it's meant to be for handmade or flea-market vintage type stuff.

They then have to turn that into hard rules, and one of them is you can't just manufacture stuff and turn around and sell it: manufactured stuff has to be old enough, and I think they have a particular year.

3D printing is a lot like manufacturing, and a little like making by hand. The more people use it like manufacturing, the less Etsy will want to have it.

[–] planish@sh.itjust.works 9 points 1 week ago (2 children)

X11 was never great.

(Like seriously, it's nothing but config files you have to edit from the local console shell and and proprietary stuff from nvidia that misbehaves, all the way down. Always has been.)

[–] planish@sh.itjust.works 1 points 2 weeks ago (1 children)

I think to test it you'd need to do some kind of comprehensive analysis, something like a big spreadsheet of a convincingly unbiased sampling of states (or states-at-points-in-time), evaluated for libertarianism-vs-authoritarianism. But you'd need to have a way to distinguish whether differences between states were caused by inherent per-state effects (or by more mechanistic runs-with-the-state traits, like "having a written constitution" or "being a monarchy"), or by "circumstances". So you'd need a way to measure plausibly-causitive circumstances and then see how much of the variance they explained.

It'd be a big project and hard to do in a controlled way across a large enough sample, but if you sent enough history grad students out to rate things like "worker organization" in 1925 Germany and "protections for human rights in constitutional law" in 1975 New Zealand on 5-point scales, you might be able to get a data set that could answer this question.

[–] planish@sh.itjust.works 0 points 2 weeks ago (3 children)

There aren’t really degrees of authoritarian or libertarian in a state, just what circumstances the system finds itself in.

This sounds like that rare thing in political science: a falsifiable assertion. Do you happen to know if anyone has tested it?

[–] planish@sh.itjust.works -1 points 2 weeks ago

There were also "no girls on the Internet". Everything was gatekept, every space was some sysop's petty feifdom. Racism ran rampant, so pervasive as to be almost invisible.

It wasn't uniformly better.

We can't, and shouldn't go back. Ever forward.

[–] planish@sh.itjust.works 6 points 3 weeks ago

Counterexample:

Andromeda herself, a woman wearing a red space jumpsuit

[–] planish@sh.itjust.works 2 points 1 month ago

Nice try, phone thieves.

[–] planish@sh.itjust.works 1 points 2 months ago* (last edited 2 months ago) (1 children)

Just because someone does something instead of fighting a war doesn't make whatever they actually did do right. They could also do neither thing. Especially if the alternative to war turns out to not actually achieve the goal the war would have achieved, leaving them in the same position of deciding whether to do a bad thing or not, after having already done another different bad thing.

69
[POV] You are orb (assets.untappd.com)
 
 

Obviously it wouldn't be allowed in this community, but how feasible would it be to make a community on a friendly instance and start shipping data through it somehow? If it works for NNTP it ought to work for ActivityPub, right?

Potential problems:

  1. Community full of base64'd posts immediately gets blocked by everybody's home instance.
  2. Community host immediately gets sued for handing out data it might not have a license for.
  3. Other instances that carry the community immediately get sued (see #2).
  4. Community host is in the US and follows DMCA and deletes all the posts that are complained about.

Maybe it would work as a way to distribute NZBs or other things that are useful but not themselves copyrightable? But the problem with NZBs is you have to keep them away from the people who want to send DMCAs to the Usenet providers about them, or they stop working. So shipping them around in a basically public protocol like ActivityPub would not be good for them.

 

Steps to reproduce:

  1. Start a Node project that uses at least five direct dependencies.
  2. Leave it alone for three months.
  3. Come back and try to install it.

Something in the dependency tree will yell at you that it is deprecated or discontinued. That thing will not be one of your direct dependencies.

NPM will tell you that you have at least one security vulnerability. At least one of the vulnerabilities will be impossible to trigger in your particular application. At least one of the vulnerabilities will not be able to be fixed by updating the versions of your dependencies.

(I am sure I exaggerate, but not by much!)

Why is it like this? How many hours per week does this running-to-stay-in-place cost the average Node project? How many hours per week of developer time is the minimum viable Node project actually supposed to have available?

 

Through witchcraft and dark magic, Zig contains a C standard library and cross compiler for every architecture in 45 megabytes.

 

Julia Evans has done it again.

cross-posted from: https://derp.foo/post/88689

There is a discussion on Hacker News, but feel free to comment here as well.

 

Doesn't seem like that acronym is used for anything important at the moment, I'm sure we can grab it.

 

That's right folks, I want to see you post your... old dreams.

 
 

Many AI image generators, including the big UIs for Stable Diffusion, helpfully embed metadata in the images so that you can load them up again and get all the settings you need to regenerate the image.

But Lemmy's built-in pict-rs image hoster, and most image hosters that resize or re-encode images or that try and stop people from doxing themselves with photos' embedded GPS coordinates, will remove all the metadata. This is counter-productive for AI image generation, because part of the point of sharing the images is so other people can build on the prompts.

What are some good places to host images that don't strip metadata?

 

Most of the Lemmy instances seem to require an email to sign up. That's fine, except most of the places you would go to sign up for email want you to... already have an email. And often a phone number. And almost always a first name, last name, and birthday.

I promise not to do bad stuff, but I don't want that sort of information able to be publicly associated with my accounts where I write stuff, when everyone inevitably loses their databases to hackers. Pseudonymity is good, actually; on the Internet nobody knows you're a dog, etc.

Is anyone doing normal webmail registration anymore? Set username and password, receive email for free? I don't even need to send anything to sign up for accounts elsewhere.

view more: next ›