![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
Yep, This is taken straight from Facebooks advertisements circa 2018, maybe still today.
Yep, This is taken straight from Facebooks advertisements circa 2018, maybe still today.
Put each character in a spans with random classes, intersperse other random characters all over the place also with random classes, then make the unwanted characters hidden.
Bonus points if you use css to shuffle the order of letters too.
Accessibility? Pffffft.
Could a hypothetical attacker not just get you to visit a webpage, or an image embedded in another, or even a speculatively loaded URL by your browser. Then from the v6 address of the connection, directly attack that address hoping for a misconfiguration of your router (which is probable, as most of them are in the dumbest ways)
Vs v4, where the attacker just sees either your routers IP address (and then has to hope the router has a vulnerability or a port forward) or increasingly gets the IP address of the CGNAT block which might have another 1000 routers behind it.
Unless you’re aggressively rotating through your v6 address space, you’ve now given advertisers and data brokers a pretty accurate unique identifier of you. A much more prevalent “attack” vector.
They were first to market with a decent GPGPU toolkit (CUDA) which built them a pretty sizeable userbase.
Then when competitors caught up, they made it as hard as possible to transition away from their ecosystem.
Like Apple, but worse.
I guess they learned from their Gaming heyday that not controlling the abstraction layer (eg OpenGL, DirectX, etc) means they can’t do lock in.
While suing everyone else that makes shovel handles that work with your shovel heads.
Problem then is, You Still gotta buy a truck to buy and haul your 2nd motorcycle, your 3rd motorcycle, your dirt bike, and your track bike.
Alternate headline:
Companies accept money for a thing that will happen anyway, and will be unable to prove if they say no.
GenAi is unfortunately here, and the technocracy wants you to want it so they can farm you for more and more intimate data to leverage and enforce their technocracy. And the only way they’re going to do it is by keeping the press positive, and feed it more and more data in the hopes it fixes things.
I was expecting some sort of “Ai discovers new bug in 30 year old software”… cool I’m excited.
Then they were talking about how the bug was persistent, and I’m more intrigued “is the bug some weird emergent behaviour corrupting state somewhere?”
Nope, just another example of a shit in shit out data model.
I thought everyone decided “jfgi” in online discourse was a toxic years ago. It’s the same attitude as :
chemtrails make you sick!
How so?
go do your own research
If you’re going report on something, provide a little more information than just “no”. It’s more helpful, better for the community, and in 5 years time when the facts are different, there’ll still be a reference of what was factual in the past.
My brother behaves weird with Linux (fedora 39 silverblue).
When doing multiple copies of double sided printing, it’ll print [1|2] [1|1] [2|2] [1|1] [2|2] and then repeat until you realise you now have onen copy of what you want and 10 pages of one side, and 10 pages of the other side.
It’ll also randomly refuse jobs, and then print them 30 minutes later (lmao if you printed multiple copies, gave up and went for a walk)
My Panasonic I replaced it with was better, but you had to download binary blobs to make it work.
But, Linux has gotten more and more complicated in the last 20 years I really can’t be fucked working out if it’s the printer, cups, flatpacks, the app that’s printing, or all of the above.
Now I just email myself a PDF and print from my phone. Fucking stupid but it works.
Because:
Agreed.
Resilio sync works better. But the “sync identity” thing is broken, and configuring it declaratively is hard.
But 100% agree. Would love a virtual file system solution. Ideally one which you can use to fill available disk space and ensure you always have a minimum number of copies.
Mozilla, because:
The host was stable. And I was compiling the kernel for hardware and vfio reasons anyway, so why not compile everything and it’s not like there was a lot to compile.
Tips: don’t
Performance was ok. Lots of fiddling required on both host and guest to get performance close to native.
I used to have Gentoo running a Libvirt hypervisor, which would then run multiple short lived isolated windows and Linux machines with GPU passthrough for all the different companies and projects I was working on.
Spent far too much time keeping the guest machine images up to date, and all the configs and stuff managed and synchronised.
Then my laptop died that I was using to manage everything so I gave up.
Hips that make a Pixar mom jealous.
Come April, NZ will be charging EVs road user charges using the same price-per-kilometre mechanism diesel (diesel not have a fuel levy) vehicles use.
Because you’re only ‘exposing’ the port on the peer to peer network.
You “publish” a port to holesail, then clients have to create a local proxy via holesail before they can access it.
I agree, It’s a dumb pointless claim. But I don’t think it’s misleading.
It looks like holesail is just tailscale, but on a much smaller scale. It’s not networks, it’s just ports.