ReversalHatchery

@ReversalHatchery@beehaw.org
2 Post – 581 Comments
Joined 1 years ago

Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045

I2P and it's sub 100 kb/s speed? Series, games would never finish downloading, but then also only those torrents are accessible through I2P that are published to an I2P tracker, there is no DHT (yet?). Clearnet torrents and clearnet peers are not accessible through I2P.

Or is it something on my end that makes it that slow? ISP download bandwidth is stable and much higher.

5 more...

To your.. friends? You mean your workplace team? It could be really bad if your only friends are your workplace team

2 more...

I guess I don't need their app anymore on my phone, then. More free space to me.

Though using an other instance as mentioned by other comments is also an option, I think the mobile app supports that too, even if it's a bit complicated

Edit: after reading the article, this might really not be their fault. At the end they also encourage the reader to host it themselves. They are not very transparent with what's the actual problem, though..

2 more...

Or we all could just still call it twitter and tweets, and be done with it

5 more...

And not the twitch way, where you have to have in an identifier, your phone number, but using proper, standards ways for it, like TOTP and such

18 more...

There's something to know in the future, which others don't seem to have mentioned. Resizing a partition is 2 steps: resizing the filesystem, and resizing the partition.

When shrinking, you first resize the filesystem, and with this you make sure that the filesystem does not want to use data outside of the wanted shrinked size. If that not possible because you don't have enough free space, the shrink operation should tell that. After shrinking is done, you can continue with changing the partition table, to actually resize the partition.

When expanding you first expand the partition (so that the fs will have room to expand to), and then expand the filesystem.

If you're familiar with partitioning from the tools of microsoft windows, it's disk manager does the 2 steps without you noticing. This is just how most graphical partition managers work.
But it's important to be aware that the partition and the filesystem is not one and the same object. The filesystem resides in the partition like your feet does in your shoes, and the beginning of the partition helps for the system to find the beginning of the file system, which must end at the partition's end (or before that, but that's not efficient).

If you prefer graphical partition managers (I do too, it's much easier), Linux has a few of them. I recommend you to use GParted. It's a Linux based pendrive-bootable partition editor. They have an official live image, but I would recommend using the SystemRescue system (a live system too), which includes that and many other tools.
In this case, that the problem had already happened, it may or may not be easier to use this.

1 more...

Turns out usually a significant amount of RAM is compressible. I was surprised at it too, and actually still am. But of course it also depends on how you use your system. If you run a media player that caches a lot to RAM, its cache wont be compressible, but they say its efficient for example for memory of web browsers.

It does nothing, how can it be heavier than an actual Linux Distribution?

Are you sure about that? Data mining, even to the extents that take toll on user experience, is a common thing in consumer electronics

1 more...

So that's an opt-out

I don't get much FPS on CS 1, and it's not pleasant. It's probably somewhere between 20-30. But the news above mean that I shouldn't even dream about running CS 2 with this hardware, because it runs much worse than the first game, but also compared to other games.

Honestly I was expecting that CS 2 would run better than 1. I have a little hope that they will fix their shit, but now I don't expect significant improvements over the first game's performance.

9 more...

So this is not about ubuntu, but really just any kind of linux? What a shitty title

8 more...

It is a different anonymity network, which works differently in many aspects.

I2P and Tor comparison: https://geti2p.net/en/comparison/tor
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): https://geti2p.net/en/docs/applications/bittorrent

Currently BiglyBt supports I2P and it has been that way for quite some time.
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.

Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it's just a misconfiguration on my part, or that these specific sites I tried are just overloaded.

14 more...

Outlook (the one that uploads your email login password to microsoft, and which markets this as a feature)

It's quite interesting to see that the developer who has embedded the backdoor "simplified" the SECURITY.md file just 4 days ago, by deleting information about how to report a security vulnerability.
The reason it's really interesting is that if I understand it right, the backdoor was just discovered less than a day ago.

https://github.com/tukaani-project/xz/commit/af071ef7702debef4f1d324616a0137a5001c14c

The environment of other processes is readable in procfs.

/proc/PID/environ

Thanks to the permissions it's read-only, and only by the user with which the process runs, but it's still bad, I think

8 more...
  • rounded screen
  • front camera in screen

designed for you

Sure as hell not.

9 more...

They were not shipped to the client. They were shipped to the build system, executed there after deobfuscation, and they inserted an additional, opaque program file into the build process.

You mean feed the investors of the company that makes tons of money by exploiting users private life? Or the one that runs false political propaganda in unskippable ads? (No idea about US elections, this is a much smaller country that I know).

Thanks but no.

3 more...

because they are a lot more polished and feature complete. I come from boost, and use liftoff now, and I like it a lot, but there are still several things I don't like. I loved boost for its look and features, including the tons of settings that I set once and was perfect until the end.

That douchebag can't even moderate himself. I wasn't considering trying out hyprland, but after this I wouldn't feel safe running his code on any of my computers. I can imagine that it would do some "prank" if it found out that I'm thinking differently

For reasons an other commenter has said, I think things like fediseer are a better solution to this. The way they use for measuring trust is distributed, like Lemmy itself (just fewer instances, because it is not for use directly by thousands of users, but for admins who are fewer).

LCS

That sounds interesting!

and Lemmy Post Purger (LPP) for clearing old posts on smaller instances.

Does that permanently delete posts? Why would you do that?

7 more...

At first I wanted to "complain" about the removal of the thumbnails task switcher, because I prefer that one. But then I noticed that the thumbnail grid is the same and better! So if you were using what I, maybe the grid version is what you actually want.

Also, I love the concept that you can put back things that were removed from Plasma without building it all yourself.

Seeing how determined nintendo is, I think the only long term solution would probably be to continue development on a code forge hosted as a hidden service. Either Tor or I2P.
Yes, it won't be easy to use, especially for those who are not familiar with this tech, but I expect these to be much more harder for nintendo to take down.

3 more...

You shouldn't assume that everyone is giving money to that pathetic company

5 more...

The browser addon is not anymore, and they were kind of hostile responding to questions regarding that.

The server software's open source version also only supports the free tier's features. There was a fork that was supposed to add the paid features, but it's not maintained.

Yes, it will.

First, you won't spend that money, you can spend that on other things instead.
Second, you can spend the money you have saved this way on products of better companies. For games this may be good indie developers and smaller studios (is that a thing?), but generally for software there is usually a wider range of options, and I mean even actual alternatives.

You could argue that me not paying for youtube premium won't change a thing. That may sound true, but it isn't necessarily: if you instead support your creators trough Liberapay or Patreon, then not only Google will get less, but the crearor and toss other platform will get more money, so they can improve their services and keep the lights up. Or like choosing to pay for Cryptpad instead of Google Drive will again besides having Google and their investors getting less, Cryptpad devs (who are very resource constrained, just as mostly any users-first software project because of not being known) will get more.

2 more...

I started my career as a media lawyer to protect those who made things that helped us see one another, and the truth about our shared world. Almost fifteen years ago, I co-founded and built a media law clinic to train others to do the same.

Hmm, sounds good.

I am not naive about the Internet at its worst. From the Edward Snowden disclosures to a quick trip to Guantanamo Bay, Cuba, much of my career has confronted issues of surveillance — including of my own religious community.

Yeah, I like that we seem to agree.

[...] so we built an accountability journalism outlet, The Markup [...] Our team imagined and made things people used to make informed choices. Blacklight, for example, empowers people to use the Web how they want, by helping them see the otherwise invisible set of tracking tools, watching them as they browse.

Oh, Blacklight, I know that's a cool tool!

In our particular moment – as we’re deploying large-scale AI systems for the first time, as we’re waking up home pages from their long rests, and trying to “rewild” the Internet beyond walled gardens

What? Why?? Oh fucking no

We can imagine a future that centers human agency, and then we can build it, bit-by-byte.

Yeah but AI is most probably not a toolbox for that

Unless there is an open source app, the next stop will be the piracy sub. It may be able to work if you obtain an apk and patch it to think it's paid. While there, it would also be worth defusing data mining components.

8 more...

But uBlock origin has a light version they expect to work with V3

It just "kinda" works. It cannot nearly load all the network filters that it would normally use.

6 more...

The player does not have to be elevated. With an unelevated player the file exploiting such a vuln would be able to execute code with the privileges and access of the player

And you think the solution is to sell to a company that will instantly add data mining and ads? Often to those users, for whom we have installed these apps, but from google play for the automatic updates?

60fps doesn't matter. It's not a shooter. Even CS1 I could only get 50ish on a new map, and that's with hardware that's 6 years newer than the game

It does not sound like 50 FPS on 6 years old hardware. Maybe half?

RAM should be used. For gaming it would be wasteful not to use it.

Don't be afraid, I do use my RAM. Like, it's full of other important programs and filesystem cache.
But the game shouldn't take it away from other programs, and it should also be aware of the fact that windows starts swapping out programs when RAM usage has reached ~70%. This will significantly affect any programs you run simultaneously, but the game itself tooz because it's less used memory pages will be swapped out more. Random access for reading back swapped pages is much slower than loading the resources in smaller groups sequentially.

16 GB usage sounds like the game has loaded ALL of its models and resources, even those that are not needed (not in view, and probably not even accessible to the player), and probably has multiple copies of most with different resolution and such.

Loading to RAM that much data would be fine if they managed it to only be loaded to a cache, that can be released for other programs, but I don't think you can do that in any other way than using the filesystem cache, at which point the RAM usage does not even count against your process, or as usage at all.

If you aren't using all your ram then you're loading textures, shaders, and everything from disk, which is thousands of times slower and that would lead to .

Obviously the game does not have to use all the RAM. It only needs to preload textures and models that are useful on your system (based on graphics settings) and are in use right now or can be in use very soon.
Also, loading from disk is not as slow as you make it seem. Yes it is if your users install games to a drive that's bad for that purpose (like SMR tech hard drives), or if you haven't placed the resources strategically, by which I mean grouping resources so that commonly-used-together resources are placed sequentially for a quick and efficient read.
The first problem shouldn't be your concern: the player shouldn't expect top performance from hardware that was designed for a totally opposite task.

Marketers are paid to lie.

Yes, but they shouldn't touch any technical information, including the hardware requirements section. Marketers don't know shit about the game, just that they want to sell at much licenses as humanly possible.
The hardware requirements, however, is to be defined by those who know shit about the game. Preferably core developers or performance testers, who have an idea about the game's inner workings and about how much is it expected to use in average and in the worst case.

I find that people who watch reviewers are exponentially more disappointed in games because they let reviewers tell them how to feel.

I can agree with that and your point on Cyberpunk. I haven't played that game, but not because I'm not interested. It looked fun from content that I have seen.

But the performance concerns sound like that it's actually a huge problem.

I like it that so far it has been described a solid lunch except land leveling and performance, because the first one can probably be addressed in a few months at most if they want it. But even the published hardware requirements were disappointing, and this is a signal that the game will hardly get any better than that, if it can reach it.

ext4 certainly has its place, it's a fine default file system, there's really no problems with it.

But others, like ZFS and BTRFS, have features that you may want to use, but ext4 doesn't do: fs snapshots, data compression, built in encryption (to a degree, usually only happening for data and some of the metadata, so LUKS is often better IMHO), checking for bitrot and restoring it when possible (whether it is depends on your config), quotas per user group or project, spanning multiple disks like with RAID but safer (to a degree), and others.

untrusted network

What stops the network operator from modifying the data and the checksum? Do you transfer the checksum out of band?

4 more...

Not because of Biden, but to me threads blocking is a positive. I hope instances won't undo their decision.

The better case is when the app is not updated. The worse when it was updated with whatever data mining or other solution the new owner attached to it. Be sure to delete the old app (export data if possible) and install the fossify one in any case

That's only for never generation cards, from 20xx series upwards I think.
But there's still the proprietary driver for everything before that, including 1080 and such.

Except if you are locked out of system management and you just can't switch. Or only at the price of hardware incompatibilities and consumer apps refusing to work when they see you after practicing your ownership of the device.
See Android.

"This connection is untrusted" "SSL_ERROR_BAD_CERT_DOMAIN"

The irony.

2 more...

In case of ZFS and bcachefs, you also have native encryption, making LUKS obsolete.

I don't think that it makes LUKS obsolete. LUKS encrypts the entire partition, but ZFS (and BTRFS too as I know) only encrypt the data and some of the metadata, the rest is kept as it is.

https://openzfs.github.io/openzfs-docs/man/v2.2/8/zfs-load-key.8.html#Encryption

Data that is not encrypted can be modified from the outside (the checksums have to be updated of course), which can mean from a virus on a dual booted OS to an intruder/thief/whatever.
If you have read recently about the logofail attack, the same could happen with modifying the technical data of a filesystem, but it may be bad enough if they just swap the names of 2 of your snapshots if they just want to cause trouble.

But otherwise this is a good summary.

1 more...