navigatron

@navigatron@beehaw.org
0 Post – 78 Comments
Joined 1 years ago

The music streaming service, that I stream music from, knows which music I streamed. I’m shocked.

14 more...

Decentralized identity is a field of active research. It’s tough, but very interesting. I’m particularly a fan of what nostr is doing, where accounts are completely separate from relays, and can post anywhere.

Hello yes my email is dot at dotat dot at

This will go about as well as broadcom’s acquisition of Symantec (not well).

If you can get rid of vmware, you will have to, and if you can’t, you’ll ship buckets of benjamins to broadcom and in return they might keep your company alive.

1 more...

I tell my laptop to put the video in the vga port. It does. That’s it. There’s nothing plugged in, but it’s there.

I plug a vga cable in. There’s video in there now. With enough paperclips, I could get it out the other end. My laptop does not care. It wiggles the electrons regardless.

I plug the other end of the cable in. The shielding was eaten by mice and two pins are dead. But alas, lo and behold, purple tho it may be - the video comes out and is displayed.

Meanwhile, hdmi protocol negotiation wants to know if you’d like to set your screen as the default sound device. Not that teams would use it anyway. Actually nevermind, the receiving end doesn’t support the correct copyright protection suite. Get fucked, no video for you.

The VPN catches all network traffic and puts it far away - you can’t be on vpn and see local network resources (casting targets) at the same time.

If your vpn has an app, check your settings for something like “local network access”.

Otherwise, start reading about split-tunnels and/or default gateways

1 more...

The other six are (copied from the article):

  1. PUBG (3.2 mil)
  2. Counter-Strike: Global Offensive (1.8 mil)
  3. Counter-Strike 2 (1.4 mil)
  4. Lost Ark (1.3 mil)
  5. DOTA 2 (1.2 mil)
  6. Cyberpunk 2077 (1 mil)

Wireguard creates a new network interface that accepts, encrypts, wraps, and ships packets out your typical network interface.

If you were to create a kernel network namespace and move the wireguard interface into that new namespace, the connection to your existing nic is not broken.

You can then use some custom systemd units to start your *rr software of choice in said namespace, rendering you immune to dns leaks, and any other such vpn failures.

If you throw bridge interfaces into the mix, you can create gateways to tor / i2p / ipfs / Yggdrasil / etc as desired. You’ll need a bridge anyway to get your requester software interface exposed to your reverse proxy.

Wireguard also allows multiple peers, so you could multi-nic a portable personal device, and access all your admin interfaces while traveling, with the same vpn-failure-free peace of mind.

5 more...

Of course!

In other words though, for those just starting their monad journey:

An endofunctor is a box. If you have a box of soup, and a function to turn soup into nuts, you can probably turn the box of soup into a box of nuts. You don’t have to write a new function for this, if the box can take your existing function and “apply” it to its contents.

Arrays are endofunctors, because they hold things, and you can use Array.map to turn an array of X into an array of Y.

Monoids are things you can add together. Integer plus integer equals integer, so ints are monoids. String plus string (concatenation) equals a longer string, so strings are monoids. Grocery lists are monoids.

Arrays are monoids!

Arrays are both endofunctors and monoids, so for everyone except category theory purists, they are monads.

Javascript promises hold things, and you can transform their contents with .then - so they are endofunctors. You can “add them together” with Promise.all (returning a new promise), so they are monoids. They are both monoids and endofunctors, so they are monads.

I’ve just upset all the category theorists, but in the context of programming, that’s all it is. It’s surprisingly simple once you get it, it’s just complicated names for simple features.

2 more...

Go a level deeper, beyond this news about news, and read the moat memo.

The third faction is the open source community.

The memo has an entire timeline section, dedicated to showing the speed at which the open source community absorbed and iterated on the leaked facebook model, LaMMa.

The memo puts a lot of emphasis on how google and co are building new models from scratch, over months, with millions of dollars - and yet open source is building patches, in days, with only a few hundred dollars - and the patches stack, and are easily shareable.

The open source models, through these patches, are getting better faster than google can re-architect and re-train new models from scratch.

The main point of the memo is that google needs to change their strategy, if they want to stay “ahead” (some would argue they’re already behind) of the competition.

I must disagree.

We need not wait for marginalized groups to be impacted to decry T1 ISP censorship. Ban whatever speech you want; the method of enforcement should be to arrest the perpetrators - not stop the sale of paper, the delivery of mail, or blocklist class A ip ranges.

On a more philosophical level, this is the question of “kindergarten policy” - do we punish those who crayon on the walls, or do we take away everybody’s crayons. To punish the ability to do wrong, or the act of doing wrong. Like most philosophical questions, there’s no good answer to this.

1 more...

I listed to marina and the diamonds and tool. Maybe they could pitch me better headphones? I am actually in the market for new headphones.

7 more...

My friend, you have no idea how much time I have spent searching for something like this on google. This is incredibly useful. I have saved this to my camera roll.

Naturally searching anything with “chicken” and “cook” present returns hundreds of recipe websites or food safety “articles” that all copy and paste “the fda says 165” with no further thought.

I knew a chart like this must exist, but had given up the search. Sincerely, thank you.

10 more...

Who is the arbiter of truth? What prevents the power to censor from being abused?

The power to censor inherently includes the ability to silence its own opposition. Centralizing this power is therefore dangerous, as it is neigh impossible to regulate.

Currently, we can choose our forums - beehaw does a good job, /pol/ silences all but one worldview, and therefore I am here and not there. What happens when that choice is taken away, and one “truth” is applied universally, with no course for opposition?

Perhaps you believe you hold the correct opinions, and will not be affected. Only those who disagree with you will be silenced. Or perhaps you change your opinions to whatever you are told is correct, and therefore you do hold the correct opinions, though only by definition.

Consider that 50% of the country disagrees with you politically. If you follow a third party, it’s 98%. A forced shared truth is only “good” if it goes your way - but the odds of that are so incredibly small, and it gets much smaller when you consider infighting within the parties.

18 more...

Devops is a meaningful term

Wanna come configure optimus for me?

7 more...

Hail Eris!

May your surfboard be waxed and your toothbrush free of sand.

What!

How many of these devices do we have in our asset inventory? Do they have a cvss score yet? Let’s just do it ourselves with an ssvc score. Can this be exploited remotely? Call crowdstrike, tell them to get a network detection written and deployed. How long do we have before the quarterly audit? Can our soc do threat hunts against this? Get me the RTOs, RPOs, and business impact assessment. Let’s MOVE, people!

So… what? Are you arguing for an expansion of “punitive models”?

Iraq has exceptional consistency in thought leadership. There are no drug addicts in Singapore.

Moxie marlinspike has an excellent blog post on “perfect enforcement” - if the law were applied perfectly, we would not have the lgbtq marriage rights we have today. If America had perfect consistency of thought, we would all be protestant catholic.

Consistency is not a world I strive for, and therefore, to return to the start of this thread, I do not believe the us gov should apply censorship to our communications, and I do believe that doing so would be a slippery slope, precisely and purely because censorship may prevent its own regulation.

5 more...

Woohoo! Saw your previous post, I’m glad it’s going well! Keep us updated

Extremely. It’s just slow, but once you get used to that, it’s solid.

Vscode already supports linting yaml against a schema file. Once you start configuring your code with configuration-as-code, you’re just writing more code.

If I need to “generate” some insane config with miles of boilerplate, I would use js to build my json, which can be ported to just about anything. This would replace js in that process.

I’m not sold on the need for this.

Even with something like k8s, I’d reach for pulumi before I put another layer on top of yaml.

No single body can wield this power, and therefore multiple should.

/pol/ self-censors through slides and sages, and even maintains at least some level of toxicity just to dissuade outsiders from browsing or posting - you could call it preventative censorship.

Fortunately, we don’t have to go there. We have the choice to coexist on Beehaw instead.

Even on reddit, different subs could have different moderation policies, and so if you didn’t like ex. Cyberpunk, you could go to lowsodium_cyberpunk.

Freedom to choose communities allows multiple diverse communities to form, and I think that’s the key - that there are many communities.

When the scope of truth arbitration moves from lemmy instances to the us gov, the only alternative choice for any who disagree would be to go to another country.

The beauty of the internet is that there are no countries. Any website could be anywhere - there are hundreds of thousands of choices, from twitter hashtags to irc rooms.

I do not want one hegemony of information. I do not want 5, or one for each nato member. I want as many as possible, so I may find one (or more!) that I like.

7 more...

When dealing with children, the “oreo cookie” method works well - start with something nice, offer a “suggestion for improvement”, and then finish with something nice as well.

You’ll want to submit the politically correct version through official channels for traceability. After it’s submitted there, you can give a copy over slack. Don’t let anyone make any claims about what you supposedly said over slack dm. Leave a paper trail.

You’ve already been PIPed, so they have reason to look at you. Play nice and check the boxes; I would do the feedback even if the submission is entirely “yeah it was fine” level bs.

All of the above is playing it safe. Offer to provide additional feedback / “discussion” over a voice call as well, and ask what they’re looking for. If they’re building a case against your former manager, you can be honest.

If they just want “general” feedback, or they want it over text (“no time for a call”), or there are multiple people in the room, or the call is being recorded, then fall back to the politically correct version you already submitted.

Your nuclear button is to claim the PIP was retaliation for (something; you can make this up, just make it realistic), but you don’t press that button unless you’re about to be fired. It makes things extremely complicated.

I really hate office politics, but half of being promoted is knowing how to play this stupid game :(

2 more...

Shinji get in the goddamn robot

Sequoia Sasquatch Boogers

2 more...

It is not too hard and you can definitely do it! It’s like a puzzle - you will get stuck at times, but if you keep going then you’ll get there.

APK files are just zip files, so you can unzip it to see its contents. From there, a java de-compiler get you a version of the source code. It will have random variable names and no comments, so it will take some digging to find and reverse the api layer.

Or, who knows, you could get lucky and find an openapi spec file and auth.txt. Worse apps have been developed.

Shinji get in the god damn robot

I have a whole rant on this topic, but the short version:

It’s dentists.

The gnarliest mountain man, who hunts bears with his bear hands, can be brought to his knees with a toothache. The toothache never sleeps, can’t be fought, and always eventually wins. Even basic dentistry is life saving - even another human with a pair of pliers and some moonshine - but I’d much rather have novocaine.

1 more...
  1. Yes, because:
  2. It could
  3. And if it does, you probably can’t remove it

Streaming sites can embed an unhearable data stream into audio signal. It’s possible

That being said, it’s extremely improbable, given the costs to do it at scale.

If you’re part of a large company’s beta program and have access to some unreleased product, maybe worry.

If you grabbed a file from some mega host updown whatever site, don’t worry.

And if you’re still worried, take a sha256 hash and put it into google search. If you get any results that even mention your file’s title, then you’re good.

4 more...

You’re out here solving impossible problems. You’re “The Fixer” from Pulp Fiction. Fools look at story points. Pros see an unsolvable story that languished for years until you came along and defeated it. A single point for you is an entire epic to other teams.

Everything is a differentiator that can be spun to your advantage. The points aren’t accurate, and you’re the only one with enough guts to step up to the plate and finally work these neglected tickets; even if it won’t “look good” on some “dashboard” - that’s not what’s important; you’re here to help the organization succeed.

If the system doesn’t make you look good, you have to make yourself look good. If you weren’t putting in the effort, it would be hard - but as you say, everyone who takes a deeper look clearly sees the odds stacked against you, and how hard you’re working / the progress you’re making; despite those odds.

Don’t let some metrics dashboard decide your worth, king!

At EoL, corporate security tells the IT department to uninstall it.

Windows works great because MS tapes it back together slightly faster than it falls apart.

When EoL hits, those devices are either trashed, firewalled into oblivion, or assimilated into the kube.

4 more...

Who wants to announce a partnership with me to promote irresponsible AI?

The eu is very upset about this opposition, and published a hit piece “fact checking” pdf against it.

Now tell me where the cops hide, even when they’re not there

Optimus gets complex quick. You’ll be reading pci bus ids before you know it. Keep the wiki open, go slowly; you got this :)

I don’t do anything interesting. I’ve got the ten workspaces, and win+p to start stuff.

The only interesting thing is win+PrintScrn, which takes a screenshot to /tmp, and then opens it in pinta to crop.

Actually I also have win+z bound to turning off the laptop screen. That’s all I can remember

It is Fast!, and also, (it is secure 🔒)

Removing caulk sucks.

The best tool for the job is a razor blade / utility knife, and a pack of replacement blades. Blades are dirt cheap, don’t be afraid to bend them / abuse them.

I especially enjoy the lemonade subplot, which, while never directly integrating, weaves throughout, juxtaposing and accentuating the finer details of the main plotline.