club penguin (it’s ok, the twitter reply formatting is impossible to understand)
Nim is more “high level, automatic memory management by default, but you can go 100% manual if you need to”, though the reality of doing that is basically the opposite of rust’s “everything you need to do is well-documented and solid”
Nim is a compiled language by default, and supposedly cross-compilation is usually as simple as
apt install mingw-w64
nim c -d:mingw myproject.nim
though I haven’t really tried doing it (and my general impression of nim is anything “slightly obscure” like cross-compilation still has a non-zero risk of running into unexpected thorny bugs)
I remember tab groups showing up one day by themselves maybe a week ago, and then I quickly clicked about two buttons and now they’re totally gone and I almost forgot they were a thing. But likely if I had summarily clicked 2 different buttons it might have been turned on without me realizing it, and that would cause the model to be downloaded and the CPU cycles to be spent (at least if I kept the tab groups on)
Video has general VPN background info:
A VPN is ultimately just someone else’s computer that routes traffic through it, and there is nothing stopping you from starting your own VPN company, promising you’re not logging anything, and then logging everything you can. You are almost certainly never going to be punished in any way for lying to your customers as long as you put in a minimal amount of effort.
Some VPN companies like to make ridiculous claims like “the vpn will prevent you from getting hacked” which is not true
For 95-99% of internet users (at least in western countries) a VPN doesn’t really help with privacy at all since your browser is most likely still easily fingerprintable. UBlock origin or similar things help but are not even close enough to stop all fingerprinting, you need something like tor browser with javascript disabled to actually get your browser privacy to the level where a VPN is relevant. (Though it does have other benefits like circumventing some geoblocking, making unencrypted websites slightly safer, etc)
You ought to manually configure DNS, possibly even try to self-host
touched upon in the video but not directly explained, almost all VPN companies just rent from cloud services instead of hosting it themselves so even if they didn’t personally log anything, all the network traffic is likely actually still being logged by amazon etc
governments and police can just get court orders to get all the data from VPNs, or even force them to start logging if they didn’t already, though this is probably not a problem for you if you’re not considered an exceptionally interesting person
generally trusted VPNs are mullvad, IVPN, ProtonVPN, the only one I’ll personally point out is mullvad who have cohosted servers which should bypass the cloud related issues, though you had to manually select a non-cloud server last time I checked
As for more or less unique info specific to this video, it claims that VPNs lying about not collecting user data is indeed very common and done by ad companies that buy out VPN companies etc, and government spying agencies also operating VPN companies as honeypots
yep, it’s almost all banana pi, and at least 4 different ‘models’ of it it seems. But the word is also used in some string processing tests and as an example comment of how suffix arrays work…
And most of those cases are of course using the word sarcastically
The next function to implement is called, amazingly, next(); its job is to
move the iterator forward to the next position in the sequence.
if (lc->sync == NOSYNC)
for (i = lc->header.nr_regions; i < lc->region_count; i++)
/* FIXME: amazingly inefficient */
log_set_bit(lc, lc->clean_bits, i);
else
for (i = lc->header.nr_regions; i < lc->region_count; i++)
/* FIXME: amazingly inefficient */
log_clear_bit(lc, lc->clean_bits, i);
/*
* Amazingly, if ehv_bc_tty_open() returns an error code, the tty layer will
* still call this function to close the tty device. So we can't assume that
* the tty port has been initialized.
*/
* this header was blatantly ripped from netfilter_ipv4.h
* it's amazing what adding a bunch of 6s can do =8^)
/*
* I studied different documents and many live PROMs both from 2.30
* family and 3.xx versions. I came to the amazing conclusion: there is
* absolutely no way to route interrupts in IIep systems relying on
* information which PROM presents. We must hardcode interrupt routing
* schematics. And this actually sucks. -- zaitcev 1999/05/12
* corresponding ABS_X and ABS_Y events. This turns the Twiddler into a game
* controller with amazing 18 buttons :-)
* In an amazing feat of design, the Enhanced Features Register (EFR)
* shares the address of the Interrupt Identification Register (IIR).
* Access to EFR is switched on by writing a magic value (0xbf) to the
* Line Control Register (LCR). Any interrupt firing during this time will
* see the EFR where it expects the IIR to be, leading to
* "Unexpected interrupt" messages.
* Thanks BUGabundo and Malmostoso for your amazing help!
It’s a technicality about the pointer type. You can cast the type away which typically doesn’t change the actual value (but I’m pretty sure that causes undefined behavior)
For your example, int x = 0xDEADBEEF;
signifies the integer -559038737 (at least on x86.)
char *p = (char*)0xDEADBEEF;
on the other hand may or may not point to the real memory address 0xDEADBEEF, depending on factors like if the processor is using virtual or real addressing, etc
Lots of em-dash usage
Service goes down after emitting an event but before persisting internal state—causing partial failures that are hard to roll back.
Subscribe to an existing event and start processing—no changes to publishers.
Helps track a request across multiple services—even through async events.
We once had a refund service consume OrderCancelled events—but due to a config typo, it ignored 15% of messages.
Takeaway: fire-and-forget works—until someone forgets to monitor.
Use it when the domain fits—fan-out use cases, audit logs, or workflows where latency isn’t critical.
combined with other chatgpt-isms like the heavy reliance on lists, yeah safe to say it’s mostly AI generated
it does kinda fit in that if you forced people to learn linux, the basic stuff most people do should in the end not be much more difficult than windows (assuming you don’t run into more bugs)
but that would never happen unless a “linux revolution” was already in full swing
My major version updates on 2 computers with linux mint in the past few years have been just one click, wait, reboot when prompted, everything works and you barely even notice that anything changed. Though maybe I’ve just been lucky
though the rest of the video’s takes on the linux experience for new users seems pretty accurate to me (lol downloading an application and using it requires at least a manual chmod +x and that’s the best case scenario. Maybe there’s a distro that has a solution but I have doubts (and “have everything you could possibly need in the package manager” is obviously a nonstarter))
But the community parts seem odd to me:
Is “just disable secure boot” a bad take? Has someone been holding everyone out on a better solution?
and
The only way linux is going to change is when money and development power is given to major dekstop Linux projects. It’s time to stop wasting time on customization or packaging
is just… sure, herd all the cats into one place, make them all work together in harmony, and summon 500 million dollars out of thin air to wrap it all together. Instead of writing bash scripts everyone should be praying to gabe newell to save us lol
People who cant use linux never learned the basics of computers
that’s like 80% of all people
- They claim to respect privacy and - to date - have done nothing to suggest that they don’t.
If you ignore all the fast and loose they play with privacy, sure, there is “nothing to suggest” they don’t respect it.
IT’S OPTIONAL (there goes the “aggressive push” bit)
It’s not an aggressive push if you ignore the part where they repeatedly use the foot in the door technique where they first promise they won’t do something, and then later do it anyways.
They claim it is optional but they just shove a pop-up in your face about AI, while misleading you about how it works. This is about 1 step away from how most companies “allow” you to “preserve your privacy” by carefully clicking “no” to a long list of popups suggesting you give them cookies and share your emails etc.
This may be easy to dismiss as “problem between keyboard and chair” but when it predictably leads to many users thinking it’s off but being surprised when they find it turned on without them realizing it it’s not much consolation
NOTHING EXCEPT FOR THE PROMPT IS SENT TO MISTRAL (there goes the “reads all emails” bit)
How do you figure that works? The server somehow corrects your spelling mistakes without reading the email containing the spelling mistake? Again, End-to-end encryption is a core advertised feature of protonmail, and this completely sidesteps it while actively misleading users into thinking it doesn’t
Sure you can look at it as just a bit of politicking (if a poorly thought out one), but it’s really just the tip of the iceberg. Proton hasn’t done anything that clearly crosses an unacceptable line, but they’ve made a lot of other highly questionable decisions in a relatively short timespan
oh, actually now that I looked it up closer, starting about 9 months ago they did a foot in the door manuever (a survey with leading questions followed up by misrepresenting the results) and then aggressively pushed an AI service that, you guessed it, tries to read all the emails you write and receive, totally undermining the end-to-end encryption. (the claim is it works locally, but most users have their data processed on the proton servers unencrypted)
And the way they did it is straight out of the enshittification playbook where they first promise that it’s “business only” and then later try to push it to all users, and claiming it’s off by default while it’s actually on by default
https://pivot-to-ai.com/2024/07/18/proton-mail-goes-ai-security-focused-userbase-goes-what-on-earth/
(this article only covers the early portion of the debacle)
this isn’t even all the problems with proton either, though all the other things are pretty minor by comparison (eg. quitting mastodon “because it’s too expensive to maintain” (?))
The most popular alternative seems to be tutanota, though there should be a lot of alternatives though they may be very niche
(it seems tuta has some technical limitations if you want to do automated emailing, and the UI is a bit clunky, but it’s not a privacy or security problem)
the trick is of course to look for the most disliked comments. Here’s a couple
All humans are basically pure evil.
You are probably cruel and violent to vulnerable individuals more than three times a day.
Older men having sex with sexually mature teen girls is fine
DUI laws are too strict. It shouldn’t be all or nothing at .08 BAC but more severe punishments for more severe inebriation. .08 is pretty low and people who drink regularly can function fine at that level.
The Lemmy users who call themselves “Leftists” are garbage human beings
And most of them aren’t really that left. Trying to talk about abolition of police and prisons is something they would never agree to
wait, is this a roundabout way of calling yourself a garbage human being?
What started it I think is this twitter post praising trump and the republican party: https://xcancel.com/andyyen/status/1864436449942110660
He later doubled down on it (if I recall correctly) and the company has generally been making some highly questionable decisions since
Originally planned to post it in this format but thought too much reaction within reaction would be bad (and including mr. theo ai glazer felt questionable)