[-] Gayhitler@lemmy.ml 3 points 2 weeks ago

I didn’t read all that too closely.

Do you have sound coming from the speakers plugged into the pc when you play a sound on the pc?

[-] Gayhitler@lemmy.ml 3 points 3 weeks ago

If you can figure out how to make a Debian usb installer without help then you’ll be fine.

[-] Gayhitler@lemmy.ml 3 points 4 weeks ago

I don’t think that rust in the kernel is for naught or impeding progress. I think the patterns of expanding the scope of conversation to the absolutely philosophical level that some rust mailing list exchanges have done and kicking decisions up the chain or requesting a set of accommodations be made to the existing processes and methods fall broadly into the tactics outlined in the simple field sabotage manual.

I think it’s that behavior that isn’t going to get anywhere or solve problems.

I don’t think that the kernel codebase has been infected with rust. I think that especially after Linus said “sure, see what happens” to the suggestion of taking in rust work rust devs have been making tons of commits and sometimes it’s accepted, sometimes it’s rejected and often a border is created and there’s friction along it like this example.

[-] Gayhitler@lemmy.ml 3 points 1 month ago

Mullvad us Denver 205.

I’m also using their encrypted dns though that shouldn’t matter. Recording an email might be a regulatory requirement of the intelligence sharing treaties of the eu and broader eurozone.

Try an endpoint outside of the western world and see what happens!

[-] Gayhitler@lemmy.ml 3 points 1 month ago

Of course, I only meant that unlike Gmail and such services like proton don’t actively impede your anonymity and build a profile on you as far as we know.

[-] Gayhitler@lemmy.ml 3 points 1 month ago

Earthsea is what you want.

[-] Gayhitler@lemmy.ml 2 points 1 month ago

It seems like I’m not being clear. The goal is to get 100% on to encrypted chat.

Right now in America, about sixty percent of the phones are running ios. ios has imessage by default. The application which those people use to do imessage is called messages (very unconfusing!) and also does texts. When you’re using imessage in messages the text bubbles are blue, rcs and sms are green. Imessage is an encrypted chat.

If a person running android wants to use imessage they need to bridge it to their phone from a mac (messages and imessage are available on mac) using the bluebubbles application.

So three out of five of the people you know are already using encrypted chat. If you, the op, can get on their level then you only have to convince the other two to use some other chat thing that they can do. Maybe signal or something.

So the cost of running a mac computer as a bridge so you can use imessage through the bluebubbles android app is for you, the op, to get on the encrypted chat application those three out of five people are already on. You’d still need to use xmpp or something for everyone else but now you only need to worry about two out of five people.

I’m pretty poor and a hundred bucks isn’t a terrible price to pay for being sixty percent there. If I could have done that with pgp back in the day (when a hundred bucks was worth something!) I would have jumped at the chance.

Just avoiding having to explain to people that email was transmitted in plaintext and what that meant and not either have to talk them down from taking a pickaxe to their computer or convince them that it doesn’t matter that they have nothing to hide would have been worth it back then.

It’s also a completely hypothetical cost that assumes you don’t just stumble into an old mac and won’t trade your phone in for one running ios to save that cash.

[-] Gayhitler@lemmy.ml 3 points 1 month ago

The barrier to entry was intended to refer to others since it’s already installed on over half their phones to start with and most people are gonna be using a messaging program on their phone.

When there’s above a 50% chance the person you’re talking to is already using a particular encrypted messaging program that’s the lowest barrier to entry.

The barrier to entry always refers to other people because the hardest part of establishing private communications has always been convincing other people to actually do it.

If you really wanted to get on imessage for the least amount of cash out of pocket possible, the bluebubble bridge application random letters person mentioned is ~$100 for an old mac, and tbh that’s a high estimate in my experience. People are just giving those things away nowadays.

[-] Gayhitler@lemmy.ml 3 points 1 month ago

Some food for thought:

Absence of information is its own sort of information. You may find it worthwhile in your search for an acceptable compromise to place some kind of value on “looking normal”.

[-] Gayhitler@lemmy.ml 3 points 1 month ago* (last edited 1 month ago)

So go ahead and take a look at your journalctl output. The left hand side should be timestamps, so you can immediately figure out if it’s starting a million years in the past or sometime you know you had the problem.

If it is a million years in the past, use the —since flag and specify the time you want to start at as enumerated in the manual file (man journalctl).

Once you’re looking at the logs in journalctl from a day you know the problem happened, go ahead and use arrow keys and pgup/pgdn to find a reboot. You’ll know when you find a reboot because it’ll look different. The messages will be about figuring out what hardware is attached and changing runlevels and whatnot.

Once you found where the reboot is, go backwards to find something weird happening in the logs.

E: By default the parser (program used to handle text) of journalctls output is “less”. If you want to get out of it, press “q”, and if you want to know more “man less”.

[-] Gayhitler@lemmy.ml 3 points 1 month ago

So that we’re 100% clear, the site and app only stopped working in the us.

If you were in the us on a browser and used a fresh cache and a vpn in another country it worked fine, famously Canadian users used the time to shit talk American users while they “couldn’t” hear.

While there’s an argument to be made that the law only explicitly prohibits new downloads (distribution) it also makes reference to maintaining the service. A company that wanted to continue running the company without any ability to gain American users could attempt to skirt that, but eagle eyed readers of law will recognize that sec2.a.1.B pretty much squashes that. Not only does it make datacenters in the us and elsewhere culpable, but the generally held legal definition of words like “internet hosting services”, “distribution”, “maintenance”, “updating” and “application” are not the narrow often colloquial meanings we’re used to, but broad definitions intended to give the maximum applicability to laws regardless of specific technology involved.

So I think unless bytedances strategy was to explicitly skirt the law and try to keep the servers up for the American users then the “correct” decision was to follow the letter of the law until the new regime that had promised to offer a stay was in power and made that offer officially and in writing.

From a business perspective, for a company caught between two regimes, giving the “win” to the one you’ll definitely be working with longer is a no brainer.

I haven’t seen significant right wing or pro trump content on TikTok after it came back on. I have seen plenty of users saying thank you president trump with a whole spectrum of intonation and doing thinking emoji at the message when it came back on. I also haven’t seen decent analysis of its algorithms behavior since then, which makes sense because making a decent analysis of such a black box would take time.

Changes to a persons recommendations take time. The way that 小红书 surfaces this by changing the “reels” offered to the users explore page when they’ve accumulated enough information to make a change and finished processing it.

Part of what made TikTok’s algorithm and recommendations seem so magical is that it had a really good way of spicing things up and not getting stuck in a rut and because there was only one scrolling feed, changes to recommendations were just suddenly there.

Just having said that and having experienced the rinky-dink recommendations after the downtime I don’t think it was a shut down specifically for changes (although they definitely did, why would t you take the opportunity to update everything if you’re doing mandated spin down?) but because it was the smart legal choice.

[-] Gayhitler@lemmy.ml 3 points 1 month ago* (last edited 1 month ago)

When you use mullvad you create a sixteen digit id. You don’t tie an account or email to it, just your secret code.

If I wanted to answer your question I’d make an account, put five bucks on it using whatever means are functional and quick (a credit card or something) and see how it works. Mullvad is €5 no matter how many months you buy in advance so it’s not a huge deal or commitment to find out.

Once you’ve bought a month using the least privacy respecting (this is debatable) method you can figure out if it will work for you.

You may find out that you need to use mullvads encrypted dns service and/or their browser proxy setup. Using the encrypted DNS doesn’t require the use of mullvads vpn servers so you might be able to resolve the isp blocking tor that way without needing to buy mullvad.

If you find out in that month that everything is working right, re-up another month in your low privacy way then make a new account and select the use cash option. They’ll give you a code to write down. Send a big bill with that use cash code to Switzerland and in a few weeks you’ll have relatively private vpn access.

E: since the barrier to entry of €5 and some way to transfer it might be too high, you can also try to contact mullvads servers. Make an account and don’t fund it, but create a device profile and a configuration (or install their software). If your error is that the account isn’t funded as opposed to that the servers are unreachable then you’re probably fine.

view more: ‹ prev next ›

Gayhitler

joined 1 month ago