[-] stu@lemmy.pit.ninja 4 points 1 year ago

Or avoiding a certain food or drink after becoming violently ill after consuming it 😬

[-] stu@lemmy.pit.ninja 3 points 1 year ago

I was able to get video streaming with audio working on Discord using pipewire, but it was a massive pain in the ass and somewhat unreliable. I don't have a lot of experience with Jitsi, but I trust others' recommendation there

[-] stu@lemmy.pit.ninja 4 points 1 year ago

Millennials are a strange generation because I feel like elder millennials and younger millennials are kind of divided by whether they remember a time before the Internet went mainstream or not.

To your point, another dividing line for Millennials and Gen Z is that Gen Z kids' first phone was probably a smart phone and they probably got theirs a couple years younger on average than millennials.

[-] stu@lemmy.pit.ninja 4 points 1 year ago

I feel like this should only be a problem when users don't make use of the crosspost functionality built into Lemmy (which ultimately should only be a technical problem that Lemmy clients need to address at the time of post creation). Aside from appropriate options in a client that should allow you to crosspost to multiple communities at once, I feel like this is a server side issue more than a client side one because the server shouldn't be returning duplicates like this if posts are appropriately crossposted IMHO.

[-] stu@lemmy.pit.ninja 4 points 1 year ago

Personally, I think it'd be nice if you could self-host just the bridge instances and connect them with beeper yourself, so that the part that isn't e2e encrypted is running on software you can validate and hardware you control.

I 100% agree this would be a great solution. That's what I thought this page was going to be at first until I kept reading and realized it's just a config guide for the Matrix Ansible setup. I wish they didn't say "self host Beeper" on that page at all because self hosting Matrix has absolutely nothing to do with the Beeper service other than their devs built the bridges that they're showing you how to set up with Matrix.

[-] stu@lemmy.pit.ninja 4 points 1 year ago

I probably could've worded that statement better and you bring up good points when it comes to individuals. Innovation clearly does not require profit motive to occur. The type of innovation you're talking about does require time to achieve, however. For individuals, this is leisure time, for organizations this is billable time. Regardless of the structure of an economy, the creative pursuits you've described can't occur if people are being worked to death.

One thing I will say about open source software, though, is that a lot of projects don't exist because of pure altruism. A lot of projects have been corporate funded (sometimes significantly funded) in order to specifically kill closed source competitors. I'm a pragmatist, though, I see open source software as a universal good for humanity regardless of its raison d'etre. Open source software is a form of competition that pushes closed source software vendors to innovate in order to justify their value. I could also argue that a lot of free content on the Internet is only free in the sense that it was produced by people who didn't have a profit motive and it's still often subscription or ad supported. YouTube, for example, still makes a lot of money on it.

The main point I was driving at is the choice of economic system doesn't matter much for personal creative endeavors as long as it allows people time to pursue them. But market competition for profits is absolutely one of the most powerful motivators for product and service innovation for corporations. So if you adopt an economic system that essentially eliminates competition and profits, you kill that motivation to innovate.

[-] stu@lemmy.pit.ninja 3 points 1 year ago

Usenet services are more concerned about removing illegal content when it's reported than what users are downloading. You can get a provider that doesn't log download activity and accepts Bitcoin payments, you'd want to use its SSL connection, and you can go through a VPN as well (some Usenet providers even bundle VPN services with their Usenet subscription). It's generally much safer than torrenting from a privacy standpoint where anyone on your tracker sees your IP (or, once again, your VPN's IP). I'm not aware of any Usenet server that says it didn't log downloads secretly doing so because it's really not in their interest to lie about it. They know why people are subscribing.

[-] stu@lemmy.pit.ninja 3 points 1 year ago* (last edited 1 year ago)

You know, like nunchuck skills, bowhunting skills, computer hacking skills. Girls only like guys who have great skills...

[-] stu@lemmy.pit.ninja 3 points 1 year ago

True, though the amount produced is less of a concern than the amount of space and storage requirements necessary to make sure we don't accidentally irradiate things we care about.

[-] stu@lemmy.pit.ninja 3 points 1 year ago

I remember reading they were shutting down nuclear power nationwide however many years ago and thinking that was a big mistake. Yes nuclear currently produces a lot of waste material that we have to store, but it's still one of the cleanest and safest energy sources we have as a species.

[-] stu@lemmy.pit.ninja 4 points 1 year ago

That was my immediate reaction as well, thank you. Most of the generated images aren't even significantly Luciferian in appearance such that they should be mistaken as such. These people are primed to hate anything that looks remotely evil to them. Zomg a figure with horns! 😱

[-] stu@lemmy.pit.ninja 3 points 1 year ago

If Reddit were to reach out privately to this group, the first thing they'd probably do is ask for proof. It's trivially easy to provide proof you've carried out a hack; you just present some specific information that was not public and describe what all else you have in specific enough terms they know you're not bluffing. (Or, I suppose you could just send them your whole dump if you really want to make it clear what all you have). The only way the rest of us will be able to validate these claims is if they leak and it either matches users' own private account info or Reddit issues a disclosure about the hack (which I'm pretty sure they're supposed to do regardless).

view more: ‹ prev next ›

stu

joined 6 months ago