[-] tal@lemmy.today 1 points 1 day ago

If there’s an automated way to migrate to piefed.social that includes the comments, media and ideally attribiution for all of the old posts that would be cool. I’ll investigate those options a little

Yes, there is. One other community that I'd been using did that: !CasualConversation@lemm.ee moved to !CasualConversation@piefed.social using PieFed's migration feature. It retains comments. It mirrors media to piefed.social, as best I can tell, and the attribution issue goes away.

I've been reposting the old stuff manually to !CassetteFuturism@lemmy.world, but I'll put that on pause if you're planning to migrate to a third community on piefed.social instead.

[-] tal@lemmy.today 6 points 2 days ago

Well, depends on the municipality. My local government does water, and according to this, that's more-common than not, but that's not a universal.

https://en.wikipedia.org/wiki/Water_privatization_in_the_United_States

In the latter half of the 19th century, private water systems began to be a part of municipal services.[1] As of 2011, over three quarters of US local governments surveyed by the International City/County Management Association provide water distribution entirely with public employees. Over two thirds of municipalities provide water treatment publicly, and over half provide sewage collection and treatment publicly. These rates have remained relatively stable over time.[2]

Private water companies have been operating in the United States for over 200 years and now number in the thousands. Collectively, the private water industry serves more than 73 million Americans.

[-] tal@lemmy.today 7 points 3 days ago

!CassetteFuturism@lemmy.world

The lemm.ee instance is going down at the end of the month.

[-] tal@lemmy.today 2 points 3 days ago* (last edited 3 days ago)

A lot of real-time tactics and turn-based tactics games would fit that description.

Matrix Games specializes in milsims, so they're an easy way to get a list.

https://www.matrixgames.com/inventory?sort=new-releases&filter=%253A%253A%253A%253A%253A%253A%253A%253A%253Aexclude%253A%253A

As another commenter says, having more criteria to narrow it down would help.

I like the Close Combat series myself, which is real-time.

[-] tal@lemmy.today 5 points 3 days ago

They actually do make little portable battery-powered ones. I was looking at them the other day when I was wondering how much it would cost to set up a Linux teletype terminal in response to some other comment.

https://www.amazon.com/Sunydog-Portable-Wireless-Compatible-Restaurant/dp/B0CL481GS1

Not built into the laptop, but can pull it out of a laptop bag and use it.

[-] tal@lemmy.today 15 points 3 days ago* (last edited 3 days ago)

Oh, damn, sorry


this repost should have gone to the new community. Didn't realize this one had been unlocked.

looks embarrassed

Crossposting.

131

Original post by Crul@lemm.ee:

Source: Photo by Sandstein - File:Epson HX-20 in case - MfK Bern.jpg - Wikimedia Commons

Wikipedia: Epson HX-20

The Epson HX-20 (also known as the HC-20) was the first "true" laptop computer. It was invented in July 1980 by Yukio Yokozawa, who worked for Suwa Seikosha, a branch of Japanese company Seiko (now Seiko Epson), receiving a patent for the invention.

Seen on Functional object - Object, Epson, Epson portable computer, 1980-1989

[-] tal@lemmy.today 3 points 4 days ago

I mean, they kind of drive the point home further in the article:

So far, we’ve observed six devices total that we believe were targeted for exploitation by this threat actor, four of which demonstrated clear signatures associated with NICKNAME, and two which demonstrated clear signs of successful exploitation. Interestingly, all of the victims had either previously been targeted by the Chinese Communist Party (CCP) e.g., they were confirmed to have also been targeted by Salt Typhoon; they were engaging in business pursuits counter to or of particular interest to the CCP; or they had engaged in some sort of activism against the CCP.

[-] tal@lemmy.today 3 points 4 days ago* (last edited 4 days ago)

Honestly, there aren't that many posts in this community's history---only ~240-and-change---and it'd be a shame to lose the images. Tell you what, @Scirocco@lemm.ee and @sag@lemm.ee. I'll go ahead and take the initiative and go through and manually repost the history myself to the new community with what images I can recover, and upload to lemmy.today's pict-rs instance; not all are still accessible.

Also, given that catbox.moe---another popular place to host content posted to the Threadiverse---is also at risk of going down, probably a good thing to get anything on there off anyway, if anyone's used that.

[-] tal@lemmy.today 9 points 4 days ago* (last edited 4 days ago)

I’ve made one one on .world

It appears to be !CassetteFuturism@lemmy.world, for anyone looking.

Hopefully with an automated tool of some sort…

PieFed apparently has some functionality like this; the !InternetIsBeautiful@lemm.ee migration to !InternetIsBeautiful@piefed.social did this, and old posts---including, importantly, a new copy of images posted by lemm.ee users now hosted on piefed.social---are visible on that instance. I have not seen old posts yet show up on my own instance as of this writing, and am not sure whether they will do so or are even expected to do so.

https://lemm.ee/post/65950432/20944447

[-] tal@lemmy.today 5 points 5 days ago* (last edited 5 days ago)

Well, someone's gotta be the guinea pig!

I have no idea what, if any, compatibility issues exist between Piefed and Lemmy instances today, as I don't normally use any communities on instances running Piefed. Might be a good idea to ask the PieFed people or piefed.social admins about any known issues, or check the Piefed issue tracker:

https://codeberg.org/rimu/pyfedi/issues

e.g.

https://codeberg.org/rimu/pyfedi/issues/658

Mod-Assigned Post Flair is Dropped When a Lemmy Post is Edited

Like, for a community that relied heavily on post flair to make the community work, that might be a substantial issue.

[-] tal@lemmy.today 11 points 6 days ago

but I’ve really enjoyed it.

Me too, and I hope it lives on elsewhere myself!

100

https://lemm.ee/post/65824884 for details.

Moderators interested in migrating to a new community on another instance might want to consider selecting an instance and doing so sooner rather than later so that users here have time to see a migration post here and subscribe to the new community.

[-] tal@lemmy.today 7 points 6 days ago

Lemmy.today also has policy against defederation, and it's still happily chugging along.

1
submitted 1 week ago by tal@lemmy.today to c/news@lemmy.world
1
submitted 1 week ago by tal@lemmy.today to c/news@lemmy.world
1
submitted 1 week ago by tal@lemmy.today to c/world@lemmy.world
30
submitted 1 week ago by tal@lemmy.today to c/world@lemmy.world
20
submitted 1 week ago by tal@lemmy.today to c/floridaman@lemmy.world
5
submitted 2 weeks ago by tal@lemmy.today to c/news@lemmy.world
8
submitted 3 weeks ago by tal@lemmy.today to c/news@lemmy.world
523
submitted 1 month ago by tal@lemmy.today to c/theonion@midwest.social
278
8
submitted 2 months ago* (last edited 2 months ago) by tal@lemmy.today to c/privacy@lemmy.world

For those not familiar, there are numerous messages containing images being repeatedly spammed to many Threadiverse users talking about a Polish girl named "Nicole". This has been ongoing for some time now.

Lemmy permits external inline image references to be embedded in messages. This means that if a unique image URL or set of image URLs are sent to each user, it's possible to log the IP addresses that fetch these images; by analyzing the log, one can determine the IP address that a user has.

In some earlier discussion, someone had claimed that local lemmy instances cache these on their local pict-rs instance and rewrite messages to reference the local image.

It does appear that there is a closed issue on the lemmy issue tracker referencing such a deanonymization attack:

https://github.com/LemmyNet/lemmy/issues/1036

I had not looked into these earlier, but it looks like such rewriting and caching intending to avoid this attack is not occurring, at least on my home instance. I hadn't looked until the most-recent message, but the image embedded here is indeed remote:

https://lemmy.doesnotexist.club/pictrs/image/323899d9-79dd-4670-8cf9-f6d008c37e79.png

I haven't stored and looked through a list of these, but as I recall, the user sending them is bouncing around different instances. They certainly are not using the same hostname for their lemmy instance as the pict-rs instance; this message was sent from nicole92 on lemmy.latinlok.com, though the image is hosted on lemmy.doesnotexist.club. I don't know whether they are moving around where the pict-rs instance is located from message to message. If not, it might be possible to block the pict-rs instance in your browser. That will only be a temporary fix, since I see no reason that they couldn't also be moving the hostname on the pict-rs instance.

Another mitigation would be to route one's client software or browser through a VPN.

I don't know if there are admins working on addressing the issue; I'd assume so, but I wanted to at least mention that there might be privacy implications to other users.

In any event, regardless of whether the "Nicole" spammer is aiming to deanonymize users, as things stand, it does appear that someone could do so.

My own take is that the best fix here on the lemmy-and-other-Threadiverse-software-side would be to disable inline images in messages. Someone who wants to reference an image can always link to an external image in a messages, and permit a user to click through. But if remote inline image references can be used, there's no great way to prevent a user's IP address from being exposed.

If anyone has other suggestions to mitigate this (maybe a Greasemonkey snippet to require a click to load inline images as a patch for the lemmy Web UI?), I'm all ears.

view more: next ›

tal

joined 2 years ago