pelya
@pelya@lemmy.world
- Comment on 16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now 1 week ago:
What’s the total human population again, 8 billion?
- Comment on What editor or IDE do you use and why? 2 weeks ago:
mcedit, because I’m not nerdy enough for vim.
- Comment on What are the benefits of a server having multiple public IP addresses? 3 weeks ago:
Because you won’t determine the type of NAT during hole punching. This requires the client sending two UDP packets to two different IP addresses, then comparing their source addresses on the server.
Normally yes, you can just assume that two clients you are trying to connect both have port restricted cone NAT, and run the hole punching algorithm, and if the connection fails after ten seconds, show message to the users ‘Error 418: your router is a teapot’.
- Comment on What are the benefits of a server having multiple public IP addresses? 3 weeks ago:
The one use case is running STUN/TURN server for NAT hole punching, that requires two separate servers, or one server with two IP addresses. You will only need that to run masterserver for games that support hope punching, or to run VoIP telephony / teleconference server.
- Comment on Samsung teams up with Glance to use your face in AI-generated lock screen ads 3 weeks ago:
How long until we get self-insert AI porn?
- Comment on World's first full-size humanoid robot fighting championship to debut in Shenzhen 4 weeks ago:
Robotized armies are already here, and they look nothing like steel skeleton humanoid Terminators, they are more like cheapest four propeller drones with an anti-tank mine strapped with zip ties, naked wires with no cover, because it’s single use.
- Comment on The Apothecary Diaries Season 2 • Kusuriya no Hitorigoto 2nd Season - Episode 19 discussion 5 weeks ago:
Maomao collects them hairsticks. Now Shisui marked her.
- Comment on Avoiding AI is hard – but our freedom to opt out must be protected 5 weeks ago:
We can control AI just fine. We cannot control corporations, who use sloppy AI for important decisions. A few court cases for unfair hiring practices will solve the problem rather quickly, it won’t be AI who will get fined, it will be CEO.
- Comment on Revolutionary cooling technology emerges from Slovenia 5 weeks ago:
Yeah, you could probably achieve 15% cooling efficiency with regular old nitrogen or methane instead of fluorocarbons.
- Comment on quick health tip 1 month ago:
Wow, I’ll try that tomorrow
- Comment on “This is a huge moment for creators and their businesses,” - Patreon will update its iPhone app to sidestep Apple’s payment system. Patreon was forced to pay 30% fees 1 month ago:
Yup, because they are annoying, not because they do not work.
Pretty much every news site asks you to enable browser notifications.
- Comment on “This is a huge moment for creators and their businesses,” - Patreon will update its iPhone app to sidestep Apple’s payment system. Patreon was forced to pay 30% fees 1 month ago:
No app needed. Tell me if it works on your phone.
- Comment on "29-sai Dokushin Chuuken Boukensha no Nichijou" Teaser Visual 1 month ago:
Discount Shield Hero?
- Comment on “This is a huge moment for creators and their businesses,” - Patreon will update its iPhone app to sidestep Apple’s payment system. Patreon was forced to pay 30% fees 1 month ago:
Patreon app is literally their website. What does it do that the website does not? Notifications? Offline images? All of these can be done in your mobile browser.
- Comment on Android’s next big feature turns your phone into a desktop 1 month ago:
If you want deskktop version of Firefox or Chromium on your phone, you can get them using Termux. But yeah they will be slow.
- Comment on How to hide installed apps list from other apps in android? 2 months ago:
Unless you want to create your own custom ROM, the only general solution is to raise enough stink so that Google fixes it themselves.
- Comment on How to hide installed apps list from other apps in android? 2 months ago:
Settings -> System -> Multiple users.
Add another user, and install all your spyware apps from this user account. These apps should be unable to access your primary account, including other installed apps, they will see only an empty Android phone.
You will need to create a new Google account on your PC first if you want to install apps. Also configure two-factor authentication using your PC or another phone, because you won’t be able to switch to your authenticator app on your primary account quickly enough to copy the one-time password to your new account.
- Comment on Swedish amplifier enables transmission of 10x more data per second 2 months ago:
Is 300 nm the diameter of the optical cable? This terminology breaks my brain, 300 nm is 1000 terahertz, which is unreasonably large for a signal bandwidth, it’s like one milllion Ethernet cables.
- Comment on Tip of My Joystick: a new Lemmy community for finding a game whose name you can't remember 2 months ago:
That name was straight copied from
the site that should not be named
r*ddit
And the phrasing was intentional.
- Comment on xkcd #3074: Push Notifications 2 months ago:
I’ve achieved something today. Not anything useful, but still something.
- Comment on xkcd #3074: Push Notifications 2 months ago:
Browser-based notifications are easy to turn off, and it’s probably the only way to get a message on a desktop PC without subscribing to email or using RSS. Also you don’t need to install an app on your phone.
- Comment on New 'DRAM+' memory designed to provide DRAM performance with SSD-like storage capabilities, uses FeRAM tech 2 months ago:
But it’s very convenient! When you have a BSOD, you don’t need your core dumped, you simply unplug your DRAM+ and send it to Microsoft using paper mail.
- Comment on The Apothecary Diaries Season 2 • Kusuriya no Hitorigoto 2nd Season - Episode 13 discussion 2 months ago:
I wouldn’t put it past ancient China palace regulations. They worked really hard to differentiate themselves from commoners. In the brothel scene they all bathed naked, including Maomao.
- Comment on Europe proposes backdoors in encrypted platforms under new security strategy 2 months ago:
It’s way less expensive for state-sponsored hackers to blackmail your country’s official to leak backdoor keys than try to break the unbreakable crypto using a nuclear-powered GPU farm.
- Comment on Beyond RGB: A new image file format efficiently stores invisible light data 2 months ago:
Saving arbitrary metadata is the exact use case for
pickle
module, you just put it together with your numpy array into a tuple. jpeg format has support for storing metadata, but they are an afterthought like .mp3 tags, half of applications do not support them.I can imagine multichannel jpeg to be used in photo editing software, so you can effortlessly create false-color plots of your infrared data, maybe even apply a beauty filter to your Eagle Nebula microwave scans.
- Comment on Is there an android device that is both phone and music player? 2 months ago:
You can achieve this with apps like Next Track or Volumee and a regular Android phone. Or you can buy a phone with extra buttons, but the button mapping function depends on the manufacturer’s Android skin, so the quality varies.
- Comment on Beyond RGB: A new image file format efficiently stores invisible light data 2 months ago:
What,
pickle.dump
your enormous Numpy array not good enough for you anymore? Not even fancyzlib.compress(pickle.dumps(enormousNumpyArray))
will satisfy you? Are you a scientist or a spectral data photographer? - Comment on $16bn health agency managed finances with Excel spreadsheet. 3 months ago:
Should have used three spreadsheets. Excel tends to run slowly when a spreadsheet has more than a million cells in it.
- Comment on The ESP32 "backdoor" that wasn't | Dark Mentor LLC 3 months ago:
There was no mention of over-the-air exploit, so eh.
- Comment on The ESP32 "backdoor" that wasn't | Dark Mentor LLC 3 months ago:
Anyway, having direct unprivileged R/W access to platform memory is indeed a security hole, no matter the vendor.
It is not. ESP32 is an embedded chip with less than one megabyte of RAM. It cannot run apps or load websites with any malicious code, it only runs the firmware that you flash on it, nothing else, and of course your firmware has full access to every chip feature. If your firmware has a security hole, it’s not the chip’s fault.