uranibaba
@uranibaba@lemmy.world
- Comment on Why doesn’t Apple/Samsung/Google use new tech like every other phone maker? 2 days ago:
Agreed, have used both android and iOS over the years and both OSes has their pros and cons. Currently staying with iPhone because nothing beats their face ID in my opinion.
- Comment on What are the advantages/disadvantages of the different backup solutions? 2 days ago:
I am currently looking into borg because it can take incremental backups. I just need figure out how I should handle a running system, if I need to turn of all my docker images or if there is some kind of snapshot function I can use.
From what I read on their FAQ, Borg cannot verify the integrity so I would need to turn everything off during the backup process. A filesystem like ZFS could have solved that problem (cannot find the link, something about shadow copy I think?) but since I don’t have a backup yet nor physical access, I need to work with what I have.
I think I will set it to take a backup every night.
- Comment on YSK: If you set up a Lemmy instance, and follow the Docker setup instructions to the letter, it will send lemmy.ml your admin password during the setup process 4 days ago:
Here is the commit github.com/…/b3bd2afd6af18e71048ade7e82b541ff903a…
It creates the docker file and updates the docs to (among other things) point to the he file, the old being raw.githubusercontent.com/…/docker-compose.yml.
I wonder why it does not point to the main repo. The PR does not discuss the it. github.com/LemmyNet/lemmy-docs/pull/315
- Comment on YSK: If you set up a Lemmy instance, and follow the Docker setup instructions to the letter, it will send lemmy.ml your admin password during the setup process 4 days ago:
You are right, that is sus. The main repo does not have this and the docs repo have the main as a sub module, but still have a folder named assets with a different docker-compose.yml.
Would have been nice with a link from the start.
- Comment on YSK: If you set up a Lemmy instance, and follow the Docker setup instructions to the letter, it will send lemmy.ml your admin password during the setup process 4 days ago:
I would fix it if we had a link. This problem is not present in the main branch.
github.com/LemmyNet/lemmy/…/docker-compose.yml
environment: # this needs to match the hostname defined in the lemmy service - LEMMY_UI_LEMMY_INTERNAL_HOST=lemmy:8536 # set the outside hostname here - LEMMY_UI_LEMMY_EXTERNAL_HOST=localhost:1236 - LEMMY_UI_HTTPS=false - LEMMY_UI_DEBUG=true
- Comment on YSK: If you set up a Lemmy instance, and follow the Docker setup instructions to the letter, it will send lemmy.ml your admin password during the setup process 4 days ago:
Do you have a link to the file you used which has this problem?
- Comment on What's the e-reader you would buy if you were in the market? 3 weeks ago:
Which one did you buy?
- Comment on [deleted] 4 weeks ago:
You see the same with people who use fillers or get tattoos. They start small, only one tattoo or a minor increase in lip size. Then they get another and another tattoo, or get bigger and bigger lips. My hypothesis is that they get used to the new appearance or becomes desensitized to it.
- Comment on 109 children rescued, 244 arrested in Operation Soteria Shield, exposing widespread child exploitation in North Texas 4 weeks ago:
The title made me think 244 children (and not offenders) were arrested.
- Comment on Can I replace honey with maple syrup? 5 weeks ago:
THANKS! I will try to do this this weekend (kids and all, might not have the time. :-) )
- Comment on Welcome to Campus. Here’s Your ChatGPT. 5 weeks ago:
“hands-on” graduation project
Does hand-on mean supervised?
- Comment on [deleted] 5 weeks ago:
It is still probably one of the better ways to manage your passwords short of using a password manager. I don’t know any hackas but it feels like a lot of effort, finding patterns in a list of passwords. When you have found a pattern, you must also figure out what the pattern is.
On the other hand, it could be a viable way given that there are some huge leaks with a lot of data. Perhaps someone is selling datasets of hacked patterns, it could be another way to find someones paypal password.
- Comment on If I have to get inessesent phone calls about a house I never owned because somehow my info got associated with it online, I should get the house. 1 month ago:
I’ve read people’s stories before were their number got listed somewhere and people just never stops calling even though it is the wrong number. It has never happened to me but it really sounds terrible. Sound of an block any unknown caller seems like the only option (but not so great if you are applaying for a job).
- Comment on Storage 1 month ago:
Can you do Leg Sheeran?
- Comment on How does AI-based search engines know legit sources from BS ones ? 1 month ago:
created by deleter
- Comment on How does AI-based search engines know legit sources from BS ones ? 1 month ago:
I don’t use Google, but perhapas I should? You could make a bingo game out of finding funny summaries like that one.
- Comment on [deleted] 1 month ago:
From what I understand, they (hackers) try known email/password combinations at different sites because a lot of people reuse their passwords. I also find it unlikely that anyone trying hack accounts will spend any amount of time looking at individual passwords if their list is 1000+ (and we know there are leaks in the milions).
I agree that they are reasonably save unless they are targeted.
- Comment on Can I replace honey with maple syrup? 1 month ago:
Bump. I also want it.
- Comment on [deleted] 1 month ago:
Why not? It’s not going to be cost effective to discard a usable computer, of course. But hen your phone can be hooked up to a monitor, mouse and keyboard and the phone’s internet can be used to stream the remote computer, why have a computer? Or if your phone could give you the same interface as your current computer?
I will personally most likley always own a “ordinary” computer, but I wonder if a majority of the populace will.
- Comment on [deleted] 1 month ago:
More like remote desktop, like your whole computer being cloud based.
en.wikipedia.org/wiki/Desktop_virtualization and …microsoft.com/…/what-is-virtual-desktop-infrastr….
- Comment on [deleted] 1 month ago:
I haven’t seen The Expanse, but I get it from context. I still believe that is how a lot of people will operate in when 5G is wide spread enough in the US (because that is most likely where the money to develop this will come from and hence the first target market. Or perhapas somewhere in Asia.) + 5 years to develop and sell products.
Unless I am completely wrong and some other trend comes along and the tech world takes a whole other course. 🤷
- Comment on Why is everyone using Tailscale? 1 month ago:
How do you know which headers to set? I couldn’t find any documentation when I last tried (but that was some years ago now).
- Comment on [deleted] 1 month ago:
I wonder if not computers will move away from being a physical unit and instead being a cloud service. The smartphone will be the access point for your cloud computer, and you will connect it to peripherals, just like you would a laptop today.
- Comment on Someone posted the Source Code of the IRS's Directfile on Github 1 month ago:
There is even a docker-compose.yml script.
- Comment on ‘It’s real y’all’: People are sharing their tariff receipts, and my wallet is not ready for what’s coming 1 month ago:
That one screenshot with comment ‘I thought tariff was taxes on foreign countries’, I can’t tell if that is sarcasm or not.
- Comment on Why don't these code-writing AIs just output straight up machine code? 1 month ago:
Looking at the tags, I only found one with the LLM tag, which I assume naught101 meant. I think people here tend to forget that there is more than one type of AI, and that they have been around for longer than ChatGPT 3.5.
- Comment on Why don't these code-writing AIs just output straight up machine code? 1 month ago:
The compiler is likely better at producing machine code as well, if LLMs could produce it.
- Comment on No, Steam wasn’t hacked, and your account details are safe 1 month ago:
store.steampowered.com/news/collection/steam?emcl…
You may have seen reports of leaks of older text messages that had previously been sent to Steam customers. We have examined the leak sample and have determined this was NOT a breach of Steam systems.
We’re still digging into the source of the leak, which is compounded by the fact that any SMS messages are unencrypted in transit, and routed through multiple providers on the way to your phone.
The leak consisted of older text messages that included one-time codes that were only valid for 15-minute time frames and the phone numbers they were sent to. The leaked data did not associate the phone numbers with a Steam account, password information, payment information or other personal data. Old text messages cannot be used to breach the security of your Steam account, and whenever a code is used to change your Steam email or password using SMS, you will receive a confirmation via email and/or Steam secure messages.
You do not need to change your passwords or phone numbers as a result of this event. It is a good reminder to treat any account security messages that you have not explicitly requested as suspicious. We recommend regularly checking your Steam account security at any time at
store.steampowered.com/account/authorizeddevices
We also recommend setting up the Steam Mobile Authenticator if you haven’t already, as it gives us the best way to send secure messages about your account and your account’s safety.
- Comment on Klarna Hiring Back Human Help After Going All-In on AI 2 months ago:
I do not agree with the idea that humans are being trained to act like robots. Any company with a customer service department is likely tracking the root causes of their customers’ issues. With enough data, they can identify the most common problems and their solutions. If the goal is to resolve a customer’s issue as quickly as possible (which seems like a reasonable assumption), it makes sense to guide the customer through the most common solutions first, as that will likely solve the problem.
If someone works in customer service and repeats the same script daily, it’s understandable that they may come across as robotic due to sheer boredom. A skilled customer service representative can recognize when to use the script and when to deviate. However, if a company fails to hire the right people and does not offer a fair salary, those best suited for the role are unlikely to take the job.
- Comment on After an Arizona man was shot, an AI video of him addresses his killer in court 2 months ago:
It appears this was a Victim impact statement.
A victim impact statement is a written or oral statement made as part of the judicial legal process, which allows crime victims the opportunity to speak during the sentencing of the convicted person or at subsequent parole hearings.
From the article (emphasizes mine):
But the use of AI for a victim impact statement appears novel, according to Maura Grossman, a professor at the University of Waterloo who has studied the applications of AI in criminal and civil cases. She added, that she did not see any major legal or ethical issues in Pelkey’s case.
"Because this is in front of a judge, not a jury, and because the video wasn’t submitted as evidence per se, its impact is more limited," she told NPR via email.