maxwellfire
@maxwellfire@lemmy.world
- Comment on it's a long distance relationship 2 weeks ago:
The whole idea is that the quantum particle can’t have had the state you’re measuring all along. If it did, then measuring a particular set of outcomes would be improbable. If you run an experiment millions of times, you have a choice in how you do the final measurement each time. What you find with quantum particles is that the measurements of the two different particles are more correlated than they should be able to if they had determined an answer (state) in advance.
You can resolve this 3 ways:
1: you got extremely unlucky with your choice of measurement in each experiment lining up with the hidden/fixed state of each particle in such a way as to screw with your results. If you do the experiment millions of times, the probability of this happening randomly can be made arbitrarily small. So then, the universe must be colluding to give you a non uniform distribution of hidden states that perfectly mess with your currently chosen experiment
2: the particles transfer information to each other faster than the speed of light
3: there is no hidden state that the particle has that determines how it will be measured in any particular experiment
See quantamagazine.org/how-bells-theorem-proved-spook… for a short explanation of what ‘more correlated than expected’ means
- Comment on God ****** dammit, here we go again 3 months ago:
More details about the k-anonimity process. blog.cloudflare.com/validating-leaked-passwords-w…
- Comment on It's true... 4 months ago:
That implies to me that surgeons aren’t training on heavier people though which seems bad
- Comment on Is it possible to make WoL unicast work indefinitely? 5 months ago:
Why shutdown the homelab in the first place? Are you trying to save on power consumption?
- Comment on xkcd #3144: Phase Changes 5 months ago:
- Comment on Is there no good inexpensive CAD software? 5 months ago:
- Comment on The Future is NOT Self-Hosted 7 months ago:
There’s so much to host that isn’t related to pirated media sharing though. I host like 5 services and only one could be related to that
- Comment on What are your VPN recommendations for accessing self-hosted applications from the outside? 7 months ago:
Yeah it’s worked everywhere I’ve tested. But that’s only really been airport WiFi, so I’m not sure it’s indicative of it working in general. It’s easy enough to setup for testing that it’s probably worth a shot
- Comment on What are your VPN recommendations for accessing self-hosted applications from the outside? 7 months ago:
I like zerotier over wireguard because it’s one layer lower. So anything that uses Ethernet frames can be routed over it like it was a network switch plugged into your computer
- Comment on Finally a solution to the Königsberg Bridge problem. 7 months ago:
That would make the earth a donut lol and would work!
- Comment on Finally a solution to the Königsberg Bridge problem. 7 months ago:
You run into it on the planet backside and then need another bridge, right?
- Comment on Finally a solution to the Königsberg Bridge problem. 7 months ago:
A problem with this is that the river presumably goes all the way around the earth. Otherwise you could just travel west until you found its end. You really need a donut shaped earth, a sphere doesn’t help much
- Comment on Mastodon updates terms of service to ban AI model training on user data 8 months ago:
I still don’t think this is correct for two reasons. 1: I believe the DMCA and friends count as copyright law. 2: just reading the text of the law (#17 U.S. Code § 106):
Subject to sections 107 through 122, the owner of copyright under this title has the exclusive rights to do and to authorize any of the following:
(1) to reproduce the copyrighted work in copies or phonorecords;
(2) to prepare derivative works based upon the copyrighted work;
(3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending;
(4) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly;
(5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly; and
(6) in the case of sound recordings, to perform the copyrighted work publicly by means of
It seems pretty clear that only the copyright owner has the rights to make copies, subject to a number of exemption.
Now IANAL so I could be missing something pretty huge, but my understanding was that this right to make copies (especially physical ones for physical media) is at the core of copyright law. Not just the distribution of those copies (which is captured by right 3)
- Comment on Mastodon updates terms of service to ban AI model training on user data 8 months ago:
I don’t think this is true. While copying might fall under fair use if used for some purpose, you definitely can get in trouble for copying even without distributing those copies.
- Comment on Can't get DNS to work on web server 8 months ago:
In that case it’s highly unlikely your problem is with DNS. And much more likely it’s a problem with the actual connection to the server. If you are willing to share the IP/domain I can help troubleshoot (either here or in a DM).
- Comment on Can't get DNS to work on web server 8 months ago:
If you do a DNS lookup (through
nslookupor many other tools) on the client you’re using to connect, does it get the right IP back? - Comment on First server: Buying hardware in a developing country 8 months ago:
Sorry I completely misread your comment to be saying that the maximum efficiency was 50% not that it occurred at 50%.
- Comment on First server: Buying hardware in a developing country 8 months ago:
I believe for the highest efficiency you only want to use about half of the rated power of the PSU. So if your system draws 350W, 700 is a very reasonable power supply
- Comment on Considering the old model is made with shrink-wrapping this is viable option 8 months ago:
How does paleo art work now? What’s done differently?
- Comment on [deleted] 9 months ago:
By default, an enencrypted boot drive is not sufficient to be able to decrypt a LUKs drive. If you have to type in your password to start the computer/unlock LUKs then you should be good.
If you’ve setup a keyfile or TPM based decryption of LUKS, then your data is probably not safe (though a TPM based decryption could be if the OS is secure and secure boot is setup properly)
In this case, if you have another server then you could setup a mutual tang/clevis system where each device gets the keys it needs from the other server on the LAN. Both would be LUKs encrypted. So if one is online the other gets the required key from the online one while booting. But if both are offline then no keys are available and you have to type in a LUKS password to boot. Something like ogselfhosting.com/…/tang-clevis-for-a-luks-encryp… but what they do with multiple servers is probably overkill
- Comment on “No Apple tax means we will lower prices” - Proton announces lower prices for users by up to 30% after US ruling against Apple fees 9 months ago:
That’s probably only for selling steam keys on another store. You might be able to sell non steam versions for any price you want
- Comment on The FBI launched a special task force targeting anti-Tesla ‘domestic terrorism’ 9 months ago:
The original is something like “it’s all Ohio” “always has been”. The globe shown is just a large landmass that looks like Ohio. They’re probably astronauts since you’d have to be in space to see it. The astronaut killing the other has the Ohio flag on them and is killing them for knowing too much.
- Comment on Windows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technica 9 months ago:
If there’s a 0 day in the VPN software then I’m also probably boned. The chances of that seem on par with the likelihood of an openssh vulnerability? I feel like vpns are useful to secure services without good authentication, but their use in front of an openssh server had never made much sense to me.
- Comment on Bluesky has started honoring takedown requests from Turkish government 10 months ago:
It’s pretty trivial for them to block all major instances though, or even all instances federated with all major instances
- Comment on (Troubleshooting) Advice for improvement 11 months ago:
In addition to what dual_sport_dork said, it looks like you’re overextruding a bit, which might be causing the head to run into the curling up regions
- Comment on Rust is Eating JavaScript 1 year ago:
This is what I’ve been going through, sold as teaching rust to people who already know other languages. I’m not very far in at all, but it seems decent? google.github.io/comprehensive-rust/
- Comment on brick layer printing strength analysis by my tech fun 1 year ago:
It looks like this was testing in tension? I image most of the improvements would happen in shear. Since that’s where you make the crack more tortuous. In tension the increase in contact is very slight.
- Comment on Could anyone recommend me a self-hosteable TinkerCAD equivalent? 1 year ago:
What about solvespace web build: github.com/solvespace/solvespace/tree/emscripten#…
- Comment on Chaining routers and GUA IPv6 addresses 1 year ago:
Yeah openwrt should be great. It uses nftables as a firewall on a Linux distribution. You can configure it through a pretty nice ui, but you also have ssh access to configure everything directly if you want.
The challenge is going to be what the ISP router supports. If it supports bridge mode then things are easy. You just put your router downstream of it and pretend like it’s a modem. Then you configure openwrt like it’s the only router in the network.
If you don’t have bridge mode then things are harder. There’s some helpful information here forum.openwrt.org/t/…/19 even though the situation is slightly different since they also don’t want a firewall. But you probably need to configure your upstream side on the openwrt router similarly.
- Comment on Chaining routers and GUA IPv6 addresses 1 year ago:
I’d recommend something that you can put openwrt or opnsense/pfsense on. I think the tplink archers support openwrt at least.
The ISP router opening things at a port level instead of a host level is kinda insane. Do they only support port forwarding? Or when you open a port range can you actually send packets from the WAN to any LAN address at that port.
Can you just buy your own modem, and then also use your own router? (If the reason you need the ISP router is that it also acts as a modem).
Does the ISP router also provide your WiFi? If it does you should definitely go with a second router/access point and then disable the one on the ISP router.