jim3692
@jim3692@discuss.online
- Comment on Doctors are using unapproved AI software to record patient meetings, investigation reveals 1 day ago:
Your therapist can’t even have a phone in the room?
I would prefer my psychological issues to not be turned into marketing campaigns. If you still don’t understand what I am talking about, you should probably check the Privacy Policy of Google and Meta.
To save you some time: Google and Meta are monitoring the conversations using the device’s microphone, to better understand what products you may be interested in. You have noticed, that ads are often related to the topics that you discuss face to face.
- Comment on Doctors are using unapproved AI software to record patient meetings, investigation reveals 1 day ago:
I had visited an ophthalmologist who used Apple Notes to keep track of his patients. He had no idea about the privacy implications of his choices.
However, my most nerve racking experience was talking to my therapist, while their stock Android was right next to them. Even when I mentioned my privacy concerns, they didn’t bother to rid of it.
- Comment on It is what it is 2 days ago:
I use private, because I am a tab hoarder
- Comment on Best way to "give notice" that you are resigning 2 days ago:
Sorry for your “| || || |_”
- Comment on A 3-tonne, $1.5 billion satellite to watch Earth’s every move is set to launch this week 1 week ago:
Don’t such satellites have a major flaw, that they revolve? Considering that earth is spherical, those satellites can only monitor some half of the earth each moment, given their sensors have such high FOV.
- Comment on Bonfire & Guix, a love story -- fishinthecalculator 1 week ago:
It’s the first time I see the concept of bootstrappability in the context of security.
Is it really worth the effort?
There are multiple ways to run a supply chain attack. With bootstrappability, one can be sure that the compiler is trusted, but what about the code that the compiler compiles? There was this recent attack to XZ utils, which shows that more attention is needed on the code being merged and compiled.
I think that this just creates a false sense of security.
Contrary to that, I had read about a BSD team (I think FreeBSD) that reviews all the code before each release. This way they have achieved ~5 RCE exploits throughout their entire history.
- Comment on Bonfire & Guix, a love story -- fishinthecalculator 1 week ago:
I don’t have any experience with guix, so I will not express any opinions towards that.
However, regarding NixOS:
- Yes, as a person with experience in the Nix language, I can confirm it’s awful
- The documentation of NixOS is a known issue, and there are currently efforts to improve it
- Talking about the trustability of binaries, by doing a quick search, I read that Guix builds are reproducible. This is true for NixOS as well. All upstreamed packages must have their version and the hash of the code (or artifact), to allow validation.
- The community of NixOS is opting to maintaining flakes, because:
- Some applications can simply not be built following the Nix guidelines. Examples are some electron apps (like Falkor) and apps that have weird toolchains (like bubblejail)
- The reviewing process takes way too long, and PRs for upstreaming are often ignored. This forces a lot of people to just PR a flake.nix to the application, or maintain their own overlays (overlays are like overriding the available packages, while flakes are more like distributing Nix code in general)
- Comment on Bonfire & Guix, a love story -- fishinthecalculator 1 week ago:
I quickly went through the article, and I have a question: Why not Docker (or Podman) on NixOS?
NixOS has much larger community (although a bit toxic) and provides native tooling for managing OCI containers through Docker and Podman.
- Comment on YouTube rolls out more unskippable ads that make viewers wait even longer to watch videos - Dexerto 1 week ago:
What would happen if all users start using adblockers, or the value of ads starts to fall?
I do not support the current, ad-driven, model of the internet. However, since the costs of subscriptions are increasing, while salaries are going downhill, it is apparent that ads is (seemingly) the only viable choice for now.
In the economy we currently live in, all of world’s wealth is slowly moving to ad networks.
Even donation driven models are currently straggling. Just look at the fediverse. The people donating to their instances are not enough to sustain them.
Capitalism has absolutely destroyed everything. The greed of stakeholders has milked most people. At some point people will stop buying the useless things or services promoted via advertisements, just because they will not be able to afford them. Then, no subscriptions, no point of advertising, no donators, no people hosting fediverse instances, just world hunger.
- Comment on YouTube rolls out more unskippable ads that make viewers wait even longer to watch videos - Dexerto 1 week ago:
NewPipe or Piped
- Comment on A man attempted to transfer files from his Commodore 64 to his Apple computer. 1984 1 week ago:
Judging by the colors, this is a new photo. It’s not yellow.
- Comment on Has Slavic engineering gone too far? 2 weeks ago:
So, you guys have never lived to badly designed apartment, because you couldn’t afford a better one.
I have been living like this in Greece for about 3 years.
- Comment on Front Brake Lights Could Drastically Diminish Road Accident Rates 2 weeks ago:
BMWs need a speeding indication more than a braking one /s
- Comment on I've got something special for you 2 weeks ago:
Could have avoided “!” altogether, and send “For you I have 720”
- Submitted 2 weeks ago to technology@lemmy.world | 2 comments
- Comment on Who did this 😂😂😂 2 weeks ago:
You can install and run v3.1 in DosBox. In case anyone wanted to keep using it.
- Comment on Pixelfed Uptick in Monthly Active Users 3 weeks ago:
Don’t worry much about my cat. I will totally respect any decision.
- Comment on In North Korea, your phone secretly takes screenshots every 5 minutes for government surveillance 3 weeks ago:
Sure, those could theoretically be used for backdoor access to your computer.
However, they are trivial to spot on most routers. If you see another device on the ethernet port that your computer connects to, then something weird is going on.
Another important consideration is the fact that those technologies are meant for ethernet, while most people use laptops with wifi.
- Comment on Pixelfed Uptick in Monthly Active Users 3 weeks ago:
I am so sorry to hear that. I run the Margit profile in your instance, but I wasn’t aware of your plans to shut it down.
- Comment on Forced E-Waste PCs And The Case Of Windows 11’s Trusted Platform 3 weeks ago:
There is no particular selling point. That’s why they force it.
- Comment on minor tomfoolery 🛻💨🎶 3 weeks ago:
It’s very handy that some clients embed the harmonica photos and I don’t need to open URLs
- Comment on Let's play this game again 4 weeks ago:
Do I have a cooldown, or can I just start repeatedly teleporting inside my basement?
- Comment on Let's play this game again 4 weeks ago:
So, it’s like the Pipe in Mario Party ?
- Comment on Trump says a 25% tariff "must be paid by Apple" on iPhones not made in the US, says he told Tim Cook long ago that iPhones sold in the US must be made in the US 4 weeks ago:
He’s actually cooking apple pies. Or is it called baking? Is it Tim Bake?
- Comment on Oh god 1 month ago:
- Comment on The Beauty Of Having A Pi-hole · Den Delimarsky 1 month ago:
Sure, if your router supports DoH or DoT. Most consumer routers don’t. I know that Mikrotik supports it out of the box, and OpenWRT has a package for that.
- Comment on At this point I think I would 2 months ago:
Bruuuhh!!! I usually just press deny all, without reading.
- Comment on EU: These are scary times – let's backdoor encryption! 2 months ago:
Would hosting in Albania be a solution? It’s in the Europe continent, but it’s not a member of European Union. UK is also fighting encrypted communications.
- Comment on At this point I think I would 2 months ago:
- Comment on EU: These are scary times – let's backdoor encryption! 2 months ago:
My question is: even if EU manages to apply laws for backdooring encryption, wouldn’t cybercriminals just use different tools? They may force Signal to backdoor its encryption, but what about Briar? Will they backdoor the Tor network? Will they ban it entirely? What about Matrix? They can’t prevent offshore encrypted instances.