planish
@planish@sh.itjust.works
- Comment on Is there a real, actually working way to earn money online without having a job? 6 days ago:
You have methods that amount to making yourself an online job, or an offline job with a lot of online communication (independent software contractor, commission artist, author, sex worker, online course teacher, Etsy knit hat manufacturer, etc.).
You also have various flavors of capitalism, which may not count, as you did say “legitimate”. But if you already have ten million dollars, you can spend lots of time researching stocks and evaluating pitches for businesses and maybe get a better return than you would otherwise, all online.
And then you have merchanting, wholesaling, or furniture-flipping type approaches: buy stuff online, refurbish it or repackage it in smaller quantities, translate all its documentation correctly, vouch for its quality and fitness for purpose, take nice photos of it, market it, sell it, deliver it, and support it.
- Comment on Is it possible to host a lemmy instance over I2P? 2 weeks ago:
I don’t think ActivityPub is set up for one server storing and forwarding a whole feed of everything, like Usenet. Right?
- Comment on idk abbout this one discord 2 weeks ago:
It might work though. They keep making laws about using “commercial databases” but they never say you actually have to pay for them.
- Comment on What's the security situation when opening a jellyfin server up for casting? 2 weeks ago:
But you can, in fact, be too careful. Availability is one arm of the security triad.
If whatever complex configuration you have set up to avoid exposing something to the Internet is incompatible with something and what you wanted to do can’t be done, or if you look and see that setting all that up would be too hard and don’t bother to expose the service at all, then your security posture is incorrect because your service is just as unavailable as if someone else broke it.
- Comment on What's the security situation when opening a jellyfin server up for casting? 2 weeks ago:
That certainly sounds like a thing you would want, nay need, to fix.
- Comment on How I discovered a hidden microphone on a Chinese NanoKVM 2 weeks ago:
It could probably change the language selector.
If I’m an elite hacker spy who works for the hacker spy division of the Chinese army, am I going to change the system language of the thing I am hacking to Chinese and forget to change it back?
- Comment on How I discovered a hidden microphone on a Chinese NanoKVM 2 weeks ago:
Mostly so they could say they did.
- Comment on How I discovered a hidden microphone on a Chinese NanoKVM 2 weeks ago:
You don’t do the development on the board.
- Comment on I watch the first Star Trek Discovery episode, I didn't like it. 3 weeks ago:
The first like three or five episodes of Discovery are basically a different show than the rest . And a couple seasons in they change the whole premise and it’s a different show again.
- Comment on It's been a while, which Lemmy instances should I be on? 4 weeks ago:
I don’t think there can be that high a density of fascists. sh.itjust.works just voted overwhelmingly to defederate some kind of MAGA nonsense instance. Mostly it seems like nice folks overhere who know fascists are bad news.
It might be full of individualists with no grounding in Marxist theory, of the type that much annoyed Vladimir Lennin. I couldn’t tell you because of my poor grounding Marxist theory, and I don’t see that as a problem because of my individualism.
- Comment on Why do I always have "dreams" that give me anxiety (aka: nightmares)? Why do I never just get to re-live my happy memories in my dreams? Wtf brain?!? This is outrageous! It's unfair! 4 weeks ago:
I think it has something to do with your brain playing both sides of the dream. You are coming up with how to react, but you are also at the same time coming up with what happens next. So if you dream a lion and you are like “uhoh, what if the lion tried to chase me, that would be a problem, I’d have to run away,” then you’re now dreaming about a lion that is chasing you and how you are running away.
- Comment on The ancient Greeks or Chinese should have already had words for this. 4 weeks ago:
Wait you can not only in some sense see a-cat-on-your-hand when imagining that, but also see an imaginary cat on the hand you are actually seeing???
Do you then not see the stuff behind the cat while you are imaging the cat to be in the way???
- Comment on The ancient Greeks or Chinese should have already had words for this. 4 weeks ago:
I have a little more of the seeing, but I also want to reach for your ghost metaphor. Imagining a tree for me is a little like seeing a tree, but quite a bit more like having just seen a tree.
- Comment on The ancient Greeks or Chinese should have already had words for this. 4 weeks ago:
That’s what happens when you get character switched to.
- Comment on HP and Dell disable HEVC support built into their laptops’ CPUs 5 weeks ago:
Or plants. Or whether you should shout at people. Or sort of the concept of women.
- Comment on HP and Dell disable HEVC support built into their laptops’ CPUs 5 weeks ago:
Nah, that’s an NPU.
- Comment on New thing to ponder just dropped 5 weeks ago:
When this catches on the other meme will finally make sense.
- Comment on Screw it, I’m installing Linux 5 weeks ago:
The graphics stack is better, but the security isolation is IMHO solving a problem no one really had, at the cost of breaking a bunch of integration mechanisms people actually used.
You want UI security isolation for something like Android, where most software being run is fundamentally opposed to the interests of the user and wants to steal anything not nailed down, and you also contain things at the file system level. If Facebook could screenshot every other app all the time it absolutely would, and people would download it anyway. To some extent the enforceable promise that it can’t do that is why people are still willing to download it anyway and let it do all the other things it does to compromise a system.
In a distro shipping legitimate software, isolation at the desktop UI level is nice for defense in depth, but not really drawing a real security boundary around any program to the point where a user can trust a machine with malicious software running. It doesn’t matter if I can’t steal Firefox’s pixels if I can
echo “export PATH=$HOME/.evil-firefox/bin:$PATH” >>~/.bashrc. - Comment on Autograding tool 1 month ago:
Probably.
- Comment on Would you like to playtest a new indie game? Just completed first playable version of my psychological horror/moral choice simulation. 1 month ago:
Now I’m thinking with portals.
- Comment on Some People Can’t See Mental Images. The Consequences Are Profound 1 month ago:
Neither the ancient Greeks nor the ancient Chinese had video recording or even photography, which seems to be the metaphor that allows people to explain what they do or don’t have.
I must have relatively weak mental imagery? I can imagine seeing an apple, or recall the visual memory of my fruit bowl, but I’m hard-pressed to extract any definitive visual information from it, like I could if I really was looking at it. I’m visualizing the fruit bowl, but how many apples am I visualizing exactly? If I decide I’m visualizing two, now I’ve lost the relationship between the banana and the organge. It’s less like looking at a picture and more like dreaming of one.
- Comment on How Google Tracks and Scans Everything on Your Android Device 1 month ago:
I don’t think it is right to trivialize rape like that.
- Comment on How Google Tracks and Scans Everything on Your Android Device 1 month ago:
I don’t think the burden should be on users, but I do think some of the burden should be on the press. If the press just assumes Google is up to no good and never does the investigative reporting needed to show it, we will miss out on having very politically useful evidence.
- Comment on How Google Tracks and Scans Everything on Your Android Device 1 month ago:
Anytime I want cooperation I will need to persuade you.
That sounds suspiciously like democracy, the thing we would quite like to achieve.
- Comment on How Google Tracks and Scans Everything on Your Android Device 1 month ago:
But they aren’t even showing collection of data in the article. For the data to be collected, it needs to leave the phone, not just be touched by Play Services.
Play Services does collect data it shouldn’t collect, by sending it back to Google. But the difference between “I am collecting your data” and “I wrote software you are running” is important and needs defending, because obscuring it is one way that independent developers are prevented from publishing and marketing actually-privacy-preserving software. If I am deemed to have “collected” your personal data every time you type it into a text editor I wrote, I can no longer distinguish my local-only encrypted text editor from Google’s one that stores all your data unencrypted on their cloud. We both have to say we “collect” your data, and nobody non-technical can tell the difference.
- Comment on How Google Tracks and Scans Everything on Your Android Device 1 month ago:
You can buy a phone that arrives running GrapheneOS. This might not be advisable, because it adds another point of trust in the refurbisher who actually does the flashing, but you don’t need to have the skills or do the research to install it yourself to get access to a device that runs it.
- Comment on How Google Tracks and Scans Everything on Your Android Device 1 month ago:
It’s not that I want to give them the benefit of the doubt, it’s that the article neglects to bring in that whole thread of the argument that you give here. This should all be in the article.
- Comment on How Google Tracks and Scans Everything on Your Android Device 1 month ago:
The SensorVault data is “just” the Google Maps Timeline data though, right? Which people have always been able to turn on and off, if they knew about it.
I feel like Google not really respecting a concept of user consent and pretending people agree to poorly-publicized and often-modified tracking programs is a different, and, frankly, weirder, privacy problem than there being closed source stuff running with high permissions. If you could revoke permissions from Play Services, or if it was source available or even free software, that wouldn’t solve the problem because it would still be able to do stuff Google had manufactured consent for it to do.
- Comment on How Google Tracks and Scans Everything on Your Android Device 1 month ago:
Do you mean “transmits” as in “from the location service on the phone to the mapping app on the phone”?
Or do you mean the phones are all updating the wifi SSID geolocation database, which they then all can use for doing wifi-based geolocation?
- Comment on How Google Tracks and Scans Everything on Your Android Device 1 month ago:
The article seems to go directly from “this piece of software talks to all the sensors and isn’t well sandboxed” to “Google has directed this software to profile and surveil users” without actually providing evidence to support that leap. Is Google Play Services sampling your location so that it can send it in to Google HQ, or so that it can detect if the device has been stolen by the cops and activate anti-theft mode to protect the user’s privacy?
If we can actually show mismanagement of user data by Google Play Services, we need to shout it to the hills, because those sorts of scandals are important arguments for increased privacy protections. But we need to actually find that mismanagement occurring, not just assume it must be because Google wrote the code and it isn’t open source.