planish

joined 2 years ago
[–] planish@sh.itjust.works 4 points 1 month ago (11 children)

Why would they design around evaporative cooling when water consumption is a problem?

[–] planish@sh.itjust.works 13 points 1 month ago (4 children)

Is it filled with the type of people that one might wish major governments could stop, though?

[–] planish@sh.itjust.works 2 points 1 month ago (1 children)

ZeroNet

What's up on ZeroNet these days?

[–] planish@sh.itjust.works 10 points 1 month ago

Capitalism runs on top of government. Governments create and enforce the notion that a human, or a fictional human with fractional ownership (corporation), can in turn own arbitrarily large and important objects.

This is often done at the behest of said arbitrarily-large-and-important-thing-owners, who also come up with other similarly terrible ideas to have the government do.

 

Apparently data centers routinely burn through water at a rate of about 1.9 liters per KWh of energy spent computing. Yet I can 🎮 HARDCORE GAME 🎮 on my hundreds-of-watts GPU for several hours, without pouring any of my Mountain Dew into the computer? Even if the PC is water cooled, the water cooling water stays in the computer, except for exceptional circumstances.

Meanwhile, water comes out of my A/C unit and makes the ground around it all muddy.

How am I running circles around the water efficiency of a huge AI data center, with an overall negative water consumption?

[–] planish@sh.itjust.works 2 points 1 month ago (1 children)

Probably not any existing systems; you can still finger and thus demand censorship from a block producer, and you end up with situations where you just can't host the chain anymore because it's full of pirated MP3s or whatever now.

And they introduce new problems around having to globally replicate everything and thus getting the net performance out of the system that you get from the worst server involved.

If you need to track some kind of root signing key for a whole p2p system, or something, maybe you can stuff it into Ethereum somewhere. But I don't think you can get very far trying to actually run a service out of a globally replicated database, and even then you'd have hundreds of operators in legal trouble rather than no operator.

[–] planish@sh.itjust.works 7 points 1 month ago* (last edited 1 month ago) (4 children)

Something like Tor only solves half the problem. A Tor hidden service still has physical reality and a person who is hosting it, and who can be held responsible for failing to register the thing with the feds or file a moderation transparency report or whatever the latest nonsense is. The anonymity network helps to hide where the equipment and who the operator is, but there's still a single point of failure and a person to blame for the community.

We need a way to run online communities that are not online services: no single point of failure, no individual or partnership describable as a service's operator, and no meaningful way in which one person provides access to the system to another person.

[–] planish@sh.itjust.works 4 points 1 month ago (1 children)
[–] planish@sh.itjust.works 3 points 2 months ago (1 children)

How did that happen?

[–] planish@sh.itjust.works 5 points 3 months ago (1 children)

Yeah, a TPM is, essentially, a piece of bondage gear. It's shackles put on you to try and convince someone else of what you can't do. It has niche applications but it's not a valid thing to require of the general population.

[–] planish@sh.itjust.works 43 points 3 months ago* (last edited 3 months ago)

Computers have systems (BIOS, EFI, ACPI) that give the people who make the machine responsibility for providing a standard, publicly-defined way for the OS to enumerate the hardware, and to use the hardware in a basic way even if the OS has never heard of it. Linux can get a kernel panic on the screen even if it has no idea what your GPU is, because EFI understands it and Linux understands EFI. It is set up this way partly because there's a real possibility of hardware being added or removed, partly because people routinely mix and match parts, and partly because IBM mistakenly designed a good system that was easy to work in and not one that kept them in business.

Phones (and phone-derived systems like the Raspberry Pi and other single-board computers) don't implement a standard. The hardware and its boot process assumes tight integration between the hardware and the software, usually to the point where the bootloader refuses to load anything not signed by the device manufacturer, unless it is satisfied that it has been given that manufacturer's permission to be unlocked. (Computer secure boot implementations generally trust, for example, Microsoft, as well as the machine owner, who can load their own keys.)

Instead of the CPU developers releasing example EFI implementations, they release forks of the Linux kernel that they maintain as long as that chip is the latest chip they sell, and then fork off the mainline kernel again for their next chip. And the device makers ship devices by starting with the chip maker's kernel, customizing it for the device, giving it a "device tree" that tells it everything that is supposed to be in that particular device, and shipping it. For a few years they port patches from the current kernel onto this forked kernel, and then they stop. With no standard to develop software against, and no documentation for what's in a device and how to use it like there is for the standard's interfaces, the only practical way to run software on a device is to start with that patched kernel.

Mainline Linux refuses to adopt and maintain the chip and device makers' low-quality, chip-and-board-specific kernel changes (often because they break the kernel for other uses), so you can't generally use a mainline Linux kernel instead. If you tried to tease out and improve the device-specific patches to the point where mainline Linux would take them, the device would be hopelessly outdated by the time you were done and you would have dozens of job offers to occupy your time as a highly skilled embedded Linux developer. The work is not practical given the tiny number of people who would benefit from it for a particular device, and how little it pays off compared to just buying a new device with a more up to date forked kernel available.

"Maintaining" a device for LineageOS or other open software eventually collapses under the weight of mainline Linux's changes and the necessary chip and device maker patches no longer being practically reconcileable.

[–] planish@sh.itjust.works 6 points 3 months ago (3 children)

I don't think this is going to change the overall situation, it's just a single point new system requirement, like the plausible GPU was for Vista.

Now, if they start expiring the old TPMs every few years, and Windows 12 needs a TPM 4.0 or something, then this will change the overall situation. At least on the Windows side.

[–] planish@sh.itjust.works 2 points 3 months ago

“hanging with the bad crow"

That's my favorite Sonic mission.

69
[POV] You are orb (assets.untappd.com)
 
 

Obviously it wouldn't be allowed in this community, but how feasible would it be to make a community on a friendly instance and start shipping data through it somehow? If it works for NNTP it ought to work for ActivityPub, right?

Potential problems:

  1. Community full of base64'd posts immediately gets blocked by everybody's home instance.
  2. Community host immediately gets sued for handing out data it might not have a license for.
  3. Other instances that carry the community immediately get sued (see #2).
  4. Community host is in the US and follows DMCA and deletes all the posts that are complained about.

Maybe it would work as a way to distribute NZBs or other things that are useful but not themselves copyrightable? But the problem with NZBs is you have to keep them away from the people who want to send DMCAs to the Usenet providers about them, or they stop working. So shipping them around in a basically public protocol like ActivityPub would not be good for them.

 

Steps to reproduce:

  1. Start a Node project that uses at least five direct dependencies.
  2. Leave it alone for three months.
  3. Come back and try to install it.

Something in the dependency tree will yell at you that it is deprecated or discontinued. That thing will not be one of your direct dependencies.

NPM will tell you that you have at least one security vulnerability. At least one of the vulnerabilities will be impossible to trigger in your particular application. At least one of the vulnerabilities will not be able to be fixed by updating the versions of your dependencies.

(I am sure I exaggerate, but not by much!)

Why is it like this? How many hours per week does this running-to-stay-in-place cost the average Node project? How many hours per week of developer time is the minimum viable Node project actually supposed to have available?

 

Through witchcraft and dark magic, Zig contains a C standard library and cross compiler for every architecture in 45 megabytes.

 

Julia Evans has done it again.

cross-posted from: https://derp.foo/post/88689

There is a discussion on Hacker News, but feel free to comment here as well.

 

Doesn't seem like that acronym is used for anything important at the moment, I'm sure we can grab it.

 

That's right folks, I want to see you post your... old dreams.

 
 

Many AI image generators, including the big UIs for Stable Diffusion, helpfully embed metadata in the images so that you can load them up again and get all the settings you need to regenerate the image.

But Lemmy's built-in pict-rs image hoster, and most image hosters that resize or re-encode images or that try and stop people from doxing themselves with photos' embedded GPS coordinates, will remove all the metadata. This is counter-productive for AI image generation, because part of the point of sharing the images is so other people can build on the prompts.

What are some good places to host images that don't strip metadata?

 

Most of the Lemmy instances seem to require an email to sign up. That's fine, except most of the places you would go to sign up for email want you to... already have an email. And often a phone number. And almost always a first name, last name, and birthday.

I promise not to do bad stuff, but I don't want that sort of information able to be publicly associated with my accounts where I write stuff, when everyone inevitably loses their databases to hackers. Pseudonymity is good, actually; on the Internet nobody knows you're a dog, etc.

Is anyone doing normal webmail registration anymore? Set username and password, receive email for free? I don't even need to send anything to sign up for accounts elsewhere.

1
submitted 2 years ago* (last edited 2 years ago) by planish@sh.itjust.works to c/main@sh.itjust.works
 

I managed to federate https://sh.itjust.works/c/dave_tv@dalek.zone/ and it gets the header and avatar but it doesn't seem to actually pick up any videos.

Maybe they're all too old or the wrong type.

view more: next ›