I’m coming up with “agent noun”
https://en.wikipedia.org/wiki/Agent_noun#Words_related_to_agent_noun
I’m coming up with “agent noun”
https://en.wikipedia.org/wiki/Agent_noun#Words_related_to_agent_noun
Using dd to move-resize a partition by writing down the cylinder numbers and moving it piece by piece like some Tower of Hanoi. Wanted to add more space to my root after deleting the Windows partition, which happened to be first. There is apparently no built-in command to do that.
Booted up fingers crossed and everything worked.
This is literally that scene from Schindler’s List where the Commandant sits on the balcony and snipes any prisoner below who isn’t laboring fast enough. And for years they were saying this was unrealistic and such crass cruelty could not have happened!
This. Full disk encryption worked on Linux long before TPM, and works perfectly fine now still. TPM to me seems only additionally effective in a narrow range of “evil maid” attack scenarios where your (unencrypted, unsigned) bootloader is modified at rest, such as to steal your disk encryption key later. However A) I cannot afford to hire a maid, let alone one also skilled in editing Linux initramfs images and B) I don’t see TPM evangelists check their keyboard USB cable for in-line hardware sniffers every single time they step away from their desk.
Good question to ask! I had short hair then, which is why it worked. Have long hair now and could not get away with it again - start feeling too greasy after a week, and I like my hair silky with conditioner.
6 months, during high school over the winter. Shower was broken (water would only come out perfectly hot or cold, nothing in between) and parents/landlord would not fix it. I kinda just gave up on it. Nothing bad came out of it. Nobody at home or at school ever said anything or even noticed, as far as I could tell. No, they were not just being polite. I watched everyone closely, as much as an experiment of personal curiosity as anything else, and there were no signs of disapproval, nobody had a clue. I suffered no social consequences whatsoever. Wearing a new set of clothes every day alone was sufficient to stay clean.
Can’t decide whether I just have one of those Asian genes that make you not smell, or whether Americans as a culture are psychotically brainwashed by soap companies’ propaganda to the point where even the idea of “spending more than 1 day away from shower” is worse than death for them. Never used deodorant either (other than to try it out - just makes me feel gross, sticky, and smelly). Imagine how much money those deodorant companies are missing out on me over a lifetime!
I know Lemmy hates AI, but this actually would be a perfect use for it. The problem is the idea of what an ad is. Yes, you could try to use secondary characteristics like image color or sound normalized volume (WhyTF do youtube ads still sound 3x louder than content? are we living in cable era again?), but they would be error-prone for any content more visually intense than a podcast. They would also not capture sponsorblock content like “I love showing you all these foreign countries but what I love even more is having my internet connection secure” that match the video flow. A crowdsourced lookup table of all known ad clip fingerprints would go a long way, until ad videos themselves start being AI-generated on the fly for that sweet personalization revenue.
No, what I really want is to distill the idea of what I want to see into an AI and have it filter out what I don’t want to see for me. I know an ad when I see one, so AI can too. Pre-roll/mid-roll ads? Gone. Sponsorblock content? Gone. Like and subscribe? Skipped as if it didn’t exist. Virtual billboards on the sidelines of sporting events? Overlayed with kittens. Idiocracy banners squeezing the video from either side? Cropped and rescaled. Watermarks? Excised and content-aware-filled.
The last frontier is when the content itself is secretly an ad, imprinting upon you some idea or point of view. You’ll have to watch out for that one on your own.
In the ultimate, you’d need to do something like run a headless browser in a virtual machine, have it play out and record the entire video, then use something like AI to splice out the ad segments and distracting elements (a souped-up sponsorblock will work for a while, but eventually ads will be injected into the raw video stream at random intervals), and present the pristine finished content to you. Basically we are going to re-invent TiVo all over again xD.
In worst case, you can’t start watching until the pre-roll ad timers expire. This is how adblocking works on Twitch streams currently - you can only see a purple screen even if you block the ads.
And yes, the headless browser will need to use AI for human-like mouse movement and to solve captchas - basically whatever state-of-the-art technologies spammers and scrapers are already currently using.
Google is anticipating this future and is trying to implement and force hardware-based DRM for web video before then.
Stripping down to a skeleton of a software is standard troubleshooting procedure. Ever had a plugin crash and consume 100% cpu? I had. Only way to sense is that fans are spinning up and page is laggy, and then look in about:performance and there it is. No one would have ever suspected that the website you’re visiting is deliberately introducing bugs in secret if it thinks you’re adblocking.
It’s a tarpit. If they simply displayed a blocked “no vids for u” message, you’d get outraged, go complain online, look for workarounds, and eventually find a bypass. If everything still works but poorly, you get annoyed, turn off your adblocker to troubleshoot, possibly blame the adblocker for being “buggy” and keep it off. Their help page solution implies they are hoping for just that. There is no “smoking gun” blocked message to go complain online about, even though it is indeed their servers that are degrading your connection on purpose in secret. Or maybe you give up and leave their ecosystem entirely, which is no big loss for them.
The proper solution is to develop an adblock that they cannot detect is blocking ads. This may require actually downloading the ad video in background, and then lying that the video has played.
it might detect those elevated stress levels [for callers] and it will automatically default going to a human being
Damn. I get ice cold emotionless during an emergency, going straight to the point of reciting location and event when calling 911. Now I will have to also remember in the back of my mind to throw in a wavering voice and a couple of shrieks maybe to have my call routed properly. What a future.
Airplane mode on Apple has two sub-toggles: wifi and bluetooth (the main toggle controls the cellular antenna). With all three toggled off, find-my does not work. The device just shows up as “offline, location unknown, last seen at…” on the map. Something to watch out for though: for some reason Apple will turn bluetooth back on after a couple days without asking, even with airplane still on. Also, an app running in background could in theory record the GPS coordinates and transmit them to home server once connection is reestablished.
Then you’d be surprised when you calculate the numbers!
A Falcon 9 delivers 13100kg to LEO and has 395,700kg propellant in 1st stage and 92,670kg in 2nd stage. Propellant in both is LOX/RP-1. RP-1 is basically long chains of CH2, so together they burn as:
3 O2 (3x32) + 2 CH2 (2x14) -> 2 CO2 (2x44) + 2 H2O (2x18)
Which is 2*44/(2*44+2*18) =
71% CO2. Meaning each launch makes (395700+92670)*.71 =
347 tons CO2 or 347/13.1 =
26.5 tons of CO2 per ton to orbit. A lot of it is burned in space, but I’m guessing the exhaust gases don’t reach escape velocity so they all end up in the atmosphere anyway.
As for how much a compute satellite weighs, there is a wider range of possibilities, since they don’t exist yet. This is China launching a test version of one, but it’s not yet an artifact optimized for compute per watt per kilogram that we’d imagine a supercomputer to be.
I like to imagine something like a gaming PC strapped to a portable solar panel, a true cubesat :). On online shopping I currently see a fancy gaming PC at 12.7kg with 650W, and a 600W solar panel at 12.5kg. Strap them together with duct tape, and it’s 1000/(12.7+12.5)*600 =
24kW of compute power per ton to orbit.
Something more real life is the ISS support truss. STS-119 delivered and installed S6 truss on the ISS. The 14,088kg payload included solar panels, batteries, and truss superstructure, supplying last 25% of station’s power, or 30kW. Say, double that to strap server-grade hardware and cooling on it. That’s 1000*30/(2*14088) =
1.1kW of compute per ton to orbit. A 500kg 1kW server is overkilling it, but we are being conservative here.
In my past post I’ve calculated that fossil fuel electricity on Earth makes 296g CO2 per 1 kilowatthour (using gas turbine at 60% efficiency burning 891kJ/mol methane into 1 mol CO2: 1kJ/s * 3600s / 0.6 eff / (891kJ/mol) * 44g/mol =
296g, as is the case where I live).
The CO2 payback time for a ton of duct taped gamer PC is 1000kg * 26.5kg CO2/kg / ( 24kW * 0.296kg/kW/hour) / (24*365) =
0.43 years. The CO2 payback time for a steel truss monstrosity is `1000kg * 26.5kg/kg / (1.1kW * 0.296kg/kW/hour) / (24*365) = 9.3 years.
Hey, I was pretty close!
A solar-powered computer in space could recoup the CO2 cost of its launch fuel over its lifecycle (say 10 years?) when compared to coal-fueled electricity on the ground. After that it’s free. Of course, you’d benefit more by filling up every available spot on the ground with solar arrays first! But you will eventually run out, or you might not want to do that.
If you have a megawatt solar array, you can also afford a megawatt cooling array. The size is comparable.
12:30 AM GMT 🤡
Use wireshark and listen on your ethernet interface. When you use tailscale, are the packets coming in/out from the tailscale server IP or the VPN ip? Check through the ip route
routing table and figure out which pathway a packet will take in each use case. Might need to add a route exception specifically for the tailscale server IP to go out on the ethernet device.
PostUp = ip route add 100.64.0.0/10 dev tailscale0
Looks like you need to stick this line in the tailscale service file, since it’s the only time that the existence of the tailscale0 device is guaranteed. If you don’t want to modify the service file inside the package, could you write your own systemd service file and include the tailscale service as a prerequisite?
Also make sure that when you start the VPN first and then tailscale, you don’t get a double tunnel situation where tailscale goes out through the VPN (unless that’s what you wanted).
The exact script would depend on the use case; you’d use commands something like this:
mkdir -p /etc/netns/VPN
sh -c 'echo nameserver 1.1.1.1 > /etc/netns/VPN/resolv.conf'
ip netns add VPN
ip link add tun1 type wireguard
ip link set tun1 netns VPN
Because the wireguard device was created in the default namespace, it will “magically” remember its birthplace, even after you move its mouth (the tun1 device) to a separate namespace. The envelope VPN packets will keep going in/out in the default namespace.
ip netns exec VPN wg setconf tun1 /etc/wireguard/vpn.conf
ip netns exec VPN wg set tun1 private-key /etc/wireguard/vpn-key.private
ip -n VPN addr add 192.my.peer.ip/32 dev tun1
Get the wireguard config file from the VPN website, both mullvad and OVPN have a wizard to generate them. Your assigned private network ip is in the config file. Also get and save your device key.
ip -n VPN link set tun1 mtu 1420
ip -n VPN link set tun1 up
ip -n VPN route add default dev tun1
ip netns exec VPN su myuser -c 'firefox --no-remote'
Now all firefox (and only that firefox) traffic will go through the tunnel. Firefox has its own DNS, if you run another app it will use 1.1.1.1.
I actually do the reverse of this - I create a namespace ETH and move my eth0 device in there and attach dhcpcd to it. Then I create the wireguard tun1 device inside ETH namespace, and move tun1 to the default namespace. Then any software I run can only use the tunnel, because the ethernet device doesn’t even exist there. This keeps the routing table simple and avoids a whole class of issues and potential deanonymization exploits with the split routing table used in traditional single-namespace VPN configurations.
In theory, the rich can just continue paying off each other spending money on rich people stuff. 80% of the economy consisting of activities like robot-staffed billionaire-owned construction companies making and selling super-yachts to oil billionaires, who made their fortune selling fuel to space tourism companies ferrying billionaire designer bag heiresses to the Moon. The rest of us can starve to death and the economy won’t even blink.