• 0 Posts
  • 17 Comments
Joined 9 months ago
cake
Cake day: April 7th, 2025

help-circle

  • I do all the time as well. Has changed my life in a very useful way. But as you said, knowing what it’s place is, how to use it, and what it’s limitations are (as well as my own) are key. I have solved many many problems I’ve been working on for years on in the digital world.

    I also sympathize with the AI hate, and really struggle with the energy usage as well as the bubble. It has power and capability, but not what the “public” think it does.

    I just deal with the online hate as it’s not shit people says to my face, and it’s driven of ignorance like much is these days.

    And as you said there are development in the pipe which will further change our lives. Knowing how it works and why, as in using the critical thinking in synthesis with an LLM and what comes next is going to be valuable.



  • Even though its data would be stored in Google and Amazon’s newly built Israel-based datacentres, Israeli officials feared developments in US and European laws could create more direct routes for law enforcement agencies to obtain it via direct requests or court-issued subpoenas.

    An aerial view of a five very long, two-story buildings alongside what looks like a human-made lake.

    With this threat in mind, Israeli officials inserted into the Nimbus deal a requirement for the companies to a send coded message – a “wink” – to its government, revealing the identity of the country they had been compelled to hand over Israeli data to, but were gagged from saying so.

    Leaked documents from Israel’s finance ministry, which include a finalised version of the Nimbus agreement, suggest the secret code would take the form of payments – referred to as “special compensation” – made by the companies to the Israeli government.

    According to the documents, the payments must be made “within 24 hours of the information being transferred” and correspond to the telephone dialing code of the foreign country, amounting to sums between 1,000 and 9,999 shekels.

    Under the terms of the deal, the mechanism works like this:

    If either Google or Amazon provides information to authorities in the US, where the dialing code is +1, and they are prevented from disclosing their cooperation, they must send the Israeli government 1,000 shekels.

    If, for example, the companies receive a request for Israeli data from authorities in Italy, where the dialing code is +39, they must send 3,900 shekels.

    If the companies conclude the terms of a gag order prevent them from even signaling which country has received the data, there is a backstop: the companies must pay 100,000 shekels ($30,000) to the Israeli government.



  • While I get the sentiment, I think you are missing the two pieces here. One is that advertising is not the only method of monetization which can support something like Firefox. The second is that advertising is by it’s nature influence. Both in influence over the purchaser and reader. It’s an influence we should not approve of in both cases, without better boundaries.



  • She’s awesome!

    “Yes, I remember very clearly reading it, finishing it, and going… ‘That’s ridiculous. I’ve got to call the producer.’ What is it doing this to this woman who’s a high ranking officer—for years all the women in her family on this planet have been in love with a lamp? And the thing was, I know that the writer wanted me to have a romantic episode. It was a little more than romance, if you know what I mean. So I’m like, ‘Really, I have to do a ghost orgasm on—okay, all right.'”

    “But you know what? Now, I love it because it’s such a cult thing, and I think it’s hilarious. So here’s the thing, don’t get too excited, BUT… Nacelle is coming out with a Sub Rosa—a Beverly Crusher action figure in the pink nightgown, okay, with lots of accoutrement, and that’s, you know, things. And so we have a lamp, we have different things, so it should be quite an interesting kind of an ACTION figure, okay? So be careful. Don’t use it–well… you can use it alone. But so is it really wild that after all these years… at first was like, I was like, I’m so embarrassed. Patrick couldn’t believe it, you know me and the nightgown, I mean the whole thing. And now? I love it. So there you go. You never should say never, because you sometimes are wrong.”

    One fan told McFadden that watching “The Host” as a child was “remarkable,” as a story like that was not the norm on TV. The actress was eager to talk about the season 4 episode, which introduced an early version of the Trill species to the franchise. McFadden relished the opportunity to explore new territory in the story pitched by Michel Horvat (and the teleplay heavily rewritten by Jeri Taylor):

    “I thought it was the first gay writer, openly gay writer, that we had used their script on the show. And I thought was a brilliant script. From the first time I read it, I thought, this is extraordinary. He’s asking what is the nature of love? How much is physical, how much is experiential… What is love? And that’s a great question to ask, a hard question to answer.”

    “When I did the surgery and pulled out this… It did look like a scrotum, guys. Honestly, the male producers are really doing this to get to me. It could have looked sweet, right? It could have been sweet, right? So this is what I’m in love with, thank you so much. Then it’s Jonathan [Frakes], you know, it’s like all this is happening within a 24-hour period. And it turns out it goes into a woman. “

    “It forced you to think, what is, what is love? I mean, it actually got you to think about it, things that you might not normally thought about in the same way. And I got some people—when I used to be on Twitter, I’m not now—but when I was on Twitter, they were, ‘Well, that was so anti-gay. She didn’t sleep with the woman.’ And I’m like, ‘Dude, in 24 hours she’s been with that. She’s seen this scrotum sack. I think it’s enough for one day, you know? Like, let’s give her a break.’ And I feel that way. I feel it had nothing to do with that, and that wasn’t the purpose of it. It wasn’t like saying this is what you should do. And I thought she handled it very nicely. She said, ‘I’m just not ready.’ And that’s that’s perfectly reasonable as far as I’m concerned.”



  • As an old IT guy I empathize with the control of data. I have my array of self-hosted servers and love my CLI.

    With that said, the older I get the less patience I have for hacking it together and supporting it. I still prefer privacy, and indeed Firecore Infuse is “Private by design” by their own statement. It’s not open source and I am not clear if it’s audited, but for as long as it lasts I’m happy friends and family less technically inclined have a simple easy familiar interface which I don’t have to support.

    I will say I’m impressed A Pi4 works so well for jellyfin streaming. I guess it’s not transcoding, so it’s just a database and file share.


  • VLC is a great way to work with AppleTV, if you are willing to trade a few more clicks and less meta data for being free. It is by far the gold standard of being able to play anything.

    The file format issue, plus the simple interface (especially for older less technically inclined) makes infuse worth the $100 lifetime cost (especially with family sharing).

    What hardware are you using for your LibreELEC? Pi 3,4,5? With an external drive?


  • Self-hosted is not a way to make things free. Just lower cost than subscriptions overall. Using the full *Arr suite, with Usenet, your own hardware, and client boxes gives the users better control of the content they watch, but requires a nominal input of users time (plus some technical expertise), as well as an investment of some money both one time and annually.

    Infuse’s lifetime time cost, when viewed in light of the total reduction of subscription cost (and an improved control of content) is worth it. I would definitely not pay a monthly amount to infuse, although it’s possible.

    So far as Jellyfin’s app… As its free, I have low expectations. They fact that the developers have paid Apple for the SDK and put it as a free app on Apple TV and iOS is incredibly kind of them. They have a fair amount of code to look after and open source developers rarely get enough love or money.




  • Some relevant quotes to summarize:

    But the videos weren’t clear enough to identify the exact make or model of the dark four-door sedan. The detectives quickly obtained what are known as tower dump warrants, which required the major phone networks to provide the numbers of all cellular devices in the vicinity of 5312 Truckee during the arson. And they slung a series of so-called geofence warrants at Google, asking the company to identify all devices within a defined area just before the fire. (At the time, Google collected and retained location data if someone had an Android device or any Google applications on their cell phone.)

    There were 1,471 devices registered to T-Mobile within a mile of the house when it ignited. Using software that visualizes how long it takes a signal to bounce from a cell tower to a phone and back again, Sonnendecker narrowed the list down to the 100 devices nearest to the house. One evening toward the end of August, detectives roamed the area around 5312 Truckee with a cell-phone-tower simulator that captured the IDs of all devices within range. That night, there were 723. Sonnendecker cross-referenced these with the 100 from earlier, eliminating the 67 that showed up on both lists and likely belonged to neighborhood residents who could be ruled out. That left 33 T-Mobile subscribers whose presence in Green Valley Ranch in the early hours of August 5 couldn’t easily be explained.

    That’s when another detective wondered if the perpetrators had Googled the address before heading there. Perhaps Google had a record of that search?

    … birth dates, and physical addresses for all users who’d searched variations of 5312 Truckee Street in the 15 days before the fire.

    Google denied the request. According to court documents, the company uses a staged process when responding to reverse keyword warrants to protect user privacy: First, it provides an anonymized list of matching searches, and if law enforcement concludes that any of those results are relevant, Google will identify the users’ IP addresses if prompted by the warrant to do so. DPD’s warrant had gone too far in asking for protected user information right away, and it took another failed warrant 20 days later and two calls with Google’s outside legal counsel before the detectives came up with language the search giant would accept.

    Finally, the day before Thanksgiving 2020, Sonnendecker received a list of 61 devices and associated IP addresses that had searched for the house in the weeks before the fire. Five of those IP addresses were in Colorado, and three of them had searched for the Truckee Street house multiple times, including for details of its interior. “It was like the heavens opened up,” says Baker.

    In early December, DPD served another warrant to Google for those five users’ subscriber information, including their names and email addresses. One turned out to be a relative of the Diols; another belonged to a delivery service. But there was one surname they recognized—a name that also appeared on the list of 33 T-Mobile subscribers they’d identified earlier in the investigation as being in the vicinity of the fire. Bui.

    Seymour’s defense argued that, in asking Google to comb through billions of users’ private search history, investigators had cast an unconstitutional “digital dragnet.” It was, they said, the equivalent of police ransacking every home in America. The Fourth Amendment required police to show probable cause for suspecting an individual before getting a warrant to search their information. In this case, police had no reason to suspect Seymour before seeing the warrant’s results. But the judge sided with law enforcement. He likened the search to looking for a needle in a haystack: “The fact that the haystack may be big, the fact that the haystack may have a lot of misinformation in it doesn’t mean that a targeted search in that haystack somehow implicates overbreadth,” he said

    After a five-month wait that Sandoval remembers as “gut-wrenching,” the court finally ruled in October 2023. In a majority verdict, four judges decided the reverse keyword search warrant was legal—potentially opening the door to wider use in Colorado and beyond. The judges argued that the narrow search parameters and the performance of the search by a computer rather than a human minimized any invasion of privacy. But they also agreed the warrant lacked individualized probable cause—the police had no reason to suspect Seymour before they accessed his search history—rendering it “constitutionally defective.”

    Because of the ruling’s ambiguity, some agencies remain leery. The ATF’s Denver office says it would only consider using a keyword warrant again if the search terms could be sufficiently narrowed, like in this case: to an address that few would have reason to search and a highly delimited time period. The crime would also have to be serious enough to justify the level of scrutiny that would follow, the ATF says.

    Meanwhile, another case—in which a keyword-search warrant was used to identify a serial rapist—is now before the Pennsylvania Supreme Court. If the warrant is upheld, as it was in Colorado, their use could accelerate nationwide. “Keyword warrants are dangerous tools tailor-made for political repression,” says Crocker. It’s easy to envision Immigrations and Customs Enforcement requesting a list of everyone who searched “immigration lawyer” in a given area, for instance.


  • This android only.

    From the article:

    Meta managed to do this even when:

    • You aren’t using the app (but have a session open in the background).

    • You haven’t logged into your account in the browser.

    • You’re browsing in incognito mode.

    • You’re using a VPN.

    • You delete cookies at the end of every session.

    The captured data includes:

    • Complete browsing history with specific URLs

    • Products added to cart and purchases made

    • Registrations on websites and completed forms

    • Temporal behavioral patterns across websites and apps

    • Direct linking to real identities on social networks

    You’re not affected if (and only if)

    • You access Facebook and Instagram via the web, without having the apps installed on your phone

    • You browse on desktop computers or use iOS (iPhones)

    • You always used the Brave browser or the DuckDuckGo search engine on mobile