Is the fact that I recognize this comment evidence that I use Lemmy a bit too much? 😅
I will also pay close attention and see if I can catch that happening.
I think we might see one or more “trusted fediverse” groups emerge in the next few years, with instance admins making commitments to security controls, moderation, code of conduct, etc.
There is now at least one system in place for admins to vouch for other instances being non-malicious, and to report suspected instances. It is called the fediseer: https://gui.fediseer.com/
Do you see a random nickname from a stranger, or a nickname of an account that was previously logged into using the same computer?
What is an open account sharing channel?
I have the Tianje MF903 (https://nl.aliexpress.com/item/32719535459.html), which I bought early 2022.
But just now I have done a search and I see many more pocket wifi routers now. Unfortunately I can’t tell you if they work well, or if it is also possible to change their IMEI easily. The one I have is functional, but it doesn’t have a very long battery life.
And the audacity to talk about metadata when Telegram accounts still require a phone number today (as they did five years ago when this post was written) is just… 🤯
Not only that, but I believe that they actively try to prevent VoIP numbers from being used to create accounts.
Almost all countries require official authentication to activate a SIM card.
Fortunately not in the Netherlands. I don’t think that’s the case in the rest of the EU. I can use free sim cards as much as I want!
When communicating with cell towers, a phone will also broadcast its unique IMEI identifier. So, even if you swap the SIM card every day, your IMEI is still being broadcast the same.
Changing the IMEI of a phone in the EU is illegal, unless the manufacturer consents: https://www.legislation.gov.uk/ukpga/2002/31/section/1
So… I have a Chinese 4G mobile router, and the manufacturer gives me the permission to change the IMEI as it is an integrated feature of the device. I use that for my data. The data codes I purchase small quantities in bulk with cash, and I can access the router via its ip from my phone’s browser to send the SMS messages to activate the data codes as needed. Since WiFi connections are abundant around here I keep these codes for emergencies. I can go a few months some time without activating data codes. I mostly use them when traveling internationally.
Ah, cool! I got my 4 devices today and I have managed to play with them a bit. They are pretty cool! I was able to walk over to a park near my house and spoke with people across the world with no data in my phone :D
I ordered four of the simpler devices this weekend (LilyGO T3-S3 LoRa 868MHz - SX1262) and I have been reading about antennas.
Since I live in a city I am not super optimistic about the range. But I am still very curious about the concept, and I would love to be surprised.
After doing some search about antennas, I have decided to test the following combination:
3dBi 868MHz ISM Band Dipole Terminal Antenna for the LoRa that stays at home:
Sighunter 868 MHz to bring with me.
I also have a vector network analyzer (LiteVNA) that can be used for checking antennas, so I will also try to build some antennas myself. I doubt that my custom antennas will approach the performance of the professional ones… But I just find it such a cool concept.
Have you already gotten to play with it? What is your experience so far?
Sure.
If I make my own AI image generator and create a nice image with it, or use some AI engine that gives me full ownership of the output, I can choose to share it online with whatever license I want to share it with. I don’t see why the regular copyright rules for digital images and photographs would not hold… If someone shares their AI creation online and wants others to share with attribution, or not share at all, what is wrong with that?
I can take a ton of photos of objects with my phone, upload them to Flickr, and they are all copyrighted. That doesn’t mean that other’s can simply take similar photos if they wish to do so. The same with AI. One can decide whether to share with attribution, pay someone to let them use it, or to generate the image themselves using AI. It does not seem like a problem to me.
My girlfriend kept complaining about losing her hearts on Duolingo and I was very confused as I never had any “hearts” during regular lessons. Eventually I found out that since I had created a classroom while exploring the site, I was given access to a teacher version of Duolingo - which is basically a free premium version 😅
Thank you - that makes sense!
I think I understand why this is done now. Most HTTP requests are hidden by the SSL encryption, and the keys to decrypt it are client-specific. So, if one wants to block ads at the network level without needing to get the SSL keys of every client that connects to the network, then this is the most specific amount of information that you can provide the PiHole with. The HTTP blocking needs to be set up in a client-specific manner, and that’s why they work well as browser extensions.
Thanks!
Adblocking plugins aren’t limited by this and can filter the actual content and HTTP requests made by the browser.
Why is this the case? What rules do Adblock plugins use that allow them to determine that something that is being served is an ad? I understand from what you are saying that Adblock will block on the basis of the HTTP requests instead of filtering at the DNS level - do ads come with specific HTTP headers that are not processed by the pi-hole DNS server and thus can’t be used for filtering? I don’t fully understand yet the details of how the two ad-blocking mechanisms operate, so their differences are not obvious to me.
Woah. That is a lot sooner than I had anticipated.
Yeah, I still see the line now. I am not sure if this was a one-off, maybe the edit occurred when I rebooted the instance for a moment and the edit fell through the cracks… Or there might be an actual issue federating edits.
I think you left this line behind by accident:
l = Lemmy(INSTANCE_URL)
I would kill. 2X growth rate is too fast, and it is easily better 100 random people now than 200 immediately after.
What about these rules?
The group of people in the tracks is randomized every time.
The group always includes the person that the current decision maker loves the most.
The choice is to kill, or to increase the number of people in the kill group by one.
If the number of humans available reaches the population number, everyone dies.
The list of every decision made by every decision maker is public knowledge.
You are the first decision maker.
EDIT: Sorry, I misunderstood this question ~~ I have a raspberry pi connected to a 1 TB SSD. This has the following cron job:
00 8 * * * /usr/bin/bash /home/user/backup/backup.sh
And the command in backup.sh is:
rsync --bwlimit=3200 -avHe ssh user-ip:/var/www/mander/volumes /home/user/backup/$(date | awk '{print $3"-" $2 "-"$6}')
In my case, my home network has a download speed of 1 Gbps, and the server has an upload speed of 50 Mbps, so I use -bwlimit=3200 to limit the download to 25.6 Mbps, and prevent over-loading my server’s bandwidth.
So every morning at 8 am the command is run and a full backup copy is created.
It seems that you have a different problem than me. In your case, rather than doing a full copy like me, you can do incremental backups. The incremental backup is done by using rsync to synchronize the same folder - so, instead of the variable folder name $(date | awk ‘{print $3"-" $2 “-”$6}’), you can simply call that instance_backup. You can copy the folder locally after syncronizing if you would like to keep a record of backups over a period of a few days.
On a second thought, I would also benefit from doing incremental backups and making the copies locally after synchronizing… ~~
You can create a one-person instance and hold your identity there.
If you what you want is for every server to hold your identity, you have to trust all servers. I think that an evil admin would be able to impersonate any user from any instance if that were the case. How do you delete your account? Can an any admin delete your account everywhere? Which one is the real “you”?
I did not know of the term “open washing” before reading this article. Unfortunately it does seem like the pending EU legislation on AI has created a strong incentive for companies to do their best to dilute the term and benefit from the regulations.
There are some paragraphs in the article that illustrate the point nicely:
Thank you for pointing out Grayjay, I had not heard of it. I will look into it.