Oof Sourceforge AND flatpaks? I’ll have to check this out but I’ll make sure I read it over well before anything.
Just another guy abandoning the old internet.
Oof Sourceforge AND flatpaks? I’ll have to check this out but I’ll make sure I read it over well before anything.
I’m thinking the code is obfuscated by random calls to various functions so that the code block isn’t just one section you can easily see but sprinkled throughout instead.
Isn’t this the RockPi? Or is the RockPi just based on the RK3588? It’s great for open-source but good lord are these SBC’s astronomically high.
IRIX was Unix based with BSD extensions and I believe Maxx Interactive now runs on FreeBSD without Linux compatibility mode. So hopefully it won’t be long before it goes open source. Though I can’t understand why it would be needed outside of anything but nostalgia.
Android? It’s not wholly closed source similar to RedHat they’ve got closed source elements while using open source elements.
Linux and its kernel are based on GPL and so to distribute something using it would require a compatible license. That means a full distro can’t be anything but open source and actually be distributed in free or paid versions. That doesn’t mean there aren’t closed source interfaces being used personally or undistributed.
We had to walk a delicate line with our kids (2005-2017) when it came to interaction online. Never wanted them to feel like we were keeping them from experiencing the knowledge or social interaction the internet provided. But we also kept close tabs and paid special attention to specific behaviors. So if they were in their netbooks we’d make it a habit to walk behind them not to look but just to see what their reaction would be. Kids mostly know right from wrong and when they feel it “might” be wrong they try and hide it from their parents. If you pay attention you’ll see them “hiding” and that’s a sign to dig deeper. This way they maintain their privacy and any issues can be brought to light with them directly.
(Understand that the following will have specific details changed just for anonymity’s sake) Grooveshark was the first interaction we saw was troublesome. So we sat our daughter down and asked her direct why she was trying to hide her netbook from us seeing it and what had she been doing she felt she needed to hide? The alternative was to relinquish the netbook until she told us. Come to find out a friend of hers from school (female 2 years older) was trying to slowly convince her to lie to her parents and sneak off with her. Our daughter told us this because it scared her not because she would lose her access. We also stayed open and active with our kids indulging in the same things they were interested in (Minecraft, Guitar Hero, etc) regardless if it was explicitly something we enjoyed. So she didn’t lose access to Grooveshark because she really loved listening to music. We just kept an eye on it and she removed her friend from communication. We explained what she was likely attempting and her friend admitted to it. They’re not friends now but it never happened again.
Don’t get me wrong, we made tons of bad calls before we learned what worked. But the key to all of it is paying attention. Not hovering over them and stopping them from making mistakes. But watching the nuance of their interactions with everyone around them. If they start to get secretive then there is usually a reason. And it’s best to just talk to them about it. And if one conversation doesn’t do it then have multiple conversations. Listen to what they have to say and why they were being secretive. Works best when they’re not expecting it too (like in the middle of playing Minecraft together). Anyway that’s just IMHO.
Ok, so it’s time for me to do some research on Flatpaks now. I’m an old schooler from Redhat days and haven’t kept up with the new stuff all that much.
How would you police this without direct abuse?
It’s pretty easy to spot deep fakes, even now. The type of porn being created in deep fakes are just too unbelievable when it comes to actors and actresses. They’re not deep faking intimate love porn, it’s nearly always straight up deep hardcore pornography that is being made when deep fakes are involved. I feel like everything described that is so evil is just a straw man argument. Hell anyone that believes deep hardcore pornography is what just happens in reality is a moron. The amount of bullshit incest porn on these same websites is just bonkers. That being said I can see how it can affect some people.
But guess what? Humans tend to look similar so how do you go stop it when you don’t know if it’s real or fake? How crazy easy will it be to create yet another advantage to those in power/financial success? Examples:
Politician is seeing a prostitute and abusing his status to do so. The prostitute records a secret sex tape of him raping her and threatening to have her arrested if she doesn’t submit to what he wants. This video goes public. Politician claims it’s a deep fake and prostitute is arrested anyway. Or the reverse. A prostitute deep fakes the video and threatens the politician. The politician just had information coming out of him glancing at another woman than his wife before the deep fake and so the populace just sides with the prostitute and the politician is arrested.
Or how about a woman who looks just like Taylor Swift decides she wants to work in pornography. Her likeness is immediately noticed and it’s part of her popularity but not billed as such. T swizzle claims it’s a deep fake to disparage her and the porn actress is ruin if not sued into oblivion.
So many scenarios could go either way. You can’t ban the technology because you’ll never be able to legitimately be able to know which is which. And just like cryptography banning it will not limit access to those who would use it lawfully.
So what’s the solution? Get over the lunacy of the whole event? What options do we really have? And being we don’t have many/any options all we’re doing is sending clicks to news sites who have nothing else to write about. I’m not saying it’s not a problem, just not seeing a solution and don’t see a need to continually beat a dead horse.
Wine nor bottles are reliable enough for making backups in that fashion. You’re almost guaranteeing corrupting the backup and the same goes for restoring the backup.
If it’s for work and is required to be backed up then just backup to iCloud and have your work maintain the extra cost in size.
What philosophy do you speak of? Are you talking about the walled garden that is the App Store?
Regardless of capability a human will have a bias. So maybe have multiple humans of varying beliefs and then have the AI train to remove the bias?
He looks like the the love child of Bilbo Baggins and Elon Musk.
I want to believe this is all /s but I haven’t gotten the feel of Lenny quite yet.
Funny this is pretty close to the truth when it comes to the things described in this thread.
Poop Knife - Bad diet, large BM’s = financially poor diet = trailer Frog Tongs - trailers tend to have bad gaps in windows Etc
Ours has a magnet and is stuck to the toaster. Long since abandoned since most cants with ridges don’t like to open well without just using a can opener and removing the whole can lid.
You have one badass cat.
I have a set of tongs at home with frogs for the silicone grips. Living at the beach it’s not uncommon for green tree frogs to make their way inside the doggie door.
Not to mention using white phosphorus bombs as well. I’m not for either side but it’s time Israel is held accountable for war crimes.
This is probably the worst website I’ve ever seen. 9000 ads for 15 words.