babe wake up, a new bone-apple-tea just dropped
babe wake up, a new bone-apple-tea just dropped
the hostname of a website is explicitly not encrypted when using TLS. the Encrypted Client Hello extension fixes this but requires DNS over HTTPS and is still relatively new.
open source software getting backdoored by nefarious committers is not an indictment on closed source software in any way. this was discovered by a microsoft employee due to its effect on cpu usage and its introduction of faults in valgrind, neither of which required the source to discover.
the only thing this proves is that you should never fully trust any external dependencies.
“every situation you’re involved in is 10X more escalated than it needs to be because a gun is involved at all”
absolutely delusional, please explain how a vulnerable individual concealed carrying is escalating anything.
jfc what an absolute hellhole of a police state you’ve dreamt up. so many of your hairbrained ideas amount to “cops should have unlimited access to your private life”. how exactly do you think this would play out given the US and it’s systemic racism and classism?
yeah silly me for supporting artists with my money but also downloading drm-free copies of things so I can actually exercise a semblance of ownership. but sure, keelhaul me so you can keep your sense of smug superiority.
AI is a tool that is fundamentally based on the concept of theft and plagiarism. The LLM training data comes from artists and creators that did not consent to their work being plagiarized by a hallucinating machine.
yes, and where does the Gun Violence Archive get their numbers?
looking at their site, the answer is “themselves”… cool. Looking through their listed data it clearly includes gun violence from gang activity.
yes I know, I mentioned that in my comment. can you tell me where on that page it indicates their source of data?
your source links to this source of data, which only goes up to 2021. The table clearly states they’re counting 15 - 19 year olds.
that 6,192 number appears to come from the gunviolencearchive site, but I don’t see any source for their data other than claims that “suicide data provided by CDC”
further, a simple search of the claim “guns number one cause of death in children” will find a lot of valid critiques of this claim.
this is false, this stat deliberately counts 18 and 19 year olds as “children” and purposefully includes gang related violence. great example of using statistics to sell a story.
how many gang members are going to surrender their firearms after a ban?
it literally explains what they’re for in the product listing:
These labels aid your warehouse operations.
• Categorize inventory, reorder points, product dating or special instructions.
• Apply these labels to pallets, boxes and shelves for easy identification.
• Easy to write on.
a decentralized community that correctly prioritizes security would absolutely be using signed commits and other web-of-trust security practices to prevent this sort of problem
zero! i rotate mine counter clockwise
i turn mine so i can find it again if i set it down at a party
assuming you have a GNU toolchain you can use the find
command like so:
find . -type f -executable -exec sh -c '
case $( file "$1" ) in (*Bourne-Again*) exit 0; esac
exit 1' sh {} \; -print0 | xargs -0 -I{} cp {} target/
This first finds all executable files in the current directory (change the “.” arg in find to search other dirs), uses the file
command to test if it’s a bash file, and if it is, pipes the file name to xargs
which calls cp
on each file.
note: if “target” is inside the search directory you’ll get output from cp
that it skipped copying identical files. this is because find
will find them a free you copy them so be careful!
note 2: this doesn’t preserve the directory structure of the files, so if your scripts are nested and might have duplicate names, you’ll get errors.
why use docker here? you’re just adding layers of abstraction in an environment that can’t seem to really support them.
that said, switching to 32bit linux, if the VPS supports it, will save you memory.
you need to look at the routing tables on your computer. these tables store the prioritized rules for how packets leave your host machine.
it might be that something is adding rules, or, there is some overly broad rule taking priority (like a rule that says all 10.0.0.0/8 traffic go to your home router over 192.168.69.0/24, etc)
it’s also suspect that you can reach the NAS over the 1gb card. That to me means one of two things:
ultimately, i suggest you run something like tcpdump
or wireshark on your computer (ideally on the NAS too) so you can start to visualize how the packets are being addressed and transferred over your networks.
sincerely, a fellow 10.0.69.0/24 enjoyer
you’re so close, just why exactly do you think people are using it for these things it’s not meant for?
because every company, every CEO, every VP, is pushing every sector of their companies to adopt AI no matter what.
most actual people understand the limitations you list, but it’s the capitalists at the table that are making AI show up where it’s not wanted