Giver of skulls

Verified icon

  • 0 Posts
  • 482 Comments
Joined 101 years ago
cake
Cake day: June 6th, 1923

help-circle
  • Someone needs to curate and maintain the blocklist. Paying for software once is a surefire way to have it stop blocking anything a few years down the line because the company stopped updating their lists when the sales ran out.

    If you pay a set fee for something that requires continuous maintainance you’re either overpaying enough to compensate for cash flow interruptions or you’re at risk of the software being discontinued. The latter is especially true if you’re getting stuff for free, but in that case you’re also not entitled to any service.

    As for “why not block teamviewer at the router”: because then anydesk will still work. And if you block anydesk, Microsoft Remote Support will work. And if you block Microsoft Remote Support, RustDesk will work. And if you try to block every single RustDesk server, grandpa’s internet probably no longer works anymore, because you’ve just blocked off every data center in the world.




  • I don’t really know what people are doing to enrich their vocabulary and fluff up their language to be honest; my vocabulary and writing all stem from high school. However, my experience is that in order to write well, you need to read a lot. Learn what works for others, consider why it may not work for you, and pick up the good bits. If all else fails, open a dictionary, pick a word every day, and try to use it in a sentence before going to bed, just so you learn more synonyms and specific terms.

    I’m pretty sure that when it comes to job applications, most people are probably using AI these days. Unless you think you can beat AI, it doesn’t hurt to let the some kind of AI go over your text and steal some or the good bits.


  • That screenshot again proves that this person is extremely cringe, presumably a troll, but there’s still no threat. At worst that’s racism against Americans. Should obviously be removed by moderators from any normal online service that wants to encourage pleasant conversation, but that’s not necessarily illegal.

    As for the PDF, that’s not a legal definition by any kind, it’s a quick explainer for a law that only applies to hosting providers receiving complaints from European authorities. So yes, if the Belgian police sent a takedown notice regarding terroristic content then it does apply.

    However, that regulation is mere instruction to EU states to draft compliant laws. It’s not actionable legislation in itself (similar to the GDPR).

    The full text of the Regulation does include this instruction for EU countries, which I haven’t seen before:

    In order to provide clarity about the actions that both hosting service providers and competent authorities are to take to address the dissemination of terrorist content online, this Regulation should establish a definition of ‘terrorist content’ for preventative purposes, consistent with the definitions of relevant offences under Directive (EU) 2017/541 of the European Parliament and of the Council (6). Given the need to address the most harmful terrorist propaganda online, that definition should cover material that incites or solicits someone to commit, or to contribute to the commission of, terrorist offences, solicits someone to participate in activities of a terrorist group, or glorifies terrorist activities including by disseminating material depicting a terrorist attack. The definition should also include material that provides instruction on the making or use of explosives, firearms or other weapons or noxious or hazardous substances, as well as chemical, biological, radiological and nuclear (CBRN) substances, or on other specific methods or techniques, including the selection of targets, for the purpose of committing or contributing to the commission of terrorist offences. Such material includes text, images, sound recordings and videos, as well as live transmissions of terrorist offences, that cause a danger of further such offences being committed. When assessing whether material constitutes terrorist content within the meaning of this Regulation, competent authorities and hosting service providers should take into account factors such as the nature and wording of statements, the context in which the statements were made and their potential to lead to harmful consequences in respect of the security and safety of persons. The fact that the material was produced by, is attributable to or is disseminated on behalf of a person, group or entity included in the Union list of persons, groups and entities involved in terrorist acts and subject to restrictive measures should constitute an important factor in the assessment.

    However, the Regulation also refers to human rights such as freedom of expression. One can be of the opinion that it’s better for the USA to stop existing without any plans or support for actual genocide. Someone expressing hate for your country isn’t immediately a terrorist.


  • Do you have a copy of the actual threat? Because “you are a settler” is stupid but not an actual threat.

    I don’t know where you got that picture from, I can’t find the legal definition for a terroristic threat within the EU. The best I could find is:

    For the purposes of this Convention, “public provocation to commit a terorist offence” means the distribution, or otherwise making available, of a message to the public, with the intent to incite the commission of a terrorist offence, where such conduct, whether or not directly committed.

    That’s just a convention, though, not direct law. The definition by the convention does require proof of intent, which I haven’t found about the cringe hexbear user.




  • Because you’re not paying extra for those problems to get fixed. And no, when you receive millions of forms per day, not every piece of feedback makes it back to someone to actually fix the issue. Especially when half those issues are “when I don’t have internet I don’t receive new emails”.

    Software, like hardware, is a balance between supply and demand. People would rather pay less for a phone crammed full of ads than pay for a service. Just look at YouTube for that one.

    Also, those clunky interfaces are there for a reason. Maybe the interface element that’s a lot better doesn’t work in right to left languages. Maybe the information overload of too many buttons and labels made the old interface impossible to extend. Maybe the prettier solution doesn’t work with screen readers or with the font size and colour cranked up for people with low vision. Maybe the feature redesign worked great but SomeCorp Tweaker Software will bluescreen the machine when it finds the word “checkbox” in a settings page for your mouse. Maybe the design team had a great idea but the feature needs to ship next week so whatever needs to happen to make that works happens, and the five other features planned for the month already eat up the rest of the dev team’s time anyway.

    But most of the time, things are suboptimal because there are seven teams of people working on features on the same screen/system/application and they need to make do.

    If you have serious issues with some software, many companies will let you partner with them. In exchange for hundreds of thousands or millions, you can directly get support for your use cases, your workflow, and the stuff you need to get done, over the billions of other people that also need to use the software. And sometimes, that means your super duper expensive preference/feature/demand means someone else’s workflow is entirely broken.

    If you know what you want, there is a way out: going the way of open source and self hosted. Within a few years, you too will grow resentful of dozens of systems made by different people all interpreting standards differently and not working together. You have the power to fix each and every feature, bug, problem, and design flaw, but none of the time or the detailed knowledge. You don’t have the money to pay experts, and even if you did, what they do may not entirely suit you either. Trying to fix everything will drive you absolutely mad. And that’s why companies and people often don’t try for perfection.


  • Exactly. Everyone wants the cheap and easy solution when something breaks, but nobody wants to pay the price for the cheap and easy solution to be available upfront, because what are the chances they run into a problem like that?

    In this specific case, there is a credible ulterior motive for the company not to make cheap repairs available: the government will pay the bill if they sell a new expensive product and all the training/rehabilitation that comes with it. On the other hand, there is a very valid reason why things like batteries are so expensive to replace and why you can’t find replacement batteries for a lot of products a certain amount of time after production ends.




  • Because there is little difference when it comes to passively degrading components like batteries. You can’t produce a battery and leave it in storage for a decade, the battery will degrade on its own. The only way to keep reserve batteries is to keep producing them, and maintain a production line for all that time. That’s prohibitively expensive for small markets like these.

    A relatively simple solution is to stick with batteries that have a standard shape and size, but it’s not like you can just stuff a button cell in there, you need more power to operate the controller chip.

    It’s pretty shitty that the company didn’t produce a backup controller box that works without having to stick to the wearable watch form factor that just takes a bunch of rechargeable AA batteries, but you can’t expect what is essentially a smart watch to still have accessible replacement batteries in twenty years.

    This isn’t exclusive to medical devices, either. Computers running DOS or Windows 95 are still operating millions of dollars of machinery and are slowly failing and collapsing over time. The amount of affordable replacements (even at an industrial level) is slowly starting to dwindle. Nobody is producing floppy drives anymore, nor new floppies for that matter, so if that industrial controller you bought in the early 2000s dies you have to hire a computer greybeard to fix your hardware or replace the entire system.

    In my opinion, it should be put into law that once a company stops supporting their bespoke hardware, the copyright and patents protecting them should expire immediately, so that once a company drops support anyone else can pick up where they left off.

    However, anything with a computer in it has a limited lifespan, and that lifespan is significantly shorter than that of a human being. Even with the code and blueprints publicly available, someone still needs to find the compatible hardware, alter the designs to operate on modern commodity hardware, or pay a factory to ramp up a production line if they have the million(s) to do so.



  • I’ve never worked for a company with the shitty HR people complain about online. Must be a regional thing.

    I don’t have the expectation that HR will always be there to protect you (though one company I’ve worked for had HR that actively fought upper management for things like raises and pension stuff). HR is there so the company, and by extension everyone in the company, can do their work properly. If you have a conflict at work, they’re not obligated to be on your side.



  • The Fediverse is a terrible name that only pushes people away. I’d welcome the change of name.

    However, the Fediverse was never just about ActivityPub either. The old GnuSocial protocol ActivityPub is based on is also part of the Fediverse. So is XMPP and I suppose by extension Matrix. Like it or not, ATProto is part of the Fediverse too, even though most Fediverse software doesn’t speak it. Services can speak multiple protocols, they don’t need to restrict themselves to just ActivityPub.

    ActivityPub folks are probably the largest group of people actually developing an interoperable social media network, though. ATProto is federated but small servers don’t stand a chance against the Bluesky firehose (hundreds of gigabytes of content per day on bad days!) because the protocol is based around “large servers talk to other large servers”. Other federating protocols simply don’t really care much about activism anymore.

    Nobody is taking the “social web” away from your IRC channels and your NNTP news groups and your SMTP mailing lists. You can still call them the social web. And frankly, it would be wonderful if more ActivityPub services would speak NNTP because both share the same goals. “I also used to have a social web” doesn’t conflict with “ActivityPub is part of the social web”.




  • They assign a prefix. For IPv4 this is usually a /32, or 1 single address, though it’s possible to assign larger ranges. I’ve seen businesses with a /28 on IPv4 for example.

    The end device picks what IP addresses within the prefix are used for what. For instance, the server rack may use three IP addresses, the office one, and maybe the IoT network also gets one.

    With IPv6 you should be getting a /56 or a /48. In other words, they pick the first 48 to 56 bits of your IP addresses, basically leaving 80 to 72 bytes for the end device to distribute amongst itself. You could give the first device address one and start counting up if you wanted to, but that’d come with the annoying edge case of needing to track what numbers are already in use. If you like a false sense of control, DHCPv6 is what manages this.

    SLAAC (the “everything works by default” approach) requires a /64 (64 bits of local address space), so if you want to do routing (say, attach a wireless access point or a second router) and you don’t want to do IPv4 hacks that hide IP addresses from each other, you need a few networks. That’s why you get 8 to 16 bits of network space, so you can assign 256 to 65536 networks yourself in case you have weird requirements.

    If your ISP assigns you 2003:123:def:abc::/48, then you can pick whether you want to assign 2003:123:def:abc::beef:cafe or any random address that starts with the ISP prefix. You have enough space to give every connection of every device on every WiFi network its own IP address every second of the day, but usually addresses are rotated only once per day.

    The ISP picking the address range does come with a huge downside, and that’s that you can’t really use internal IP addresses anymore. To fix that, you can set up a so-called ULA. That’s basically a service anywhere on the network that shouts “hey, if you can’t, you can pick any address from fdef:abc:abc:abc::/96”. By default, devices will pick two addresses (one based on the MAC address and a temporary one), and you can use the one based on the MAC address to plug into your local DNS server.

    That way, even if you switch ISPs to one that only does IPv4, you can still use a Pi-Hole at fdef:abc:abc:abc::123:456:789 as your DNS server. These ULAs are completely local, so they can’t be reached from the internet.

    Though, just to be sure, you should generate a random ULA prefix (there’s an algorithm in the standard, but there are sites to do it for you) just in case you have bad luck and connect to someone else’s wifi who also thought it’d be funny to put devices on fdef:cafe:babe:b00b::/96.