Strangely topical for me. I wasted yesterday telling myself I was smart enough to make SwayWM on Wayland work well with my 1070. Should have trusted the warnings in the documentation; hubris cost me a weekend day!
Strangely topical for me. I wasted yesterday telling myself I was smart enough to make SwayWM on Wayland work well with my 1070. Should have trusted the warnings in the documentation; hubris cost me a weekend day!
The very last thing the Internet needs is more ads.
The only reason I know what webp is, is because its “that dumb format” that doesn’t play like a GIF in Signal.
Oh, of course. That explains the coefficient output in the terminal. Thanks.
Is that about 20 degrees of swing on the hotend? Might need to recalibrate that loop!
Cool ideas. I like the idea of an accessible, global democracy. But I wondered about two things:
One, I think the complexity of such an identity database would be so great, it would preclude any means of reliably identifying false connections. And if that complexity wasn’t boggling, would it really capture anything more than our present distributed (inefficient) system of records? You would wind up with a, admittedly more sophisticated, statistical model for identifying bogus individuals.
Another thing I wonder is how much help it would actually be. Lots of issues are more complex than “is clean water good?” If and when a decision needs to be made on something outside your expertise, or with no clearly altruistic option, you have to look for help in understanding your choices. And that makes you vulnerable to influence by someone else’s interpretation. Which leaves you where we are now.
So I guess it raises some problems to solve. Can you really create a perfect record of identity without sacrificing privacy? Could you meaningfully interrogate it? How do you provide an unbiased education of every vote and referendum? How do you solve the influence problem or stop organized political machines from springing up again? Does any of this address the root cause of unbalanced wealth and power?
I have no idea how these work, but one hack idea off the cuff:
You get the light for free. At least when your lids are open; that’s how vision works. A cheap digital watch lasts ages on a tiny coin cell because the polarisation of the LCD, which passes or blocks polarised light, takes minimal energy. Stack up a passive polariser, and the active LCD-like layer, (and maybe a second passive layer?) and you can cast selective shadows on the retina.
This gives you monochrome “smart vision” in the same sense as a monochrome Casio wristwatch. No idea how to tackle issues of focus at such a short focal length, or achieving any sort of active display let alone colour.
Maybe the whole thing is a pipe dream crackpot idea.
You might be interested in the story of Luigi Galvani’s experiments with frog muscle tissue. It was seminal work in anatomy as well as physics.
https://www.sciencedirect.com/science/article/pii/S1631069106000370?via%3Dihub
One of the frustrating things about Signal is its extreme compression. I hope WhatsApp laxing up a bit will be the final push to the Signal devs to allow me to send a 30 MiB photo if I want to. Just give me a damn opt-in option buried in a settings menu for Pete’s sake.
Annoys me to no end that I’m forced to crunch image quality down. The reasons I heard in discussion were to save disk space and network bandwidth. I have no sympathy for either of these points. Have a modicum of digital hygiene and delete old files, and pressure your ridiculous governments to invest and regulate ISPs, then join the rest of the world in the 21st century.
Telus? What a bunch of crooked hosers.
“an unknown (mobile?) client”
Well, nice try anyway.
Hack.
It doesn’t mean someone guessed your Facebook dictionary-word password.
It doesn’t even mean some black hoodie-wearing, bad actor remotely broke into a secure computer system.
It’s a clever trick. Whether it’s in code or concrete. Some creative, elegant, unexpected, solution to a problem.
“I know a menu hack. Order the kids burger and add cheese to save a buck.”
“We ran out of conductors in the cable, so we’re transmitting power via a differential pair. I know it’s a hack, but we need to ship by end of month.”
Fiirefox?
Za’atar, or sambal oelek.
Your email likely is already delivered over a TLS or SMARTLS protected channel. That’s not the (only) problem PGP addresses. PGP provides message authentication in addition to encryption.
To take your colleague as an example, his email was cryptographically signed by him. A function that requires his private key, and possibly a passphrase to unlock the key. The signature includes a hash of the message, and requires that private key to generate. On your end, your client hashes the message again and compares the signature. If it isn’t identical, someone has tampered with the content. Presuming you met up ahead of time in person or through another trusted channel, and shared public keys, seeing the valid signature also gives you confidence that this email was actually written by the person you expect, and not anyone else with access to their device or account. (If the senders key is still safe anyway.)
Could you elaborate? If John Smith gets a speeding ticket, all other drivers get a video of it in a “Don’t be like John” email? There must be so many drivers, so surely it can’t be “all” of them.
It’s a beautiful bird until the horny little pricks find your chimney’s metal flashing at 5:00!