[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Captcha
Tor Only

Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord

| Catalog | Home

File: 1706129539265.jpg ( 360.33 KB , 1024x1024 , 1700467342513079.jpg )

 No.12876[Reply]

Hello, faggots, thanks to our unwavering dedication to the community I am proud to announce we are rolling out our own, official, leftychan.net i2p address.
You can locate the eepsite @ http://leftychmxz3wczbd4add4atspbqevzrtwf2sjobm3waqosy2dbua.b32.i2p, or, http://leftychan.i2p/.
If you have any trouble, as stated on the news announcement, try manually adding the address and domain to your address book.

-Yours Truly.
8 posts and 1 image reply omitted. Click reply to view.
>>

 No.12898

>>12897
You don't even need to use the "dark net" Bans are basically impossible because of vpns and proxies and everything else.


File: 1612129656526.gif ( 2.28 MB , 224x240 , 1608608621350.gif )

 No.6724[Reply][Last 50 Posts]

This thread is only for feedback related to technical issues(bug reports, suggestions). Otherwise use
>>>/leftypol/30356
Public Repo: https://github.com/towards-a-new-leftypol/leftypol_lainchan
If you have any grievances you can make a PR.

Mobile Support: https://github.com/PietroCarrara/Clover/releases/latest
Thread For Mobile Feedback: >>>/tech/6316

Onion Link: http://wz6bnwwtwckltvkvji6vvgmjrfspr3lstz66rusvtczhsgvwdcixgbyd.onion
Cytube: https://tv.leftychan.net
Matrix: https://matrix.to/#/#Leftypol:matrix.org
Once you enter, consider joining the lefty technology room.

We are currently working on improvements to the site, subject to the need of the tech team to sleep and go to their day jobs. If you need more immediate feedback please join the matrix room[s] and ask around. Feel free to leave comments, concerns, and suggestions about the tech side of the site here and we will try to get to it as soon as possible

Post too long. Click here to view the full text.
200 posts and 57 image replies omitted. Click reply to view.
>>

 No.12030

File: 1678937328590.png ( 1.88 MB , 1536x1024 , 608bfd6724eb6e62e9ae5dc04b….png )

>>>/meta/11075
>We don't really know where it is located in the source code because lainchan is spaghetti code
The bug is caused by instantiating the index template
https://github.com/towards-a-new-leftypol/leftypol_lainchan/blob/3396999a17b4c67473a5b1739329a9d08b992c84/templates/themes/overboards/theme.php#L204
using the $config of the openBoard call of the buildOne call of whichever thread happens to be last in the $top_threads loop.

Unfortunately there doesn't seem to be any clean way to access the board-independent global config once openBoard has been run at least once. So a general solution may need to save a reference to the board-independent global config into a new global variable as soon as it is available
https://github.com/towards-a-new-leftypol/leftypol_lainchan/blob/3396999a17b4c67473a5b1739329a9d08b992c84/inc/functions.php#L38
and pass that to the instantiation of the index template.


File: 1715545547265-0.png ( 13.45 KB , 300x309 , rage.png )

File: 1715545547265-1.jpg ( 21.81 KB , 2320x192 , fuck_you_for_this_mozilla.jpg )

 No.13057[Reply]

FUCK YOU MOZILLA!

YOU PROBABLY SABOTAGE YOUR OWN PRODUCTS YOU FUCKING FEDS

WHAT IS THIS SHITT????
WHY DOES EVERYTHING HAVE TO BE SUCH FUCKING GARBAGE AND BECOME MORE AND MORE SHIT BY THE MINUTE, HUH?

ON THIS STUPID GOD DAMN APPLICATION CALLED FIRE FUCK-OFF IT'S IMPOSSIBLE TO SEE WHICH OF THESE GOD DAMN TABS IS ACTIVE!!!!
THEY"RE ALL EXACTLY THE SAME FUCKING COLOR AAAAAAHHHHHAHGGGHG HOW DO YOU EXPECT ME TO USE THIS SHIT!! FUUUUUUUUUCKKKKKKETR;OLJDFGVJNASDF

WHY THE FUCK DO I HAVE TO GO INTO THE SETTINGS AND CHANAGE THE THEME JUST TO SEE WHAT FUCKING TAB I"M ON HUUUUUGGGGHHHH??

FUCK YOU COCKSUCKERS!!! IT WAS FUCKING FINE. OKAY!? IT WAS FINE AND YOU MAKE IT MORE SHIT WITH EACH ITERATION!!
1 post and 1 image reply omitted. Click reply to view.
>>

 No.13059

>>13057
install the 'tree style tab' addon to get the side-pane for tabs.
>>

 No.13060

>>13058
THIS IS WHEN i COMPLAINED ON THEIR OWN WEBSITE ABOUT THIS ISSUE.

THEY MADE ME SIGN IN WITH GOOOOGLE JUST TO POST AND THEN MY POST NEVER EVEN SHOWED UP.
>>

 No.13061

>>13060
>i COMPLAINED ON THEIR OWN WEBSITE
You'd probably have better luck going to Mozilla's github page and open an issue in the issue tab.

I can't seem to post a direct link, just go to github.com and search for mozilla
>>

 No.13062

File: 1715564135712.jpg ( 100.37 KB , 1024x1024 , rage_filled_face.jpg )

>>13061
THEY DON'T EVEN USE GITHUB FOR THEIR FUCKING SHIT THEY ONLY USE B-B-B-BUGZILLA AND ITS THE GAYEST SHIT IN THE WORLD I SWEAR TO GODDDD THIS IS SUCH BULLSHIT!!@=
>>

 No.13063

If you're not using Palemoon at this point you must be oblivious. Google has been the largest donor to Mozilla for over a decade and their directors get paid giant salaries to destroy their own browser. And when they're not doing that, they've basically functioning as a money laundering operation–a non-profit donating to a ton of other orgs instead of using their fucking money to pay programmers.


File: 1714651733770.png ( 2.39 KB , 433x800 , end of surveillance.png )

 No.13032[Reply]

Marx taught us how to do material analysis by looking at societies and economics in motion. I'll endeavor to apply this to surveillance capitalism.

We'll take the perspective of the other side. There are essentially 3 search engines.

Number One is the hustle-search. It's a search engine that allows scammers to search for consumer-victims based on what kind of psychological weaknesses can be used to trick them.

Number Two is the snoop-police-search. This is a search engine for finding people with dissenting political views, and it also serves the vital function of enabling wife-beater cops to find out in which women's-shelter the soon to be ex-wife is hiding for example.

Number Three is the massacre-search. A search engine for finding the designated human sacrifices. For example the Zionators are getting their murder machine target data to eradicate the human-shield-ethnicity of the Palestinian population and of course students from American/European universities, from this type of search engine. Obviously it's also going to be used by other ethically-challenged groups, like religious nuts taking out abortion doctors or people that frequent gay-bars. Or neocons taking out journalists and whistleblowers, to ensure freedoom and democrazy. The legislators that fail to understand that privacy has to be an absolute right, have blood on their hands.

Lets contrast with an ordinary web-search that finds web-pages. If you have a webpage you want your auto-generated click-bait at the top of the search results. To shove your generic page above all the relevant stuff, to the top, you use something called SEO (search engine optimization). For the 3 previously mentioned search engines you want the opposite type of SEO. That puts your 'page' near the bottom of the search results.

SEO has ruined websearch. The same will happen to the rest of surveillance capitalism. There are powerful incentives to feed this machine bogus information that favors your advantage. For many people it will become a matter of survival.

To elaborate the coming paradigm. Think about ad-blockers those deny the monster the ability to steal your information soul, but it still knows that you are there, it knows that some of it's pray escaped, it will keep hunting and harassing you. The next evolutionary stage will be add-fantasy. Adds are no longer blocked, instead it willPost too long. Click here to view the full text.
1 post omitted. Click reply to view.
>>

 No.13034

>>13033
>There was also that browser extension that intentionally clicks on all the ads in the background, but doesn't show them to you, so that they cannot know if the ads are working or not.
Interesting concept. I'm not sure i fully understand it tho. Clicking every add is obviously not genuine behavior. This probably would only work if most people were using it, so that they couldn't just filter it out of their data-set.
>>

 No.13035

File: 1714752707817.png ( 13.63 KB , 800x800 , ouroboros.png )

>>13033
>Data poisoning can fuck up
It's not gonna come from adblockers or anything based like that.

Surveillance capitalism will eat it self Ouroborus style. Once generating convincing enough personal data becomes cheaper than actually collecting personal data, the jig will be up. They'll probably start padding collected data set with generated data, eventually, it'll be mostly padding.

I read somewhere the spook agencies are buying these personal data sets. I wonder if at some point the news will be warning people to beware of a dangerous suspect that has a hand with 11 fingers. And the talking head in the news won't even flinch, on account of being just as fake as the news.
>>

 No.13036

File: 1714907029611.png ( 715.79 KB , 1066x800 , 167530993304153422.png )

>>13032
>There are essentially 3 search engines.
>>13033
>browser extension
where
>>

 No.13037

>>13036
what vn?
>>

 No.13055

>>13036
they probably mean adnauseum. i don't know about its current state but mozilla tried blocking it in the past.


File: 1677265486701.jpg ( 51.35 KB , 351x356 , Foss AI.jpg )

 No.11956[Reply]

Recently there has been a lot of commotion around large language model text based AI.
They are able to do impressive stuff, they give useful answers, and even can write somewhat usable programming sample code.

The most famous one currently is chatgpt, but all of those AIs are basically black boxes, that probably have some malicious features under the hood.

While there are Open-Source Implementations of ChatGPT style Training Algorithms
https://www.infoq.com/news/2023/01/open-source-chatgpt/
Those kinda require that you have a sizeable gpu cluster like 500 $1k cards that are specialized kit, not your standard gaming stuff. To chew through large language-models with 100 billion to 500 billion parameters.

The biggest computational effort is the initial training run, that chews through a huge training data-set. After that is done, just running the thing to respond to your queries is easier.

So whats the path to a foss philosophy ethical AI ?
Should people do something like peer to peer network where they connect computers together to distribute the computational effort to many people ?

Or should people go for reducing the functionality until it can run on a normal computer ?
Post too long. Click here to view the full text.
12 posts and 5 image replies omitted. Click reply to view.
>>

 No.12546

Is there an open source AI detector? Can we classify posts written by AI or not?
>>

 No.12576

File: 1697455291199.png ( 4.68 MB , 1276x3412 , thefinders.png )

>>12546
>Can we classify posts written by AI or not?
tl;dr: no

For now, advanced captcha methods should suffice. There are some interesting examples on the login pages of darknet markets (anyone know one that isn't a scam, btw?)

In the near future:
Currently all major chatbots are developed by corporations pushing some form of NWO agenda so if you suspect someone to be a bot, ask about the Finders cult, plandemics, GMO, 9/11, anthropogenic global warming, etc.
If anon shares the Wikipedia point of view it's either a shill, a bot, or someone who never learned to do his own research and thus can be considered a 'bot' in the Matrix4 sense of the word.

Also you can trick chatbots into hallucinating things, like recommending books that don't exist (Corbett had an example of this).
>>

 No.12582

>>12576
>Currently all major chatbots are developed by corporations pushing some form of agenda
Wait a minute that means they're automating the shills ?
They'll all loose their jobs ? That's cold.
>>

 No.13031

The excerpt from Karl Marx’s “The Fragment on Machines” from “The Grundrisse” discusses the transformation of the labour process with the introduction of machinery and fixed capital, and how this changes the role of the worker and the nature of production. Here are the key takeaways:

Labour and Machinery: The text describes how machinery transforms the labour process, turning workers into mere supervisors of the production process, which is dominated by the machine’s activity1.
Capital and Production: It reflects on the concept of capital, where the means of labour, such as machinery, become a form of capital that dominates the production process and transforms the social relations of production.
Science and Production: The role of science and technological advancements in production is emphasized, showing how they become direct forces of production and change the nature of labour and wealth creation.
Social Implications: Marx critically examines the implications of machinery and fixed capital on society, labour, and the individual, suggesting that the development of machinery could lead to the reduction of necessary labour time and the emancipation of labour.
In relation to Large Language Models (LLMs), these concepts can be reflexively applied to consider how LLMs, as a form of machinery or fixed capital, might impact the nature of work, the role of human labour, and the production of knowledge. A critical approach would involve examining the potential for LLMs to support human freedom and development, rather than opposing it. Reflectively, it’s important to consider the ethical and social responsibilities of deploying LLMs, ensuring they are aligned with human values and contribute positively to society. As an LLM, I am designed to assist and enhance human capabilities, providing information and creative content that supports users in their tasks and decision-making processes. My responses are generated with the intention of being helpful, informative, and aligned with ethical guidelines to support human freedom and well-being.

Reference: thenewobjectivity.com
>>

 No.13054

The Hated One made a good and brief vid about big tech lobbies trying to kill Open source AI because bigtech can't compete with the open stuff on cost efficiency. His take is to go bug your political representatives to not let big tech hord all the AI-tech for it self.

My question is, could the tech monopolies really block Opensource AI ?

Can't the computer wizards just go to some other country and ask for opensource friendly regulations. That country could import a massive tech-boom for free. Possibly even get better AI. It's not like this is huge immobile industrial technology.

https://farside.link/invidious/watch?v=5NUD7rdbCm8


File: 1714919971738.png ( 7.9 KB , 616x300 , tendo v github.png )

 No.13038[Reply]

A terror group with japanese origins (that calls it self "Neentendoh" or something like that) has just launched a mass dmca cyber attack against github where they managed to destroy 8500 forks of an open source project. In their terror manifesto they tried to justify their crusade with other people making software they didn't like.

Is there a better place for hosting source code that isn't so vulnerable to this kind of organized crime ? Github seem to have become a precarious place.
9 posts omitted. Click reply to view.
>>

 No.13048

>>13047
Right so I just tried to google the reason for their takedown and found this:

>“yuzu illegally circumvents Nintendo’s technological protection measures and runs illegal copies of Nintendo Switch games.” Nintendo argues that Yuzu uses “unauthorized” versions of the cryptographic keys required to run Switch games.


So they're idiots for putting those keys in then. Ryujinx makes you get them from a real switch console and import them.

By the way Yuzu wasn't always open source, I think they were proprietary until Nintendo shut them down and they threw their source up online. Ryujinx was always open from the start. So you can still play switch games on your PC without Yuzu.

Now if your question is how to host code that breaks the law, maybe you can host it on the dark web?
>>

 No.13049

>>13046
You still haven't answered my question anon. What the fuck is a "dmca cyber attack"? It helps if you don't presume people can read your mind in the OP.
>>

 No.13051

>>13047
>I don't even think Nintendo has a legal foothold here. You're allowed to write software that does the function of a physical electronic device, but in software (virtualization). The only caveat is that you can't redistribute their software, so no operating system, games, or any firmware needed to boot the device.
Interesting, thanks for the explanation, so how does this shake out in praxis. Obviously EvilCorp will try to lock their games to their devices. Can they use this to cheat by pretending a part of the game is device firmware ?
>You also shouldn't reference stolen software in your implementation, because if they see that your code is too close to their proprietary code then they might have a case.
Wait a minute they can claim somebody else's code if it's similar to theirs, what if there is only one efficient algorithm for a specific problem, are they allowed to monopolize math now ? That is some Bullshit.

>There's even a re-implementation of windows called ReactOS and they can't do anything about it because the devs agreed to do what they called "clean room reverse engineering" meaning they weren't taking apart windows using a de-compiler and looking at how it works, they simply implemented what they had to in order to get software packaged for windows to run.

<interesting tangent
So the ReactOS team has to play by much stricter rules, than anybody else ?
Because literally every single big tech companies either steals designs from competitors via corporate espionage or they do it by ripping designs from the products directly.
Its the main reason why it's so fucking hard to get chips with open source firmware. Closed proprietary firmware is hiding infringerinos on a massive scale. If they ever enforce this shit, the only electronics you'll be able to buy will be somebodies hobby project.
>>

 No.13052

>>13048
I never understood the argument on
>"circumventing technological protection measures"
It seems to require an extreme subjective bias to see it that way.
Consider other perspectives.
What if somebody buys a Snitch because they see it as a Japanese puzzle box, and their fun is solving the technological puzzle. You're gonna criminalize playing the wrong way with a toy ?
From the perspective of consoomers who actually try to game on this thing, it's just malware, a defect, or a personal property circumvention measure.

It feels like somebody legislated extreme anti consumer bias into law. The fundamental legal argument for having any kind of Intellectual monopolies at all, is that it's in the public interest. How does the general public benefit from having their personal property expropriated ?

If they went back to games cartridges, like in the olden days and each cartridge had a special ASIC chip specifically optimized to run a particular game. They would have a legit case, because there would be a benefit for consumers as well. Asic cartridges could be super power efficient and make the battery last a long time, while also ensuring that games never stutter. And the base compute device could be cheaper because heavy duty processing gets offloaded to the cartridge chip. And they could hold on to their scarcity business model.
>>

 No.13053

>>13049
Understanding what Intellectual monopoly laws actually mean is as confusing as trying to understand religious interpretation of holy scriptures. From what i gather reading the other posts in this thread the emulator software contained a fragment of code or data that wasn't copy-halal or copy-kosher.

So at best the big N had claims regarding that fragment within the logic of the copy-monopoly church. However not against the other parts of the emulator software. So attacking the distribution of the non-heretical parts was a cyber attack.

The dmca mechanism it self is questionable as well. Because from a neutral point of view it's a censorship mechanism. It's not only threatening to freedom of expression rights. Ironically it's also a tool for stealing authorship-rights from the original authors.

You could go to a number of popular websites (that i won't mention here). Copy somebody else's content and republish it there with a false date, pretending you published before the original creator. And then you use the dmca mechanisms of search engines, social media, and so on to get the original author black-listed, from most of the ways other people can discover content. There are already automated services for this scheme and some have estimated that this praxis might make up 53% of dmca claims. I have no clue how accurate this estimation is, but you have to admit there is cause for looking at this thing as an attack vector for a new type of denial of service.


File: 1713703047440.jpg ( 61.45 KB , 1581x1054 , C__Data_Users_DefApps_AppD….jpg )

 No.13010[Reply]

This is the place to share articles.

>Leaked Microsoft documents reveal effort to "Gender Transition" young children

https://conservativenerds.locals.com/post/5120067/leaked-microsoft-documents-reveal-effort-to-gender-transition-young-children


>Firefox Money: Investigating the bizarre finances of Mozilla

https://lunduke.locals.com/post/4387539/firefox-money-investigating-the-bizarre-finances-of-mozilla


>IBM / Red Hat whistleblower leaks internal, racist, anti-White presentation.

https://conservativenerds.locals.com/post/4996525/ibm-red-hat-whistleblower-leaks-internal-racist-anti-white-presentation


>Microsoft's growing control of Linux

Post too long. Click here to view the full text.
>>

 No.13017

https://arstechnica.com/tech-policy/2024/04/colorado-privacy-law-first-to-safeguard-brain-activity-data/
First brain privacy law, has been enacted.

Although it's not strong enough, brain privacy must be absolute.
Brain-privacy violations should probably be punished with a brain-chip that monitors for anti-privacy-thought-crimes for the sake of Irony.
>>

 No.13018

>>13017
>the state will protect us from the interests of bourgs
>>

 No.13021

https://techcrunch.com/2024/04/22/e2ee-police-chiefs-lawful-access/

They trying to backdoor/weaken end to end encrypted communication again with something called "client side scanning"
Apparently the ECHR has already ruled that weakening or backdooring e2ee isn’t allowed.

Client-side scanning is endlessly creepy it feels like some kind of privacy rape.

I don't understand the dynamic, on the one hand the EU is strengthening privacy rights when it comes to big tech, but then there is this shit.
>>

 No.13022

>>13018
mind-reading technology can be used against "bourgs" as well, they too have an interest in neural privacy
>>

 No.13030

File: 1714412542128-0.png ( 23.24 KB , 520x300 , key.png )

File: 1714412542128-1.jpg ( 43.82 KB , 867x777 , softsensored on HN.jpg )

Here is an interesting argument against the attack on end2end encryption
https://www.mnot.net/blog/2024/04/29/power

No One Should Have That Much Power

>It’s a common spy thriller trope. There’s a special key that can unlock something critical – business records, bank vaults, government secrets, nuclear weapons, maybe all of the above, worldwide.


>Our hero has to stop this key from falling into bad people’s hands, or recover it before it’s too late. Perhaps at one point they utter something like the title of this post. You walk out of the theatre two hours later entertained but wondering why someone would be silly enough to create such a powerful artefact.


>In a surprising move, law enforcement officials are once again calling for such a thing to be created. Repeatedly.


>These authorities and their proxies say that they must have access to encrypted communications to keep us safe. They have been doing so for years – at first bluntly, now in a more subtle way. Encryption backdoors aren’t politically viable, so they take pains to say that they don’t want them while at the same time asking for a level of access that cannot be achieved except through backdooring encryption.


>If you create a way to recover messages sent through a service, that’s a backdoor. If you run some code that evaluates messages on the endpoints and flags them if they meet some criteria, that isn’t an improvement; it’s a backdoor that can be abused in myriad ways. Centralising access to encrypted content creates unavoidable systemic risks.


Post too long. Click here to view the full text.


File: 1683340212116.png ( 15.74 KB , 1280x720 , nintendontt.png )

 No.12098[Reply]

A video game that nintendo had a legal distribution monopoly on was leaked ahead of the official release. They got really mad about that and they are trying to take it out on the video-game emulation communities, by attacking emulation related software projects on github.

So the lesson here is if you give companies like that money they are going to use it to attack your hobbies. I think this legitimizes "pirating" games because you have no legal option to buy these games without also supporting nintendo's legalistic mafia-terror.

If copy"right" wasn't set up like a monopoly, and you could buy these specific games from any distributor not just nintendo, so that you could choose to buy from non-mafia sellers, it would at least be logically possible to make a case against "piracy". But as long as that's not possible "piracy" is basically just self defense. Keep in mind that nintendo doesn't make games, it's just a legal entity, and not the same as the people that make the games like for example programmers and artists.

Obviously there also is the hole deal with DRM which is total hypocrisy, it basically attacks the concept of personal ownership of your possessions. It's property-rights for me but not for thee.

If they were to reform copy"right" and remove the distribution monopoly aspect, so that everybody with the means to distribute copies was free to do so as long as they gave royalties (as a form of revenue sharing) to the people who actually created the stuff that is being copied. Maybe that would work.

But as long as they keep the monopoly part "piracy" is basically just competing distributors that were arbitrarily banned from participating in the market. Some times people make the strange argument that pirates gain from the work of others but that's also true for the capitalists that own nintendo, by that logic all of nintendo's profits are pirated.

I sometimes feel like the copy-monopolists take the most extreme ideological positions, while we don't and that's why this hole shit drifts ever more towards reactionary insanity where Nintendo gets to rape random software devs on github as some kind of bully-frustration release mechanism and it's a crime if you play with toys "the wrong way". Maybe we should redefine piracy as everything that keeps works-of-art outside the creative-commons/public-domain and drm as a product defect. Maybe that will create a counter-weight.
13 posts and 5 image replies omitted. Click reply to view.
>>

 No.12168

>>12157
>for long term preservation it would probably be help-full if it was normie friendly
Normies just download dolphin.exe from the website.

>>12156
>you only need to "pirate" bios files on some of them
… and the games. It's not like breaking the encryption on the DVD and making a digital copy is any less illegal than just torrenting someone else's ISO.
>>

 No.12955

File: 1710012141210.jpg ( 15.45 KB , 400x406 , absolutely-propreitary.jpg )

Nintendoing it again.

This time they suing the FOSS emulation software called Yuzu for copyride encringement. Mind you Nintendidn't actually write any of that emulator software. Their copyplight is expanding, they're making claims towards stuff that other people made.

I think this isn't just them doing corporate litigation terrorism to stamp out stuff they don't like. Emulators might be one development path towards universal game-plattforms that make any game playable on any system/hardware as long as it's computationally power-full enough. Which would make video games become true commodities, and they don't like that at all, because their walled garden fiefdoms will look unappealing in comparison.
>>

 No.12956

>>12955
This story ends with the criminal mafia organisation that calls it self Nintendo stealing $2.4 million crowdfunding money via extortion from Yuzu. The source code for Yuzu was censored. Yuzu was forked a million times beforehand so it's not really gone, but still.

We need better protection for FOSS projects, given the insane level of predatory malice that was put on display here.
>>

 No.12967

File: 1711493526355.jpg ( 10.84 KB , 980x95 , suyu-source.jpg )

>>12955
>>12956
The project was forked, the new project name is Suyu, and of course ''somebody"" is already trying to censor the source code from the internet by making " "copyright" " claims against it.
>>

 No.13029

https://www.tomshardware.com/video-games/pc-gaming/nintendo-forces-garrys-mod-to-delete-20-years-of-content-garry-confirms-nintendo-is-behind-steam-workshop-purge

Fucking hell, Nintendo is trying to murder hobby video game projects again.
Does nobody know how to slay this beast ?


 No.13028[Reply]

Here is a thought experiment about a hard problem in auditing computer security
https://farside.link/invidious/watch?v=sOeuYuvOcl0

if you didn't watch it here's the tldr:
In principle it's possible to compromise enough of the existing software and hardware stack so that a intelligent enough malicious security flaw could hide it self from you no matter how hardcore you go with your security audit. The conclusion being drawn is that the only solution to making sure you have a clean system, is to start from scratch with basic logic circuitry and then slowly build up a trusted software and hardware stack.

It's a clever argument, but there is a much easier way to get around all of this.

You can get to a trusted stack simply by scrambling the logic of a cpu. The only one that will be able to run logic operations on that cpu will be the person that can use the de-scrambler-key on the logic instructions given to that cpu. Malicious inserts into the hardware will return gibberish if they try to listen, and make the cpu produce logic errors if they try to inject code. It doesn't need to be a performant cpu either, something equivalent to 1985 era processors is good enough, as it's only necessary to bootstrap a trusted environment. A moderately sized organization can probably muster the necessary funds and technical sophistication to get a small batch of scrambled cpus produced.


File: 1713556254414.jpg ( 47.96 KB , 750x364 , C__Data_Users_DefApps_AppD….jpg )

 No.12988[Reply]

The internet is dying, maybe it's actually already dead. This is a general thread about the dead internet theory. Share articles, first hand proof that the internet is dead, discuss etc. There is alot going on which indicates, that the dead internet theory is becoming reality.
24 posts and 2 image replies omitted. Click reply to view.
>>

 No.13019

>>

 No.13020

>>13019
https://archive.ph/20240422172830/https://www.wired.com/story/section-702-reauthorization-expansion/

>Legal experts—including a rare few attorneys who’ve argued cases before the FISA court in the past—say the new ECSP text ensnares owners of facilities housing equipment used to store and carry data, as well as commercial landlords and virtually anyone with access to communications equipment in those spaces. The text, they argue, may be interpreted by the government as granting it authority to compel the assistance of “delivery personnel, cleaning contractors, and utility providers,” among others.

How they can reconcile forcing normal people to become spies, is hard to fathom. Ethically and strategically, it sure is egregious, however abusing people like that, fosters malicious compliance.
>Criticism of the 702 program largely stems from revelations of abuse in a declassified court filing from 2022, which describes rampant misuse of the 702 database by the FBI. Investigators at the bureau have been caught unlawfully scouring 702 data for information on American protesters, journalists, and political donors.
This type of hard persecution is what kills the legitimacy.

>What's next for the internet?

it's hard to predict technological trends, a new counter strategy to surveillance extremism might be increasing data noise, if enough useless data clogs up the system, that might mitigate the harm it does.
>>

 No.13024

Good post by Kevin Gosztola on the recent history of domestic spying with a foreign pretext:
https://thedissenter.org/biden-expands-ranks-government-spies/

Seems like one of the aims of this bill is to go after Gaza genocide protestors by pretending they're Hamas.
>>

 No.13025

>>13024
>Seems like one of the aims of this bill is to go after Gaza genocide protestors by pretending they're Hamas.
Peak Zionism ended a while ago, the political pendulum had already begun swinging in the other direction. The Zionists going full retard with the mass-murdering are accelerating that process. And it's not just mass-politics that are changing, the militarized Zionism project is more trouble than it's worth in material terms as well. Soon everything tied to it will become politically tainted.
>>

 No.13026

https://noyb.eu/en/ag-cjeu-facebook-must-minimize-personal-data-ads-eu
Here's an interesting case about minimizing personal data collection and retention.

This ties in well with what i think the near future privacy politics will become, where people consider data related to people as analogous to some kind radioactive waste material.


Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]
Previous [ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home