• 0 Posts
  • 21 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle
  • All of those are still standing on Firefox’s shoulders and the actual rendering engine on the browser isn’t really trivial thing to build. Sure, they’re not going away, and likely Firefox will be around too for quite a while, but the world wide web as we currently know it is changing and Google and Microsoft are few of the bigger players pushing the change.

    If you’re old enough you’ll remember the banners ‘Best viewed with <this browser> on <that resolution>’, and it’s not too far off from the future we’ll have if the big players get their wishes. Things like google suite, whatever meta is offering and pretty much “the internet” as your Joe Average understands it wants to implement technology where it’s not possible to block ads or modify the content you’re shown in any other way. It’s not too far off from your online banking and other very much real life affecting services start to have boundaries in place where they require certain level of ‘security’ from your browser and you can bet that things which allow content modifying things, like adblocker, doesn’t qualify for the new standards.

    On many places it’s already illegal to modify or tamper DRM protected content in any ways (does anyone remember libdvdcss?) and the plan is to include similar (more or less) restrictions to the whole world wide web, which would say that we’ll have things like fediverse who allow browsers like firefox and ‘the rest’ like banking, flight/ticket/hotel/whatever booking sites, big news outlets and so on who only allow the ‘secure’ version of the browser. And that of course has very little to do with actual security, they just want control over your device and what content is fed to you, regardless if you like it or not.


  • I personally don’t, but many do. But it doesn’t matter, my employer isn’t legally allowed to read my emails, unless it’s a sort of an emergency. My vacation, weekend, short sick leave and things like do not qualify. And even then, if the criteria is met, it’s illegal to read anything else than strictly work related things out of my box.

    We even have a form where people leaving the company sign permission that their mailbox can be accessed by their team leader and without signature we’re not allowed to grant permissions to anyone, unless legal department is on the case and terms for privacy breach are met.


  • This is the same as complaining that my job puts a filter on my work computer that lets them know if I’m googling porn at work. You can cry big brother all you want, but I think most people are fine with the idea that the corporation I work for has a reasonable case for putting monitoring software on the computer they gave me.

    European point of view: My work computer and the network in general has filters so I can’t access porn, gambling, malware and other stuff on it. It has monitoring for viruses and malware, that’s pretty normal and well understood need to have. BUT. It is straight up illegal for my work to actively monitor my email content (they’ll of course have filtering for incoming spam and such), my chats on teams/whatever and in general be intrusive of my privacy even at work.

    There’s of course mechanisms in place where they can access my email if anyting work related requires that. So in case I’m laying in a hospital or something they are allowed to read work related emails from my inbox, but if there’s anything personal it’s protected by the same laws which apply to traditional letters and other communication.

    Monitoring ‘every word’ is just not allowed, no matter how good your intentions are. And that’s a good thing.



  • I don’t have answer for you, but Alec over at Technology Connections made a video few days ago related to the topic. That might not have the answer for you either, but as his videos (and there’s a ton of those, even for refridgerators) are among of the best at youtube that is worth cheking out.

    But as a rule of thumb, new materials and hardware are better on pretty much every metric. And if your current one doesn’t work properly anymore it’ll most likely uses way more power than it should, as coolant flow/insulation/something isn’t in fully working condition and thus compressor needs to run more often than on a new unit.


  • My ecotank died just like all the other inkjets. It went few weeks without printing and blue nozzle dried completely up and on the pipes I can see dried up ink on other colors as well. So I had to dig up old Brother HL3040 back to the duty which I retired after print quality started to drop (it needs new fuse unit or something similar, so not that big of a deal) and I thought having an option to print nice color pictures would be nice.

    So, if you plan to run ecotank (which does have pretty good printing quality when it works) set up a scheduled task on your computer to print something, in color, quite frequently even if it wastes some ink and paper. I think the main issue with mine was that even if I print stuff somewhat often there was a period where I only needed b&w documents so color nozzles went unused for a while.

    I might get a new set of nozzles and ink tanks for my unit as it’s a ton cheaper than a whole new printer, but if you’re looking for a printer this is something to take into consideration, regardless of their marketing material.

    Edit: Mine is Epson, didn’t know that ecotank term is used by other manufacturers.


  • The command in question recursively changes file ownership to account “user” and group “user” for every file and folder in the system. With linux, where many processes are run as root and on various other accounts (like apache or www-data for web server, mysql for MySql database and so on) and after that command none of the services can access the files they need to function. And as the whole system is broken on a very fundamental level changing everything back would be a huge pain in the rear.

    On this ubuntu system I’m using right now I have 53 separate user accounts for various things. Some are obsolete and not in use, but majority are used for something and 15 of them are in active use for different services. Different systems have a bit different numbers, but you’d basically need to track down all the millions of files on your computer and fix each of their permission by hand. It can be done, and if you have similar system to copy privileges from you could write a script to fix most of the things, but in vast majority of cases it’s easier to just wipe the drive and reinstall.


  • Also a big(ish) issue for the industry. Local news had info that up to 80% of natural berries are picked up by foreginers. For majority of the pickers these gigs are pretty big source of income (compared on what they make back at home) but then there’s the few rotten apples who end up renting accommodiation, cars and everything to the pickers so that pretty much all of their earnings go back to the person providing work. Or that they don’t pay up at all and everything else in between. I’m not sure if that qualifies as human trafficking if pickers end up going back home empty handed, but that’s been an (relatively small, but existing) issue here.

    Human trafficking is of course a big deal, but from the ones who end up in our forests picking berries the slavery-like conditions and long work days with next to nothing paid in return is a more common problem. And even if it’s more common it’s still a relatively rare problem.



  • Logging depends on the instance. Many admins choose to not log any data which could be used to identify any individual, but verifying their claims (without a doubt) as a single user is pretty much impossible and there’s nothing stopping an instance admin of gathering all the data (s)he wants to.

    Like are they protected or encrypted so the hackers can’t use them ?

    Passwords are encrypted, but in case of a security breach on an instance they are still vulnerable, like with any other password leak. Majority of the systems today use one way encryption with their passwords, but still millions and millions of user accounts are leaked almost daily.

    Also what is stoping the instance owners from abusing or selling these behind our back ?

    Nothing.

    or running a modded version of lemmy are they detectable ?

    If done properly, no, you can’t detect them.

    But that’s not any different from any of the services around the net. Companies like Meta and Google make their money by selling user data, advertisers track you and all the other things you’re most likely already aware of.

    Administrator of my instance said that they don’t gather IP addresses or any other data they don’t need to keep the servers running and I trust them on that, but your mileage may vary. And then there’s different legal systems around the world where an admin might be forced to give out information about individual user, but where I live that’s not a thing.


  • According to my spotify wrapped I listened to about 2500 different artists. Yearly subscription is 143,88€, so if spotify took 30% and ther rest is split equally to every artist they’d get a nice 0,0578€ from me each. For your $26 that’d mean on similar math that you’d need ~450 listeners, so it’s atleast nearby the ballpark if you have 1000 streams on there.

    I obviously omitted things like VAT and other taxes, payment processor fees and complexity of revenue streams in general, like how long I listened to each to keep it simple.

    I’m not saying if that’s fair or not, I just did quick and rough math around the data I had easily available. All I know is that for that half a cent per artist I’m not providing anything to anyone but I receive quite a lot every day.

    For more detailed info you can check spotifys own report.


  • Bare feet are a bit clickbaity on the headline. That alone doesn’t mean much, but when it happens on a area where you should have full protective gear at the (supposed to be) sterile part of the manufacturing it’s of course a big deal. But it would be equally big deal if you just stroll there in your jeans and t-shirt with boots you stepped on a dog shit on your way to work. And even then it’s not even close of being the biggest issue on manufacturing where they constantly ignored all of the safety protocols, including ignoring test results which told them that the product is faulty.


  • There’s also 30 second clip showing how the thing is built and it is pretty much scale mail -style pieces with an single pixel e-ink style display (apparently that’s not really e-ink, but something similar). That’s not something I would call ‘fabric’. Embedding electronics to clothing isn’t a new idea and it has been done by hobbyists and professionals over and over again with different solutions, this is just one more.

    I don’t doubt her claim, she sewed the dress and the components on top of it, but that’s still not something I would call ‘dynamic clothing’. If I hot glue an E-ink display on my baseball cap and mount batteries + arduino on it would that be dynamic clothing? With some definition, maybe, but in my opinion the story claims to be a bit more than that.