[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Captcha
Tor Only

Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord

| Catalog | Home

File: 1693674101988-0.jpg ( 27.75 KB , 585x612 , balloonship.jpg )

File: 1693674101988-1.jpg ( 22.89 KB , 613x530 , airsub.jpg )

File: 1693674101988-2.jpg ( 35.61 KB , 1362x622 , blimp-plane.jpg )

 No.12437[Reply]

Veritasium made a video about "airships"
https://farside.link/invidious/watch?v=ZjBgEkbnX2I

And it appears that he fell for the old airship-con. The con works by pretending that these things are analogues to ships floating on the ocean. But they aren't like ships at all. Ships sit between the boundary layer of two media, usually air and water. They're stuck in the vertical axis and can only move in 2 dimensions. That allows for a relatively simple control scheme and much optimization.

Air"ships" on the other hand should really be called Air-subs, because they behave more like submarines that move in at least 3 dimensions and usually only touch a single medium. They need a much more elaborate control scheme that leaves a lot less room for optimization. Why relatively intelligent people tend to get fooled by this is somewhat a mystery, even if you don't understand any of the physics. So called Air"ships" don't even look like ships, they look more like Submarines, and you don't need to fill ships with a special gas or liquid to make them float.

Submarines only have a few niche applications, like military, deep ocean research and suicide-cans for rich adventure tourists. Similarly Air-subs will also only have niche applications.

Veritasium says that there is potential for mass-cargo-transportation. But there isn't, all viable mass-cargo transportation methods have one thing in common, The ratio of cargo-to-vehicle skews very far towards cargo. Airsubs will never be able to do that. You'll always need a lot of Airsub for relatively little cargo. At least in earths relatively thin atmosphere. Maybe on Venus with it's dense atmosphere this would be viable, and Airsubs will have their day once we begin colonizing the upper atmosphere of Venus with sky-cities.

The reason why the idea of Airsubs is still so magical is because they promise "Free lift". Filling up lots of gasbags with hydrogen or helium probably isn't the way to get it. But there might be another way, that is derived from hot-air blimps. Hot-air-balloons and blimps use large fuel burners to heat up air inside a bag. Hot Air is lighter than cold air hence you get lift. Every airplane has a source of free heat, the waste heat from the propulsion engine. It might be possible to blend Air-planes and blimps in order to recover waste-heat and use it for free lift.Post too long. Click here to view the full text.


File: 1622406356878.png ( 534.36 KB , 744x714 , 1622393067264.png )

 No.8869[Reply]

$10 GPUs for everyone!
5 posts and 1 image reply omitted. Click reply to view.
>>

 No.8910

File: 1622546763018.gif ( 457.73 KB , 200x150 , 1611967314908.gif )

>>

 No.8925

Muahaha now storeshitters and japs have to suffer as I did back in the day
y do I habe to suffer w/ them doe?
>>

 No.12433

>>8869
good job united states for forcing diversity in the chip market. if china figures out how to produce, for example, the equivalent to a gtx 1050ti for cheaper and cheaper and releases it on the global market, it will fuck up nvidia dominance and force them to lower prices thanks to laws of supply and demand. I really look forward to it, honestly.
>>

 No.12434

>>12433
Nvidia, Ati/Amd started out making cards for gaming and then later transitioned into server/supercomputer compute-cards.

China's GPU makers had the reverse development of western GPU makers. They started out with compute-cards and they are now trying to also do gaming cards.

While you are correct that they will relatively quickly become price competitive with western offerings on a bench-mark performance basis because the compute-market is hyper competitive, game compatibility and driver quality will take a very long time. It requires cultivating a detailed understanding of all the game engines.

Go look at old forum posts of people trouble shooting game compatibility and driver-bugs to get an idea what it's gonna be like. I think that chinese Gpus will become an option for people willing to put up with that stuff.
>>

 No.12435

>>12434
it will still affect the economy. China is a huge gaming market, and Alibaba has their own hosting that is bigger than amazon. im not saying it wont be buggy, but its going to change things in the next 10 years


File: 1690725830487.png ( 227.19 KB , 1088x696 , crptography.png )

 No.12345[Reply]

The regime that is occupying the UK continues it's terror campaign against encryption privacy and democracy
https://www.eff.org/deeplinks/2023/07/uk-government-very-close-eroding-encryption-worldwide

TLDR:

They are trying to make impossible legal requirements like
<privacy respecting surveillance
<secure encryption with a backdoor
Which makes about as much sense as a freedom preserving prison.

This invasive democracy destroying "internet regulation bill" has not yet passed through the institutions, so if you're living in Bongland go yell at politicians ( more than 80% of UK citizens are on your side) Maybe that'll do something.



But I'm making this thread for another reason.
Post too long. Click here to view the full text.
6 posts omitted. Click reply to view.
>>

 No.12428

>>12417
>Isn't there a way to do quasi invisible encryption that looks like random unused data ?
There are plausible deniability tactics that you can use, but they're so niche and so restricted, that you'll basically have a machine for single use. Not only that, but if the bait system doesn't look like it's used, then they're also going to suspect something. If it's serious enough for you to go that far for using systems like this, it's serious enough for them to torture you for information.
>>

 No.12429

>>12418
I don't disagree with you, but in practice, everything the state could do to a citizen for the retrieval of data they deem to be important for national security will be gotten this way. Of course, I don't delve much into the cryptonerd space because, while it is a lot of fun to think about how cool it would be for the NSA/FBI/CIA to be unable to break your system, chances are that the worst that's going to happen to it is that it gets stolen and sold for the hardware that carries it, and not for the actual information you have inside. The most valuable files I have are .rmvb files with anime from 2004. Now that was real fansubbing.
>>

 No.12430

>>12428
So you seem to be saying. That we need a political movement to create deterrence against torture. Like fore example punishing torture with the death penalty. And a similar, albeit less severe, logic needs to be applied to political intimidation. We need to take the barbaric option from the table.

>There are plausible deniability tactics that you can use, but they're so niche

I think that unbreakable encryption is basically a requirement for privacy. However not all attacks against privacy are obvious and straight forward. The attempt to make effective privacy a legal liability, is the use of law-fare against privacy. While that is crazy illegal, and requires a political correction. It would be prudent to harden cryptographic privacy to withstand more than just technical deciphering attacks.

You say that making encryption invisible is not practical enough, idk. maybe that's a technical feature that could be enhanced to make it more practical. However if that's not possible are there other options ? For example can you make an encrypted vault that spits out decoy data if a coerced cipher key is used to decode it. My priority here is about rendering coercion moot. In this example with the decoy data, the utility would be to make it futile to beat a cypher-key out of people in order to render such barbarism impotent.
>>

 No.12431

>>12429
>the retrieval of data they deem to be important for national security
Maybe that's also a lie. Maybe there is no such important data.
>>

 No.12432

>>12345s
>Since as societies we can't abandon secure and private communications because that is indispensable for democracy, how can people resist this terror once institutions go bad ?
Steganography
>Is there deniable encryption ?
Yes, steganography
>And where is this coming from, who are the criminal actors pushing for this ?
The intelligence community and fascists amongst the political class
>Are we fighting the political battles the wrong way by making general political appeals ?
That's only a tool in the toolkit
>Should we be focusing our political energies against these specific criminal threat-actors instead ?
The threat is so expansive that it would require toppling the state to uproot completely.


File: 1692655966035.png ( 81.84 KB , 600x374 , emerge-desktop[1].png )

 No.12410[Reply]

Do you guys remember when you could have different shells on Windows? I 'member. They're all gone now.
1 post and 1 image reply omitted. Click reply to view.
>>

 No.12413

>>12411
I'm talking about graphical shells, anon. You used to be able to rice windows like you do GNU/Linux.
>>

 No.12414


i don't 'member, only the default ones on XP
>>

 No.12415

File: 1692720740738.jpg ( 126.33 KB , 1280x720 , maxresdefault[1].jpg )

>>12414
XP had some interesting shells. I had the Cairo Desktop on that. It was the only way to get multiple desktop spaces. Nowadays Windows comes standard with them. I never did manage to get a shell with spinning cubes and wobbly windows, though. Now that shit, I was really into.
>>

 No.12419

>>12413
What you can't do this anymore? I have 1 windows machine and it's souly for gaming.
>>

 No.12420

>>12419
I haven't found any that work on Win7, which was the first time I upgraded windows since XP, and I don't have Win11 because it won't run on my AMD chad CPU. All of my other computers run GNU/Linux except my one Windows laptop that is used exclusively for work. It's kind of sad, but the level of control MS now has over Users' computers is too much for anyone to waste time developing shells for it, especially since MS has implemented most of the features people wanted from these shells.


File: 1681173353813.jpg ( 48.31 KB , 900x639 , internet archive under att….jpg )

 No.12073[Reply]

So apparently big publishers want to kill the internet archive again.

They accuse I.A. of having done a copywrong by lending out books. I won't bore you with the legal technicalities because i think it's just a pretext for publishers trying to kill a library because it's a cartel that wants a monopoly.

I think the lessons here are if you pay these people money, they're going to use it to attack nice things like the Internet Archive, and "copy-right" is nothing but a heinous weapon.

People who build archives to preserve the memory of the past are like really rare flowers, it's an incomprehensible act of barbarism to try to burn down their archives.

https://blog.archive.org/2023/03/25/the-fight-continues/
8 posts and 1 image reply omitted. Click reply to view.
>>

 No.12087

>>12082
Correct me if I'm wrong but I thought the whole principle of scientific inquiry was supposed to be based upon something like the open source ethic, otherwise the fundamental criteria of Peer Review would not be possible… right? Mind you I am talking about science before the advent of The Science™
>>

 No.12088

>>12087
>Correct me if I'm wrong but I thought the whole principle of scientific inquiry was supposed to be based upon something like the open source ethic, otherwise the fundamental criteria of Peer Review would not be possible… right?

Some parts of research are open, although many scientific papers are blocked off behind paywalls. Other parts of research are fully closed, like military secrets or commercial unpublished research. Science isn't merely research, it's also education. Scientific education is also only partially open, like you get some scientific education in public schools and some of it's also freely available online, but a sizeable chunk is pay-walled.

I think that there are conspiracies to disperse false information too. Like for example a few years ago the quantum computer industry all of a sudden started pushing bits of quantum-theory that had been refuted in the late 1980s.
<Science minutia start
There was an attempt to rule out all hidden variables theories using Bell's theorem. But as it turns out that Bell's theorem only rules out local hidden variables, while it does not rule out non-local hidden variables theories, like for example the de broglie-bohm interpretation of quantum theory.
The refutation came from: Carl H. Brans in February 1988
The paper is called "Bell's theorem does not eliminate fully causal hidden variables"
https://www.researchgate.net/publication/227200042
<Science minutia end
This erroneous bit of information has made it into scifi Television shows, various youtube edutainment and potentially even into some of the online science education services. I'm relatively sure that it's quantum computer companies doing this because the people who proliferate this, often say that they have consulted with people working in the quantum computer industry.

I've considered that it might be something motivated by ideology, like for example the physicist David Joseph Bohm was exiled for "unamerican activities" from the US by McCarthyism in 1951. I somehow doubt that quantum computer companies in the 21st century are still worried about something as moronic as "communist physics". Realist/Post too long. Click here to view the full text.
>>

 No.12395

This keeps happening.

https://blog.archive.org/2023/08/14/internet-archive-responds-to-recording-industry-lawsuit-targeting-obsolete-media/

<some of the world’s largest record labels, including Sony and Universal Music Group, filed a lawsuit against the Internet Archive and others for the Great 78 Project, a community effort for the preservation, research and discovery of 78 rpm records that are 70 to 120 years old.


<Of note, the Great 78 Project has been in operation since 2006 to bring free public access to a largely forgotten but culturally important medium. Through the efforts of dedicated librarians, archivists and sound engineers, we have preserved hundreds of thousands of recordings that are stored on shellac resin, an obsolete and brittle medium. The resulting preserved recordings retain the scratch and pop sounds that are present in the analog artifacts; noise that modern remastering techniques remove.


So it's ancient music where all the authors are dead, and it also crappy quality.
Clearly bad faith actors abusing the legal system to attack the internet archive.
>>

 No.12396

>>12395
Looks like everyone is trying to extract their pound of flesh from them now. These fucking idiots need to spin off the original Internet Archive from their other media activity right now, I do not want to see the most important preserver of web history destroyed over this shit.
>>

 No.12398

File: 1692382624947.jpg ( 143.4 KB , 1536x888 , rocket horse.jpg )

>>12396
You are probably right it would be legally prudent to do this.

However that's probably not going to be enough. These record labels might once have served a function for music distribution, today they are just predators and have to be killed off, otherwise this shit won't stop.
Check out this
https://torrentfreak.com/youtube-dl-site-goes-offline-as-hosting-provider-enforces-court-ordered-ban-230809/
There was an attempt to ban youtube-dl. Which is a piece of open source software. It's not even possible to pretend that software logic contains music. Their interpretation of copy-"right" is expanding into the absurd. They're basically on a trip of defining everything they don't like as violating "their IP". Or in legal terms they want their rights to extinguish yours.

I think the best business model today is musicians uploading their music online for free and when they get enough fans they become professionals that sell concert tickets and merchandise. This has made concert tickets very expensive but I've been and it's usually worth paying 50-150 bucks for the experience. For this you only need trademark law, no copy-ban crap. Capital accumulation is shifted away from music distributors to the musicians them self's and the companies that do the technical support and crowd-wrangling services for concerts as well as merch producers.

That said there still is demand for physical copies. There are loads of audiophiles that want lossless digital audio with all the features and all the fidelity, and they want it stored on indestructible memory crystals that will still work a thousand years from now. They like the take media from the collection and insert media in the machine ritual, as well as glowing electronic components. There are hundreds of research papers where scientists used lasers to store data in crystals, satisfying the durability and light-show aspect. That won't need either copy-ban or drm shit because those people want functional items for their collections. This could have been a chance for the old music distributors to survive but they decided to invest in legal copy-trolling instead of data-storage engineering. If the music crystals ever happen it'll be becausPost too long. Click here to view the full text.


File: 1691375928861.png ( 183.13 KB , 907x849 , ClipboardImage.png )

 No.12378[Reply]

Hexbear and Lemmygrad are now federated
>>

 No.12379

How does this work? Aren't they only accessible over tor?
>>

 No.12383

>>12379
It's just a reddit style site but different instances of the site can talk to each other. lemmygrad is lemmygrad.ml and hexbear is hexbear.net (formerly chapo.chat which started because reddit banned chapotraphouse).

I guess as a user you can see posts from other instances and jnteract with them without leaving your instances website. Of course freedom of speech loving liberal instances are already defederating from communist ones like lemmygrad.
>>

 No.12384

>>12383
Ohhh I see.
So a a .onion website is still a .onion website but federated it can still communicate with a clear net instance.
>>

 No.12385

>>12383
So it's like mastodon
>>

 No.12386

>>12384
I think so, I haven't seen a federated onion site yet.

>>12385
Yes


File: 1624598884259.jpg ( 22.98 KB , 474x266 , windows 10 AME.jpg )

 No.9572[Reply]

Does anyone use Windows 10 Ameliorated/AME edition?

https://ameliorated.info/
47 posts and 5 image replies omitted. Click reply to view.
>>

 No.12373

>>12371
>Tho I don't know about licensing or contract law, does it have a conditional licensing feature ?
also, yes, as the use of engine is licensed, the devs can't do this "ransome-source" thing
>>

 No.12374

File: 1690872270266.png ( 7.42 KB , 267x318 , mononucleosis.png )

You boyos thought Wine was bad? Hold my beer.
>>

 No.12375

>>12374
Mono is just for C# fags making mobile apps, nobody uses this shit in linux space except maybe corpos who have C# monkeys on payroll.
>>

 No.12376

File: 1690991263053.jpeg ( 14.75 KB , 450x259 , haha.jpeg )

>>9576
always cracks me up how windows gatekeeps their stockholmed userbase cattle from the LTSC versions

sorry beta-testing pay-pigs, stable versions for business clients only
>>

 No.12377

>>12375
Sadly, a large number of game developers still use Microsoft's C# and .NET cancer, and then they release Linux "ports" over Mono.


File: 1685915877366-0.png ( 25.92 KB , 508x681 , Capturebin1.png )

File: 1685915877366-1.png ( 29.7 KB , 1060x436 , Capturebin3.png )

File: 1685915877366-2.png ( 17.1 KB , 221x592 , Capturebin2.png )

 No.12158[Reply]

so i'm motivated to planing to create a archive for threads and websites. thread and web writings that are important enough, have quality, and or can be used to counter western media and history naratives.

the archive i want to create for the threads is different from things like internet archive or things like that because i want to actually save all the file that is uploaded unlike regular archive where not every file and many that are uploaded in the thread were not saved in the archive.

if i can i want to make a website for this but i do not have any experience about creating website and coding nor can i do it. i also have special-ed mental that make me unable to learn coding like normal people so its hard.

my main plan is to use httrack and use every file format list from wikipedia and other websites, then copy that list to httrack file format selection thing

i want help from every people here, so if you can please send something
31 posts and 9 image replies omitted. Click reply to view.
>>

 No.12351

>>12349
No. I just used an in-built Kate function for moving all strings into one line, that's it.
>>

 No.12352

>>12351
wait so, wizard, you telling me that it is complete ? no deleting thing ?
>>

 No.12354

>>12352
yes ?
>>

 No.12364

>>12351
i will take it as a yes
>>

 No.12370



File: 1681485277429.jpg ( 62.53 KB , 900x500 , ancient comp.jpg )

 No.12079[Reply]

I'll start with a few examples:

>Proprietary Software can be secure

This is a slight of hand. In theory proprietary Software can of course be secure, but in praxis there is no way for you to find out which proprietary software is or isn't secure. So from the perspective of the user proprietary software can't be considered secure because there's no reliable way to tell.

>Proprietary Software is harder to hack because the source-code isn't open

This is a security by obscurity fallacy, that for some inexplicable reason is still in circulation. Exploitable software bugs are usually found by examining the behavior of executable binaries not the source code.

>Open source is secure

Not by default, there is no automatic security-magic in publishing code on git-hub/lab. However open-sourcing code means that it can be subjected to broad public scrutiny and hence it becomes possible for the users to know which software is or isn't secure.

>Security and privacy are not the same

This fallacy is widely parroted even by the security community. You, the human is a part of your computer security, without privacy, attackers can potentially learn enough about you to figure out psychological hacks to compromise your computer security by tricking you.

>Unbreakable cryptography

This is usually wrong in praxis because it doesn't factor in that most people will give up their cypher-key after the "low-tech-biological-deciphering-algorithm" broke their pinky-finger. Cryptography can only be considered secure if the encrypted-data-vault is obfuscated as random bits on a storage medium so that the existence of the encrypted data can be denied.
4 posts and 2 image replies omitted. Click reply to view.
>>

 No.12353

>>12346
>Am i missing something ?
Yes. It was done not with a smartphone but a stationary PC.
>>

 No.12356

>>12353
>stationary PC.
So a desktop box ?

Assuming the user hasn't plugged in a mic or a low impedance headphone, what are you using as microphone ?

Those cheapy speaker boxes that people usually use, have classD amps, while, efficient, low cost with reasonable audio fidelity, they have a terribly high noise-floor. I doubt that you can get usable audio capture from that.
A class-D amplifier or switching amplifier is an electronic amplifier in which the amplifying devices (usually MOSFETs) operate as electronic switches, and not as linear gain devices as in other amplifiers. They operate by rapidly switching back and forth between the supply rails, using pulse-width modulation and pulse-density modulation to produce a pulse train output.

That leaves the motherboard-beeper, which usually is just a piezo connected to a 5v IO pin that goes high-low-high-low square-wave at 500Hz. Can you get audio capture from that ?
>>

 No.12358

>>12330
You need to ascend anon, for your home wifi you need to disable the password, then set up some utility to clear up/reset the IP connection logs daily, and now you have plausible deniability on any download/connection that you make from your house

So far as phones and etc, ofc it is all fucked, but you can set up your home connection to be quite resilient against your internet provider snooping on you
>>

 No.12359

>>12346

You can just desolder the microphones/speakers (they have more than one), Snowden has got some youtube videos showing how it is done. Then if you want to have phonecalls you just plug in a set of earbuds and talk through there

You need then to research your phone model to see if you can disable the GPS and other things. But at these points the weakpoint stops being you, and it becomes wherever other retard that still uses whatsapp you are working with to setup the coup detat/assassination/thievery etc
>>

 No.12362

>>12359
>You can just desolder the microphones/speakers (they have more than one), Snowden has got some youtube videos showing how it is done. Then if you want to have phonecalls you just plug in a set of earbuds and talk through there
Interesting stuff

>to setup the coup detat/assassination/thievery etc

Lol imagine announcing a coup d'état by using phones, rather than couriers. Even technically super sophisticated spy agencies don't trust their communication technology for the sensitive parts of their operations.


File: 1690593101635.jpg ( 69.34 KB , 1200x800 , ankle-monitor.jpg )

 No.12338[Reply]

New attack on privacy is taking on a hole new dimension.

https://invidious.protokolla.fi/watch?v=BAiQnq6h6ao
https://www.youtube.com/watch?v=wKegmu0V75s
TLTW:The US congress has proposed a law that would require rc-drone pilots to broadcast the location of their rc-drone and their own location.

Never mind the drone stuff, this would be a precedent of mandating a tracking beacon that broadcasts your location. Such a mandate so far only exists for convicted criminals that have to wear a tracking ankle-monitor.

I think this is so egregious, that surveillance has to be re-categorized as a form of attack or assault. We ought to grant people a right to self-defense to preserve their privacy, analogous to the right to self defense against physical attacks. People should be granted the right to use very assertive measures to protect their privacy. (Going beyond the current passive defense of privacy)

Obviously privacy means the absence of surveillance
>>

 No.12339

>>12338
Having a transponder that squawks on a certain code is already standard in aviation, this seems like it's extending it to drones. I'm not that worried tbh.
>>

 No.12340

>>12339
I'm not opposed to a requirement of transponders for commercial drones. If those delivery drones ever become viable, there will probably arise a need for dedicated drone airspace corridors and possibly even some kind of flight-control system that directs what flight routes drones can take to prevent collisions.

However none of that is really relevant here. This law has a requirement for hobby drone pilots to not only have a drone-transponder, but in addition they also have to broad-cast the location of their person. This is a mandate for a personal tracking device.

Outside of a commercial setting, neither your personal stuff nor your person should be subjected to any kind of surveillance. And any attempt of subverting personal privacy should be frustrated with effective means.


Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home