[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Captcha
Tor Only

Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Discord

| Catalog | Home

 No.12452[Reply]

https://farside.link/invidious/watch?v=NfhFBSraDSM

So apparently Apple gave in and let right to repair legislation go through, after fighting against it tooth and nail for at least a decade, after engineering lots of anti-repair "features" like proprietary screws, and digital spare-part incompatibility mechanisms for controllers, buttons and sensors.

Now many people think something is up, and that they might have hatched a new scheme.
5 posts and 1 image reply omitted. Click reply to view.
>>

 No.12458

File: 1694711031857.jpg ( 50.27 KB , 1120x839 , 1691908608293032.jpg )

>>12456
The oculus rift is not AR nor is it capable of it. What Apple's headset will do is superimpose images on top of your real vision and perfectly track it in 3d space.
A real life example is how they put graphics on football fields in live action video of games. creating the illusion that the graphic is really painted on the ground.
But this headset will go far beyond that. Imagine being able to complete complex tasks far beyond your skill set because you can have the headset walk you through it as though a master technician were present.
Imagine looking at a car engine and then having wrench appear on the bolt you need to loosen, turning in real time in front of you as if it were being demonstrated to you in real life, and then every step in the process illustrated to you in the same way.
And like I said, humans remember things spatially the best.
Imagine being able to store your computer files by placing virtual folders in your real life bookshelf.
I know it sounds silly but it's going to expand people's ability to recall information exponentially.
>>

 No.12459

>>12458
Apple's head-set might technically be capable to do all those things, but Apple will never let that thing become a sufficiently open platform for any of that cool stuff to happen.

>Imagine being able to store your computer files by placing virtual folders in your real life bookshelf.

Especially this bit, you'll have to jailbreak that thing and install some kind of gnu linux OS on it in order to experiment with cool user interface concepts. Apple will just implement a few hand-motion tracking gestures derivative of touchscreen gestures for a slightly modified ios-UI and call that revolootionary.
>>

 No.12460

>>12459
>Apple's head-set might technically be capable to do all those things, but Apple will never let that thing become a sufficiently open platform for any of that cool stuff to happen.
They already demonstrated this in their ads. None of this requires an open platform.
>Apple's head-set might technically be capable to do all those things, but Apple will never let that thing become a sufficiently open platform for any of that cool stuff to happen.
It's in their ads that this is what it will be able to do. You'll leave something virtually on your coffee table and it will remain there when you boot up the headset again.
They showed some watching television and the television remains fixed in the middle of the living room as a the person gets up.
>>

 No.12461

>>12459
>Especially this bit, you'll have to jailbreak that thing and install some kind of gnu linux OS on it in order to experiment with cool user interface concepts.
Why? The whole point of this headset and AR in general is to present information completely in 3d. You'll be able to walk around an object. Several doctors will be able to examine a 3d scan of your body at once.
We loose an incredible amount of information when you present it on screens, I'm telling you this will be a watershed. Tons of things will become obvious that were never before. Kind of line how scientists argued whether horses galloped with all four legs or two at a time. It seems so obvious now but before movie camera we could never prove it.
>>

 No.12463

Rossmann had a doomer-pill moment, he worries repair could be going away and "undo his legacy"
https://farside.link/invidious/watch?v=oMPxr7I90JM

His argument for this is that he thinks that machine-capital for producing tech-gadgets will get optimized to the point of being fully depreciated after a production-run is complete. He thinks that this would negate the economic viability for making spare parts of letting the production machine run a little longer because parts can be sold for profit as well. However most production machine-capital isn't product specific anymore, save for a few specialist components like plastic-molds. Most of the stuff in a production line gets re-used for other stuff once a product-batch has completed. There are costs involved in puzzling together a modular production line, and because of that the economic viability to getting extra profits off a line from spare-parts remains.

Repairing tech will not go away, because it costs less labor to repair than to build new. You have to consider more than just the last manufacturing step. The entire supply-line that precedes that last step does not have to spring into action if you repair, but it does if you build new instead. The age of just throwing shit out and buying new, even for tiny defects, was only viable because for a limited time there was near endless cheap labor in Asia.

Repairing also reduces waste-streams and resource consumption. The cost of those are going to go up, new resource extraction will get more expensive, considering that you either have to dig deeper or go into space, recycling also isn't free and it's probably going to get more expensive to throw shit out because dealing with trash gets harder too.

If you look at the technology design from the perspective of a physicist, a machine is a collection of matter with low internal entropy. If you use the machine the internal entropy increases. If you don't want the machine to fail, you have to somehow remove "chaos-energy". That can be done in the form of cooling. But one particularly effective way is to replace wear-parts, where the "chaos-energy" is concentrated into.

There are structural developments that favor repair too. The biggest hindrance for repair has always been managing parts logistics, but computer-data-bases and object-storage-automation have removed that hinPost too long. Click here to view the full text.


File: 1693674101988-0.jpg ( 27.75 KB , 585x612 , balloonship.jpg )

File: 1693674101988-1.jpg ( 22.89 KB , 613x530 , airsub.jpg )

File: 1693674101988-2.jpg ( 35.61 KB , 1362x622 , blimp-plane.jpg )

 No.12437[Reply]

Veritasium made a video about "airships"
https://farside.link/invidious/watch?v=ZjBgEkbnX2I

And it appears that he fell for the old airship-con. The con works by pretending that these things are analogues to ships floating on the ocean. But they aren't like ships at all. Ships sit between the boundary layer of two media, usually air and water. They're stuck in the vertical axis and can only move in 2 dimensions. That allows for a relatively simple control scheme and much optimization.

Air"ships" on the other hand should really be called Air-subs, because they behave more like submarines that move in at least 3 dimensions and usually only touch a single medium. They need a much more elaborate control scheme that leaves a lot less room for optimization. Why relatively intelligent people tend to get fooled by this is somewhat a mystery, even if you don't understand any of the physics. So called Air"ships" don't even look like ships, they look more like Submarines, and you don't need to fill ships with a special gas or liquid to make them float.

Submarines only have a few niche applications, like military, deep ocean research and suicide-cans for rich adventure tourists. Similarly Air-subs will also only have niche applications.

Veritasium says that there is potential for mass-cargo-transportation. But there isn't, all viable mass-cargo transportation methods have one thing in common, The ratio of cargo-to-vehicle skews very far towards cargo. Airsubs will never be able to do that. You'll always need a lot of Airsub for relatively little cargo. At least in earths relatively thin atmosphere. Maybe on Venus with it's dense atmosphere this would be viable, and Airsubs will have their day once we begin colonizing the upper atmosphere of Venus with sky-cities.

The reason why the idea of Airsubs is still so magical is because they promise "Free lift". Filling up lots of gasbags with hydrogen or helium probably isn't the way to get it. But there might be another way, that is derived from hot-air blimps. Hot-air-balloons and blimps use large fuel burners to heat up air inside a bag. Hot Air is lighter than cold air hence you get lift. Every airplane has a source of free heat, the waste heat from the propulsion engine. It might be possible to blend Air-planes and blimps in order to recover waste-heat and use it for free lift.Post too long. Click here to view the full text.


File: 1622406356878.png ( 534.36 KB , 744x714 , 1622393067264.png )

 No.8869[Reply]

$10 GPUs for everyone!
5 posts and 1 image reply omitted. Click reply to view.
>>

 No.8910

File: 1622546763018.gif ( 457.73 KB , 200x150 , 1611967314908.gif )

>>

 No.8925

Muahaha now storeshitters and japs have to suffer as I did back in the day
y do I habe to suffer w/ them doe?
>>

 No.12433

>>8869
good job united states for forcing diversity in the chip market. if china figures out how to produce, for example, the equivalent to a gtx 1050ti for cheaper and cheaper and releases it on the global market, it will fuck up nvidia dominance and force them to lower prices thanks to laws of supply and demand. I really look forward to it, honestly.
>>

 No.12434

>>12433
Nvidia, Ati/Amd started out making cards for gaming and then later transitioned into server/supercomputer compute-cards.

China's GPU makers had the reverse development of western GPU makers. They started out with compute-cards and they are now trying to also do gaming cards.

While you are correct that they will relatively quickly become price competitive with western offerings on a bench-mark performance basis because the compute-market is hyper competitive, game compatibility and driver quality will take a very long time. It requires cultivating a detailed understanding of all the game engines.

Go look at old forum posts of people trouble shooting game compatibility and driver-bugs to get an idea what it's gonna be like. I think that chinese Gpus will become an option for people willing to put up with that stuff.
>>

 No.12435

>>12434
it will still affect the economy. China is a huge gaming market, and Alibaba has their own hosting that is bigger than amazon. im not saying it wont be buggy, but its going to change things in the next 10 years


File: 1690725830487.png ( 227.19 KB , 1088x696 , crptography.png )

 No.12345[Reply]

The regime that is occupying the UK continues it's terror campaign against encryption privacy and democracy
https://www.eff.org/deeplinks/2023/07/uk-government-very-close-eroding-encryption-worldwide

TLDR:

They are trying to make impossible legal requirements like
<privacy respecting surveillance
<secure encryption with a backdoor
Which makes about as much sense as a freedom preserving prison.

This invasive democracy destroying "internet regulation bill" has not yet passed through the institutions, so if you're living in Bongland go yell at politicians ( more than 80% of UK citizens are on your side) Maybe that'll do something.



But I'm making this thread for another reason.
Post too long. Click here to view the full text.
6 posts omitted. Click reply to view.
>>

 No.12428

>>12417
>Isn't there a way to do quasi invisible encryption that looks like random unused data ?
There are plausible deniability tactics that you can use, but they're so niche and so restricted, that you'll basically have a machine for single use. Not only that, but if the bait system doesn't look like it's used, then they're also going to suspect something. If it's serious enough for you to go that far for using systems like this, it's serious enough for them to torture you for information.
>>

 No.12429

>>12418
I don't disagree with you, but in practice, everything the state could do to a citizen for the retrieval of data they deem to be important for national security will be gotten this way. Of course, I don't delve much into the cryptonerd space because, while it is a lot of fun to think about how cool it would be for the NSA/FBI/CIA to be unable to break your system, chances are that the worst that's going to happen to it is that it gets stolen and sold for the hardware that carries it, and not for the actual information you have inside. The most valuable files I have are .rmvb files with anime from 2004. Now that was real fansubbing.
>>

 No.12430

>>12428
So you seem to be saying. That we need a political movement to create deterrence against torture. Like fore example punishing torture with the death penalty. And a similar, albeit less severe, logic needs to be applied to political intimidation. We need to take the barbaric option from the table.

>There are plausible deniability tactics that you can use, but they're so niche

I think that unbreakable encryption is basically a requirement for privacy. However not all attacks against privacy are obvious and straight forward. The attempt to make effective privacy a legal liability, is the use of law-fare against privacy. While that is crazy illegal, and requires a political correction. It would be prudent to harden cryptographic privacy to withstand more than just technical deciphering attacks.

You say that making encryption invisible is not practical enough, idk. maybe that's a technical feature that could be enhanced to make it more practical. However if that's not possible are there other options ? For example can you make an encrypted vault that spits out decoy data if a coerced cipher key is used to decode it. My priority here is about rendering coercion moot. In this example with the decoy data, the utility would be to make it futile to beat a cypher-key out of people in order to render such barbarism impotent.
>>

 No.12431

>>12429
>the retrieval of data they deem to be important for national security
Maybe that's also a lie. Maybe there is no such important data.
>>

 No.12432

>>12345s
>Since as societies we can't abandon secure and private communications because that is indispensable for democracy, how can people resist this terror once institutions go bad ?
Steganography
>Is there deniable encryption ?
Yes, steganography
>And where is this coming from, who are the criminal actors pushing for this ?
The intelligence community and fascists amongst the political class
>Are we fighting the political battles the wrong way by making general political appeals ?
That's only a tool in the toolkit
>Should we be focusing our political energies against these specific criminal threat-actors instead ?
The threat is so expansive that it would require toppling the state to uproot completely.


File: 1692655966035.png ( 81.84 KB , 600x374 , emerge-desktop[1].png )

 No.12410[Reply]

Do you guys remember when you could have different shells on Windows? I 'member. They're all gone now.
1 post and 1 image reply omitted. Click reply to view.
>>

 No.12413

>>12411
I'm talking about graphical shells, anon. You used to be able to rice windows like you do GNU/Linux.
>>

 No.12414


i don't 'member, only the default ones on XP
>>

 No.12415

File: 1692720740738.jpg ( 126.33 KB , 1280x720 , maxresdefault[1].jpg )

>>12414
XP had some interesting shells. I had the Cairo Desktop on that. It was the only way to get multiple desktop spaces. Nowadays Windows comes standard with them. I never did manage to get a shell with spinning cubes and wobbly windows, though. Now that shit, I was really into.
>>

 No.12419

>>12413
What you can't do this anymore? I have 1 windows machine and it's souly for gaming.
>>

 No.12420

>>12419
I haven't found any that work on Win7, which was the first time I upgraded windows since XP, and I don't have Win11 because it won't run on my AMD chad CPU. All of my other computers run GNU/Linux except my one Windows laptop that is used exclusively for work. It's kind of sad, but the level of control MS now has over Users' computers is too much for anyone to waste time developing shells for it, especially since MS has implemented most of the features people wanted from these shells.


File: 1691375928861.png ( 183.13 KB , 907x849 , ClipboardImage.png )

 No.12378[Reply]

Hexbear and Lemmygrad are now federated
>>

 No.12379

How does this work? Aren't they only accessible over tor?
>>

 No.12383

>>12379
It's just a reddit style site but different instances of the site can talk to each other. lemmygrad is lemmygrad.ml and hexbear is hexbear.net (formerly chapo.chat which started because reddit banned chapotraphouse).

I guess as a user you can see posts from other instances and jnteract with them without leaving your instances website. Of course freedom of speech loving liberal instances are already defederating from communist ones like lemmygrad.
>>

 No.12384

>>12383
Ohhh I see.
So a a .onion website is still a .onion website but federated it can still communicate with a clear net instance.
>>

 No.12385

>>12383
So it's like mastodon
>>

 No.12386

>>12384
I think so, I haven't seen a federated onion site yet.

>>12385
Yes


File: 1624598884259.jpg ( 22.98 KB , 474x266 , windows 10 AME.jpg )

 No.9572[Reply]

Does anyone use Windows 10 Ameliorated/AME edition?

https://ameliorated.info/
47 posts and 5 image replies omitted. Click reply to view.
>>

 No.12373

>>12371
>Tho I don't know about licensing or contract law, does it have a conditional licensing feature ?
also, yes, as the use of engine is licensed, the devs can't do this "ransome-source" thing
>>

 No.12374

File: 1690872270266.png ( 7.42 KB , 267x318 , mononucleosis.png )

You boyos thought Wine was bad? Hold my beer.
>>

 No.12375

>>12374
Mono is just for C# fags making mobile apps, nobody uses this shit in linux space except maybe corpos who have C# monkeys on payroll.
>>

 No.12376

File: 1690991263053.jpeg ( 14.75 KB , 450x259 , haha.jpeg )

>>9576
always cracks me up how windows gatekeeps their stockholmed userbase cattle from the LTSC versions

sorry beta-testing pay-pigs, stable versions for business clients only
>>

 No.12377

>>12375
Sadly, a large number of game developers still use Microsoft's C# and .NET cancer, and then they release Linux "ports" over Mono.


File: 1685915877366-0.png ( 25.92 KB , 508x681 , Capturebin1.png )

File: 1685915877366-1.png ( 29.7 KB , 1060x436 , Capturebin3.png )

File: 1685915877366-2.png ( 17.1 KB , 221x592 , Capturebin2.png )

 No.12158[Reply]

so i'm motivated to planing to create a archive for threads and websites. thread and web writings that are important enough, have quality, and or can be used to counter western media and history naratives.

the archive i want to create for the threads is different from things like internet archive or things like that because i want to actually save all the file that is uploaded unlike regular archive where not every file and many that are uploaded in the thread were not saved in the archive.

if i can i want to make a website for this but i do not have any experience about creating website and coding nor can i do it. i also have special-ed mental that make me unable to learn coding like normal people so its hard.

my main plan is to use httrack and use every file format list from wikipedia and other websites, then copy that list to httrack file format selection thing

i want help from every people here, so if you can please send something
31 posts and 9 image replies omitted. Click reply to view.
>>

 No.12351

>>12349
No. I just used an in-built Kate function for moving all strings into one line, that's it.
>>

 No.12352

>>12351
wait so, wizard, you telling me that it is complete ? no deleting thing ?
>>

 No.12354

>>12352
yes ?
>>

 No.12364

>>12351
i will take it as a yes
>>

 No.12370



File: 1681485277429.jpg ( 62.53 KB , 900x500 , ancient comp.jpg )

 No.12079[Reply]

I'll start with a few examples:

>Proprietary Software can be secure

This is a slight of hand. In theory proprietary Software can of course be secure, but in praxis there is no way for you to find out which proprietary software is or isn't secure. So from the perspective of the user proprietary software can't be considered secure because there's no reliable way to tell.

>Proprietary Software is harder to hack because the source-code isn't open

This is a security by obscurity fallacy, that for some inexplicable reason is still in circulation. Exploitable software bugs are usually found by examining the behavior of executable binaries not the source code.

>Open source is secure

Not by default, there is no automatic security-magic in publishing code on git-hub/lab. However open-sourcing code means that it can be subjected to broad public scrutiny and hence it becomes possible for the users to know which software is or isn't secure.

>Security and privacy are not the same

This fallacy is widely parroted even by the security community. You, the human is a part of your computer security, without privacy, attackers can potentially learn enough about you to figure out psychological hacks to compromise your computer security by tricking you.

>Unbreakable cryptography

This is usually wrong in praxis because it doesn't factor in that most people will give up their cypher-key after the "low-tech-biological-deciphering-algorithm" broke their pinky-finger. Cryptography can only be considered secure if the encrypted-data-vault is obfuscated as random bits on a storage medium so that the existence of the encrypted data can be denied.
4 posts and 2 image replies omitted. Click reply to view.
>>

 No.12353

>>12346
>Am i missing something ?
Yes. It was done not with a smartphone but a stationary PC.
>>

 No.12356

>>12353
>stationary PC.
So a desktop box ?

Assuming the user hasn't plugged in a mic or a low impedance headphone, what are you using as microphone ?

Those cheapy speaker boxes that people usually use, have classD amps, while, efficient, low cost with reasonable audio fidelity, they have a terribly high noise-floor. I doubt that you can get usable audio capture from that.
A class-D amplifier or switching amplifier is an electronic amplifier in which the amplifying devices (usually MOSFETs) operate as electronic switches, and not as linear gain devices as in other amplifiers. They operate by rapidly switching back and forth between the supply rails, using pulse-width modulation and pulse-density modulation to produce a pulse train output.

That leaves the motherboard-beeper, which usually is just a piezo connected to a 5v IO pin that goes high-low-high-low square-wave at 500Hz. Can you get audio capture from that ?
>>

 No.12358

>>12330
You need to ascend anon, for your home wifi you need to disable the password, then set up some utility to clear up/reset the IP connection logs daily, and now you have plausible deniability on any download/connection that you make from your house

So far as phones and etc, ofc it is all fucked, but you can set up your home connection to be quite resilient against your internet provider snooping on you
>>

 No.12359

>>12346

You can just desolder the microphones/speakers (they have more than one), Snowden has got some youtube videos showing how it is done. Then if you want to have phonecalls you just plug in a set of earbuds and talk through there

You need then to research your phone model to see if you can disable the GPS and other things. But at these points the weakpoint stops being you, and it becomes wherever other retard that still uses whatsapp you are working with to setup the coup detat/assassination/thievery etc
>>

 No.12362

>>12359
>You can just desolder the microphones/speakers (they have more than one), Snowden has got some youtube videos showing how it is done. Then if you want to have phonecalls you just plug in a set of earbuds and talk through there
Interesting stuff

>to setup the coup detat/assassination/thievery etc

Lol imagine announcing a coup d'état by using phones, rather than couriers. Even technically super sophisticated spy agencies don't trust their communication technology for the sensitive parts of their operations.


File: 1690593101635.jpg ( 69.34 KB , 1200x800 , ankle-monitor.jpg )

 No.12338[Reply]

New attack on privacy is taking on a hole new dimension.

https://invidious.protokolla.fi/watch?v=BAiQnq6h6ao
https://www.youtube.com/watch?v=wKegmu0V75s
TLTW:The US congress has proposed a law that would require rc-drone pilots to broadcast the location of their rc-drone and their own location.

Never mind the drone stuff, this would be a precedent of mandating a tracking beacon that broadcasts your location. Such a mandate so far only exists for convicted criminals that have to wear a tracking ankle-monitor.

I think this is so egregious, that surveillance has to be re-categorized as a form of attack or assault. We ought to grant people a right to self-defense to preserve their privacy, analogous to the right to self defense against physical attacks. People should be granted the right to use very assertive measures to protect their privacy. (Going beyond the current passive defense of privacy)

Obviously privacy means the absence of surveillance
>>

 No.12339

>>12338
Having a transponder that squawks on a certain code is already standard in aviation, this seems like it's extending it to drones. I'm not that worried tbh.
>>

 No.12340

>>12339
I'm not opposed to a requirement of transponders for commercial drones. If those delivery drones ever become viable, there will probably arise a need for dedicated drone airspace corridors and possibly even some kind of flight-control system that directs what flight routes drones can take to prevent collisions.

However none of that is really relevant here. This law has a requirement for hobby drone pilots to not only have a drone-transponder, but in addition they also have to broad-cast the location of their person. This is a mandate for a personal tracking device.

Outside of a commercial setting, neither your personal stuff nor your person should be subjected to any kind of surveillance. And any attempt of subverting personal privacy should be frustrated with effective means.


Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / R9K / dead ] [ meta ]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home