[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord

| Catalog | Home

File: 1623898644673.png ( 58.42 KB , 750x750 , 1623893016644.png )

 No.9320[Reply]

"essential"
12 posts and 2 image replies omitted. Click reply to view.
>>

 No.9943

>>9320
It matches the political compass
>>

 No.9955

>>9942
>>9336
Even le elon musk says that AI is harder than he thought. He keeps pushing back the timeline of self driving cars because there have been no breakthroughs in AI.
https://www.businessinsider.com/elon-musk-tesla-full-self-driving-beta-cars-fsd-9-2021-7?op=1&r=US&IR=T
>>

 No.9962

>>9444
imagine people dying of heatstroke because the power company raised the temperature in their sleep. the thought makes me shudder.
>>

 No.9975

>>9962
>imagine giving anybody remote control access to the temperature settings in your home
If you can't install your own firmware on your "smart" thermostat, so you have total control over your heater, you have to rip it out and replace it with a mechanical valve. The fact that this was even physically possible proves criminal intent.
>>

 No.9976

>>9975
We need GPLv3 thermostats!


File: 1608525969713.png ( 107.06 KB , 361x370 , 1588828817840.png )

 No.1663[Reply]

Oh god
oh fuck

I'm retarded.

I've never been tech-savvy, just a pleb consoomer and user, never digging deeper than what was on surface level.

But it seems to be, based on what I've been hearing for the past two years, that those who don't have a workable knowledge of it will simply be considered the illiterate of the 21st century.

What bare bones basic, and I'm talking like Primary School shit I'm just that dense, level stuff should I learn?

So far I've got:
- Linux (no fucking clue how I'm going to learn it)
- Python (seems accessible and is used in some GAN AIs which I find interesting, so kinda motivating)
- Ruby (it's easier Python, is it really worth it then?)
Post too long. Click here to view the full text.
64 posts and 12 image replies omitted. Click reply to view.
>>

 No.9569

>>9563
Are we really homogenous enough to write something like this?
Some regulars here still defend proprietary sofrware.
IMO the best option would be a wiki, but then again, we could just point people to https://wiki.installgentoo.com or mirror it while adding leftist content.
>>

 No.9571

>>8414
That's not how it works, ISPs and gov are not important players here. Data about us is collected by trackers and then resold by brokers to whoever. Of course that data is messy and takes some (automated) work to tie different data clusters to one single person (e.g. this facebook user is the same person as that myspace user from 10 years ago).

Technically a company could just buy that data on their own (unlikely) or use some kind of 3rd party service too look into your internet history. Kind of like a privatized social credit score or a psychological profile. This is already used by banks and insurance to calculate your trustworthiness. But when it comes to employers, right now they mostly use more primitive methods like simply googling you and checking your profile on Facebook or Twitter.

If you want to hide something from data trackers then Tor is a good bet IMO, as long as you learn how to stay uniform and not stand out. And especially don't login into Facebook and in the same session visit whatever you want to hide. Compartmentalization is key to a good opsec.
>>

 No.9621

>>9569
>mirror it while adding leftist content.
based
>>

 No.9970

>>1663
>illiterate of the 21st century
bro we've kinda passed that point. my godfather who is a complete autist managed to create his own 3d printer from pieces, it's right in his kitchen next to the sink. I have no idea how it exactly works but it looks crazy and apparently he just draws the stuff he wants printed out on a computer, pops in a few plastic plugs and that's it and this was about 10 years ago. His rich and hot as fuck wife divorced him after about half a year when she realized he wouldn't stop working for 12+ hours per day because he's now married. So yeah, besides extreme technerdness all the way since kindergarten being basically a requirement you also need to make these kinds of sacrifices to get close to those sort of levels.
>>

 No.9973

> CTRL-F "sql"
< 0 results

Keep sleeping leftypol.


File: 1625373083879.jpg ( 47.52 KB , 640x427 , baf67d975597a67d946fc15996….jpg )

 No.9789[Reply]

What's the worst that could happen to a laptop with whatever flavor of GNU/Linux that has been left alone for hours, besides getting stolen? Let's assume there's no screenlocker but still need a password for privilege elevation.
10 posts and 2 image replies omitted. Click reply to view.
>>

 No.9886

>>9878
maybe not if they could flash compromised bios or install some physical keylogger or other bugs?
(on the software level then yes?)
>>

 No.9945

>>9789
as long as your disk is unencrypted and no BIOS password is set it is easy to boot from a USB drive and access all your data
>>

 No.9946

>hard drive dump
>bruteforce dictionary attack
>bios specific vulnerability
>hardware keylogger (hard to do)
>swap out WiFi chip for compromised one
That's all I got
>>

 No.9951

>>9789
What a shit question. Depends on what was on it, duh. If you really want hypotheticals then I guess the absolute worst is that it could lead to nuclear holocaust.
>>

 No.9959

Someone might install Windows on it.


File: 1625357131193.jpg ( 45.43 KB , 665x629 , control rods.jpg )

 No.9781[Reply]

Audacity may collect "Data necessary for law enforcement, litigation and authorities’ requests (if any)" according to new privacy notice:
https://www.audacityteam.org/about/desktop-privacy-notice/
23 posts and 4 image replies omitted. Click reply to view.
>>

 No.9928

>>9922
I love this.
>>

 No.9929

>>9927
>Is this autism all for a name?
Not at all. It's typical mass bandwagoning. Probably started from trolling the forked repos on GitHub and getting banned for it to making their own meme fork that will see some basic activity for a few days then will die down when they realize nobody has the appetite to continue an old joke and /g/ moves on to harassing the next denegrate programmer transhumanist that catches their notice.
>>

 No.9931

File: 1625724773105.jpg ( 182.13 KB , 669x863 , pls go.jpg )

>>9929
You have to go back.
>>

 No.9936

>>

 No.9940

File: 1625783162636.jpg ( 45 KB , 340x430 , bwahahah.jpg )

>>9931
Why does he have to go back?
>>9929
So it's a little bit of everything? Honestly what does /g/ have to offer that the cookiemonster guy doesn't? Is it just a bunch of unfunny cunts forcing a joke that was only funny within the show's context?


File: 1625270550228-0.png ( 9.15 KB , 500x187 , rokfin.png )

File: 1625270550228-1.jpg ( 24.29 KB , 400x400 , panquake.jpg )

File: 1625270550228-2.png ( 20.89 KB , 320x320 , LBRY.png )

 No.9732[Reply]

How do we fight back against the crypto-tards? They currently have a monopoly on credibility at the moment and I'm fucking tired of it. With the increasing escalation of tech censorship over the last several years we have ourselves a golden opportunity to grow the communities of censorship-resistant decentralized federations, and the crypto scammers keep managing to siphon people off into their unsustainable pyramid schemes. Every time their spokespersons get thrown a softball interview and every time they seem completely incapable of articulating and justifying their system because, gosh, it's just too darn complicated for the average person to understand! And it seems like nobody is paying any fucking attention when this happens routinely because blockchain and electronic tulip bulbs are some magical mysterious technology that you have to do a doctoral dissertation to understand, but just trust us it works. How do we fight back against the anti-intellectualism of crypto woo?
7 posts omitted. Click reply to view.
>>

 No.9758

There are free alternatives to this crap OP. I think we need to push PeerTube more and stop using anything else.

>>9737
There's no proof that there aren't any good uses for blockchain, but at the moment, there are none.

This is a good criticism of blockchain. https://www.schneier.com/essays/archives/2019/02/theres_no_good_reaso.html
>>

 No.9772

>>9747
Didn't know about it, looks good I think.
>>

 No.9837

>>9742
it's a false dichotomy only if comparing random pyramid scheme shitcoins to paypal, but if you want to buy anything on the internet, and don't want to use a bank card (or don't have one), then cryptocurrencies are the way to go. They have a legitimate use here, mostly though for buying stuff you don't want traced. Not even just drugs. Also it's just effective for internet transactions. If you use monero, it's reasonably fast and anonymous. Way better than handing a website your whole bank card credentials and full name and address. I think that's pretty fucked and how you get your shit stolen or leaked when there's a hack of a service you use
>>

 No.9839

>>9739
Uygha just don't spend any money on the internet whatsoever. Use hard cash.
>>

 No.9917

You could call IPFS "blockchain based", I think thats a pretty good application. I also use Monero to buy drugs lol


File: 1625541609199.png ( 11.01 KB , 500x500 , 5658210d02e36434a2d244af15….png )

 No.9883[Reply]

Why are there no neural networks for making sure there isn't any hidden obfuscated malicious code in OSS yet?
3 posts omitted. Click reply to view.
>>

 No.9899

>>9883
because I will eventually poison it to accept my shitty patches.

>>9894
I don't think software 'engineering' can be regulated as linearly in other engineering disciplines. Laws of physics and heuristics humanities gathered are static whereas exploit writers are always adapting to changing environment. They are always interested in what existing tools and defense mechanisms cannot do not in what it prevents. Software engineering actually have lot more in common with 'financial engineering' when it comes to regulatory challenges and we all know how responsible they are.

Security through correctness has always been the way but even after Microsoft's decade worth investment in formal verification tools we do not have killer language or toolchain that is reasonably productive enough to be adopted in mass scale. Rust could fit the bill but I am skeptical of it for obvious reasons.
>>

 No.9900

>>9899
>I don't think software 'engineering' can be regulated as linearly in other engineering disciplines. Laws of physics and heuristics humanities gathered are static whereas exploit writers are always adapting to changing environment.
Wait a minute, the compiler optimizations that reduce the vulnerability to exploits don't have to be linear regulation, you are taking my building-code metaphor way too literally.

>Software engineering actually have lot more in common with 'financial engineering' when it comes to regulatory challenges and we all know how responsible they are.

No, lawyers write code that is executed by judges, bureaucrats and functionaries, not processors. Brains are not pure logic interpreters. Legal code does not work like software.

>>9899
>Security through correctness has always been the way but even after Microsoft's decade worth investment in formal verification tools we do not have killer language or toolchain that is reasonably productive enough to be adopted in mass scale.
I know about MS's code quality project, but you can't expect a big soul crushing corporation to foster real innovation. There is no way anything new could pass through the membranes of corporate administrations, too many people have made careers out of managing the half broken mess.
>Rust could fit the bill but I am skeptical of it for obvious reasons.
Yes that is the popular example but there's no reason other compilers can't have functionality of this type added. or you could even try to have a pre- compiler as a separate insert into the tool-chain.
>>

 No.9901

>>9899
>>9899
>we do not have killer language or toolchain that is reasonably productive enough to be adopted in mass scale
what ? powerful language that can be proven formally like LISP exists, they're just an unnecessary headache for most applications, and proving programs simply cost way too much when you can just fix it when you see its broken.
We will never, ever have a "reasonably productive enough" way to produce formally verified code, because its way too hard, long and costly.
>>

 No.9902

Don't certain sectors (automotive, locomotive, aerospace, medical, etc.) have their own "building code" style regulations? I did an internship at a company that worked on embedded software for railway signal control and they did have a very specific coding style and some functional requirements like everything had to be redundant. But I am not sure if these were state mandated or just the railway company wanted it this way.
>>

 No.9905

>>9900
>lawyers are not computers and codes are not legislature
I'm specifically talking about defensive programming and how is it similar to law makers failure to come up with sound plan to restrain hedge funds and other market makers not how human minds compare with processor or how legal frameworks can be compared with well defined runtime environment that runs binaries. Beside I said 'financial engineering' as in quants who have to price derivatives why are you even writing this? Wind will not blow in specific airflow with malicious intent to collapse bridge you built but rest assured traders competing with you is looking at everything you do waiting for opportunity to exploit weakness in your model or execution plan.

>MS rant

I'm not talking about their code quality project. I am pointing at their research efforts and its results on functional programming (their ocaml dialect F#), strong types (typescript) and formal verification framework (F* and obviously Z3). They all deserve some amount of criticism but just shrugging them away as corporatism is impotent.

>>9901
Well this is new. When did they invent automated tools to verify common lisp source code? how did they deal with macros?


File: 1623203634171.jpg ( 42.83 KB , 720x480 , 1564180497890.jpg )

 No.9055[Reply]

Youtubers who spike prices of old hardware should jump off a cliff, people out here thinking their shitty thinkpad that their dog pissed on is worth $500
18 posts and 1 image reply omitted. Click reply to view.
>>

 No.9557

>>9548
Well I just mention it because you raise an interesting point that you can only trust YOURSELF to do shit like this with your machines no one else.
>>

 No.9564

Are you that same retroomer who is always sperging out on /g/
>>

 No.9695

>>9513
Isn't it super easy to flash them again after they have been flashed once with libreboot?
>>

 No.9807

>>9695
this depends on the machine. again, check libreboot.org
>>

 No.9879

Thinkpads are so popular now I'm actually scared of buying one now. With my shitty luck I'd get one that's been tampered with.


File: 1624038678945.png ( 17.74 KB , 579x382 , 34567899876.png )

 No.9418[Reply]

Hello, tech, I'm looking to develop a leftypol textboard for the gemini protocol. I am curious about where I should get started, or, what language would be optimal for this. I also don't really understand how to get one language to interact with another language. (Gem text and Perl for example) I don't really want to do anything huge or something that will blow up I am just a hobbyist looking to do something fun and interesting. thoughts?
6 posts and 1 image reply omitted. Click reply to view.
>>

 No.9433

Extend this with gemini support
https://gitlab.com/naughtybits/schemebbs
>>

 No.9434

>>9433
Based.

Here's another textboard script that tries to remain as close as possible to 2channel but with a database and QoL features.
https://git.bienvenidoainternet.org/bai/weabot/
>>

 No.9709

>>9429
>That site looks like shi and is just one giant wall of topics and replies. The formatting is horrible.
Gemini markup doesn't give you many options for formatting, just some headings lists and links, and clients can render them all differently.
You're missing the point if your criticism of it is "it looks fugly".
>>

 No.9711

>>9709
I want something more structured like station.martinrue.org
>>

 No.9716

>>9418
>he was a windows user all along

oh no no no no no


File: 1624125455921.jpg ( 29 KB , 800x800 , 1615125387200.jpg )

 No.9456[Reply]

USB 3.0 (5Gb/s)
USB 3.1 gen 1 (5Gb/s)
USB 3.1 gen 2 (10Gb/s)
USB 3.2 gen 1 (5Gb/s)
USB 3.2 gen 2 (10Gb/s)
USB 3.2 gen 2x2 (20Gb/s)

Statements dreamed up by the utterly insane.
>>

 No.9465

>20Gb/s
You can get that with one fiber-optics cable. In principle they just need to bond a led on both ends of a fiber optical strand and put a signal converter chip on both ends of the cable to make it compatible with electrical ports. Eventually it could become cheap enough to stuff chips into cables, especial if the led and signal converter are integrate into one tiny piece of silicon, and you do something clever with the fact that microchip circuits are affected by light.
>>

 No.9516

>>9465
20 Gbps isn't even a problem with copper. regular RG-58 coax has about 30 GHz of bandwidth. it's just more expensive than twisted pair
>>

 No.9705

>>9456
Universal Serial Bussy


File: 1625130121380.jpg ( 37.62 KB , 900x506 , social-coercion.jpg )

 No.9689[Reply]

Nice, now I have to carry my fucking phone around with me every time I want to check my fucking work emails because some prick at IT decided to force everyone on to two-factor authentication in order to interact with the mail server. So much for choosing to opt out of mass surveillance and the socially-malignant perpetual connectedness of carrying a phone everywhere. So much for email being convenient.

It disgusted me when Google and other Silicon Valley monopolies started forcing 2FA on people because I see it as little more than an excuse to coerce people into giving up contact information to better track and surveil them. What's the real deal with two-factor authentication? Why is it seemingly impossible to find an article critical towards it on a simple web search?
1 post and 1 image reply omitted. Click reply to view.
>>

 No.9694

>>9692
>use the secure token
For some reason we have to try out all the insecure authentications, and only when all of that has failed is it allowed to do the secure thing and use a token
>>

 No.9696

>I see it as little more than an excuse to coerce people into giving up contact information to better track and surveil them
You aren't wrong, your IT department is retarded.
https://blog.cmpxchg8b.com/2020/07/you-dont-need-sms-2fa.html
>>

 No.9697

>Why is it seemingly impossible to find an article critical towards it on a simple web search?

We need to break this search engine monopoly over what information is available. It's amazing how you can't find anything critical about entrenched IT shit like "cloud", or 2FA or any reliable information about user data being sold except in obscure mailing lists and niche tech communities.
I hope searx takes off.

Also, "IT departments" are cargo cults a majority of the time. Just blindly following whatever is "recommended" to them through their infra provider like IBM or Oracle, or the cloud providers like AWS or Azure these days.
>>

 No.9702

>>9689
>an excuse to coerce people into giving up contact information to better track and surveil them
Use TOTP instead of SMS.
>Why is it seemingly impossible to find an article critical towards it on a simple web search?
Because 2FA is a good thing. Most people use insecure or reused passwords. Any competent IT department requires it because it massively reduces the risk of account compromise.
>>

 No.9703

I use this for github, no contact information needed, works offline, free software: https://f-droid.org/en/packages/org.shadowice.flocke.andotp/


Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home