[ home / overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / lgbt / R9K / dead ] [ meta ][Options]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Flag
File
Select/drop/paste files here
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble

| Catalog | Home

File (hide): 1612129656526.gif ( 2.28 MB , 224x240 , 1608608621350.gif )

[–]

 No.6724[Reply][Last 50 Posts]

This thread is only for feedback related to technical issues(bug reports, suggestions). Otherwise use >>>/meta/10032

Public Repo: https://github.com/towards-a-new-leftypol/leftypol_lainchan
If you have any grievances you can make a PR.

Mobile Support: https://github.com/PietroCarrara/Clover/releases/latest
Thread For Mobile Feedback: >>>/tech/6316

Onion Link: http://leftychans5gstl4zee2ecopkv6qvzsrbikwxnejpylwcho2yvh4owad.onion
Cytube: https://tv.leftychan.net
Matrix: https://matrix.to/#/#Leftypol:matrix.org
Once you enter, consider joining the lefty technology room.

We are currently working on improvements to the site, subject to the need of the tech team to sleep and go to their day jobs. If you need more immediate feedback please join the matrix room[s] and ask around. Feel free to leave comments, concerns, and suggestions about the tech side of the site here and we will try to get to it as soon as possible

Post too long. Click here to view the full text.
204 posts and 58 image replies omitted. Click to expand.
>>

 No.13471

Hello. Can you add an inv.nadeko.net video proxy? In fact, can you make it the default way to watch videos?


File (hide): 1706129539265.jpg ( 360.33 KB , 1024x1024 , 1700467342513079.jpg )

[–]

 No.12876[Reply]

Hello, faggots, thanks to our unwavering dedication to the community I am proud to announce we are rolling out our own, official, leftychan.net i2p address.
You can locate the eepsite @ http://leftychmxz3wczbd4add4atspbqevzrtwf2sjobm3waqosy2dbua.b32.i2p, or, http://leftychan.i2p/.
If you have any trouble, as stated on the news announcement, try manually adding the address and domain to your address book.

-Yours Truly.
10 posts and 1 image reply omitted. Click to expand.
>>

 No.13342

>>13341
What do you mean? there's no more risks using i2p than anything else. If you mean "What are the vulnerabilities located in i2p? I am unsure what if any exist but I am sure some exist. You probably could locate some on the website or forums. But it has advantages over tor which is why using it over tor is encouraged. tor is just more normie friendly and can be good for the lower autism score people.


File (hide): 1748344663668.jpg ( 125.33 KB , 1080x1349 , 1662988369368814.jpg )

[–]

 No.13509[Reply]

/g/ what do you use to browse through your large music collection? I have 500GB of OPUS files and I don't want to keep using Foobar it looks like shit + i don't want to spend hours installing themes and setting everything up. Are there any other options???
>>

 No.13510

If your main complaint is the way it looks I can't help you. I use quodlibet and it's a little ugly but functional. I've tried every other app on Linux and settled on this one over the years.


File (hide): 1747681615096.png ( 1002.94 KB , 768x768 , d778b3eb-04ee-4c4a-ae82-39….png )

[–]

 No.13496[Reply]>>13501

I believe both sides can be quite extreme so here's my balanced take:
>supplementary use of AI (chatbots, TTS, NPCs, enemy AI, RPGs, level generation, self-driving cars, AI assistants and code generation) are pretty based actually as long as they produce correct outputs and don't get you into any legal trouble
>non-commercial use of AI is also fine and can create something unique and interesting (memes, AI covers, AI dubbing)
>AI art is mostly slop except for some rare exceptions so people should at least be able to easily filter it and it should be marked appropriately
>commercial use of AI other than what was already mentioned is NOT cool and leads to more layoffs, more enshittification, more plagiarism and more mass surveillance
>proprietary AI software is ALSO not cool since it can be spyware that sends your data to the NSA
4 posts omitted. Click to expand.
>>

 No.13501>>13502

>>13496
The biggest genuine successes in AI are the projects that try to solve problems with narrower scope.

There was a project for simulating protein folding on a computer, it proved too complex to be solved by the standard programming approach, but with machine-learning ai approach it got solved with sufficient accuracy to be genuinely useful. Compared to the aspirations of general AIs that are supposed to do "everything" this was a very specific task with clearly defined constraints. And it was done at relatively low cost with a small amount of GPU cards.

I think we should go that route. Instead of trying to make AIs do everything, we should break it down into lots of relatively narrow scope tasks and build up a collection of task-specific AIs that can be combined for more advanced stuff.

I think this would work well for coding AIs. You could have lots of different Code-Ais similarly like you load a bunch of software-libraries in software development.
>>

 No.13502

>>13501
>The biggest genuine successes in AI are the projects that try to solve problems with narrower scope.
That's what I'm saying.
>I think we should go that route. Instead of trying to make AIs do everything
Tell that to the bourgeoisie who invest into it.
>>

 No.13505

[Embed]
Very nice video. I liked it.

Also, holy shit, is Ghibli AI so cool.
>>

 No.13506

[Embed]
>>

 No.13508

[Embed]


File (hide): 1741019325182.png ( 19.11 KB , 600x200 , cloudflare.png )

[–]

 No.13402[Reply]

For an entire month now, Cloudflare has been discriminating against alternative web browsers to the Google hegemony by refusing to "verify" them as legitimate browsers through their browser check loop. On some browsers this has been blatantly malicious by designing the loop to hang indefinitely while it rapidly consumes all of the user's memory until a program crash. This has included Palemoon, Librewolf, Waterfox, IceCat, Seamonkey, Falkon, and more. Basically it seems like anything that isn't a subservient Chrome fork or Firefox itself is being gatekept out of the web by Cloudflare. The likelihood that this is being done deliberately is high because a) they have been doing it for an entire month, b) the entire time they have refused to respond to developers reaching out asking them to fix it, and c) Cloudflare themselves have stated that their secret proprietary methods of fingerprinting "human" browsers are tailor-fit to each browser. Some links following this story:
https://forum.palemoon.org/viewtopic.php?f=3&t=32045
https://news.ycombinator.com/item?id=42953508
https://soylentnews.org/article.pl?sid=25/02/07/044225
http://techrights.org/n/2025/02/20/Instead_of_DoS_Protection_Cloudflare_is_Allegedly_Conducting_Do.shtml

In only the span of a few years, DDoS "protection" services have grown to exert so much control over the web that they can now play kingmakers in browser competition and coerce user choice. We need a solution to the DDoS protection racket more than ever. What can be done about this?
3 posts and 2 image replies omitted. Click to expand.
>>

 No.13484>>13485

Something caught my eye recently in the on-going Cloudflare discussions on the Palemoon forums. In response to some of Cloudflare's demands to be an "approved" browser, the lead dev of Palemoon writes the following:
>In fact, from my own inspection of web logs to check bot behaviour, it seems these automation APIs inside browsers is exactly what is being used to drive a good portion of bots (a majority seems to be running on top of automated Chromium instances!); so we're actually against giving bots the tools to abuse the web by refusing to make this available, and I'm against even having this implemented at all in our platform.

https://forum.palemoon.org/viewtopic.php?f=65&t=32190&start=80

In other words, in order to pass their browser verification checks, Cloudflare is strongarming browser developers to put the very tools into their browsers that make it easy for people to create the bots that Cloudflare is supposedly there to protect websites from. People have asserted in the past that Cloudflare essentially operates as a protection racket. I haven't seen a better case made for it than this.
>>

 No.13485

>>13484
Interesting.
>>

 No.13503>>13504>>13507

Recently Cloudflare really is the most bothersome tick to deal with. The fact of how this is silicon valley selling protection against a silicon valley made problem is unsettling. That's something the mafia would do. I think this protection Cloudflare is providing to it's customers is working, but yes, the way they do it is malicious towards the user. A complete Denial of Service for users wanting to block traffic towards Cloudflare, when visiting a site not owned by Cloudflare is the the text book definition of a gatekeeper. "If we can't calculate the unique fingerprint of your browser and send them to our servers, you will not pass" is what I'm getting from this. There are other ways of protecting a site from bot traffic. The ones mentioned in this thread remind me of the 'Cypher Punks' ideology.
Links (1994):
https://groups.csail.mit.edu/mac/classes/6.805/articles/crypto/cypherpunks/may-virtual-comm.html
https://groups.csail.mit.edu/mac/classes/6.805/articles/crypto/cypherpunks

And the book 'Age of Surveillance Capitalism, Zuboff', also comes to mind. But these days basically everything internet related reminds me of this book.

> What can be done about this?


I guess don't rely on the internet, if possible. Wait and pressure governments to outlaw this way of business… yeah who am I kidding here. I guess there is no simple answer to a complex problem.
>>

 No.13504

>>13503
If the problem to solve simply was bots causing too much load on web-servers, one could use a protocol that makes everybody a load-sharing node, that way the bots would not matter, because they too would have to be load sharing.

But i get the impression there is more going on here.
>>

 No.13507

>>13503
I never put that together that it was silicone valley fixing something created by silicone valley.


[Embed]
[–]

 No.13257[Reply]>>13494

I know I am a little bit late to the party with this but some "anonymous" group tried to cancel rms and the FSF as well: archive.md/Pt37W (stallman-report.org). It's the usual shit: whining about Stallman's comments on Epstein, supposed "sexual harassment" etc. Basically, the author calls for Stallman to step down from the FSF and/or for FSF members to take him down.

It is already known who wrote this "report": Drew DeVault, a developer who worked (or still works?) on Wayland. https://news.ycombinator.com/item?id=41859793
1 post omitted. Click to expand.
>>

 No.13263

We've been discussing it here:
>>13230

Thankfully the culprit was exposed quickly and isn't garnering a lot of sympathy. It looks like this is going to fizzle out more quickly this time, especially after the controversy just ignited over the US attacking worldwide free software collaboration.
>>

 No.13489>>13490

Looks like wreckers are still wrecking.
>invite kind old man to give talk about software freedom
>immediately turn around and kowtow to bully demands of cancellation while hiding behind "inclusivity"

https://libregraphicsmeeting.org/2025/news/2025-05-06_0002-keynote-announcement-richard-stallman/
https://libregraphicsmeeting.org/2025/news/2025-05-07_0001-keynote-will-not-go-forward/
>>

 No.13490

>>13489
Embarrassing
>>

 No.13494>>13495

>>13257
why are FSF and Stallman even considered synonymous, it's not like he even has much more than a loose association as the guy who writes free software rants. FSF does many things which don't involve Stallman at all.
>>

 No.13495

>>13494
>why are FSF and Stallman even considered synonymous
The FSF bases its software philosophy on Stallman's writings. It was Stallman who came up with the four software freedoms.


File (hide): 1747069981424.jpg ( 126.1 KB , 1080x720 , dbrand_grass1.jpg )

[–]

 No.13491[Reply]

Post bizarre/amuzing device accessories you found.

https://www.theverge.com/news/638284/dbrand-touch-grass-skin-tablet-smartphone-handheld-console
<April Fools’ 2025: Dbrand’s new skins let you ‘touch grass’ without the hassle of going outside
dbrand just committed WatchMojo and redeemed itself in my eyes.


File (hide): 1742852896663.jpg ( 161.5 KB , 1024x1024 , OIG1.jpg )

[–]

 No.13446[Reply]

Why just about nobody seems to care about risk of strong solar storm on the scale of the carrington event?

Why there are no procedures made, spare transformers produced, emergency food and supplies stored around major cities, etc?

People care about climate change risks slowly damaging civilization over decades, and here we have risk (also scientifically and historically proven) that can just randomly disable worldwide electricity next year (extremely unlikely) or during the next 200 years (LIKELY) and we are doing nothing?

What is the logic in this? "Unlike climate change it will happen randomly, it may happen in 2054 or 2077, we may be already dead, we don't care"?
(No, nobody said that, I'm just trying to imagine reasons needed to ignore the issue).

Do you care about people who are now small children?

"It will PROBABLY not happen during my remaining lifetime, I'm fine with only 10% risk of dying from hunger or disorder among collapsing civilization"?

What is the logic here? What is the plan?

Post too long. Click here to view the full text.
5 posts omitted. Click to expand.
>>

 No.13473

>>13470
>Billionaires fly to climate conferences in their private jets
That's phenomenal hypocrisy, I'll give you that.

The rich really do act as if climate change wasn't real, but it's because they think that their wealth will insulate them from the consequences. Which may or may not be true.
>>

 No.13474

>>13467
>There's also no historical precedent of a solar storm wiping out an electrical grid
In the late 1980s there was one in Canada that wiped out the grid for 6 mil people.
>>

 No.13481>>13482

Europoors have no power rn, they initially blamed "atmospheric effects". I'm not sure what the latest reasons given are but OP may have been onto something.
>>

 No.13482>>13483

>>13481
I doubt the outages that hit Spain, Portugal and parts of France, were caused by a sunstorm, because no satellites were affected.

Officially the cause is still under investigation, what ever that means. Anyway the outage lasted less than a day, that makes it a medium whoop, not a big whoop. All the important stuff like hospitals tend to have backup generators that can bridge a period like this easily.
>>

 No.13483

>>13482
Ah so power is back that's good


File (hide): 1683340212116.png ( 15.74 KB , 1280x720 , nintendontt.png )

[–]

 No.12098[Reply]

A video game that nintendo had a legal distribution monopoly on was leaked ahead of the official release. They got really mad about that and they are trying to take it out on the video-game emulation communities, by attacking emulation related software projects on github.

So the lesson here is if you give companies like that money they are going to use it to attack your hobbies. I think this legitimizes "pirating" games because you have no legal option to buy these games without also supporting nintendo's legalistic mafia-terror.

If copy"right" wasn't set up like a monopoly, and you could buy these specific games from any distributor not just nintendo, so that you could choose to buy from non-mafia sellers, it would at least be logically possible to make a case against "piracy". But as long as that's not possible "piracy" is basically just self defense. Keep in mind that nintendo doesn't make games, it's just a legal entity, and not the same as the people that make the games like for example programmers and artists.

Obviously there also is the hole deal with DRM which is total hypocrisy, it basically attacks the concept of personal ownership of your possessions. It's property-rights for me but not for thee.

If they were to reform copy"right" and remove the distribution monopoly aspect, so that everybody with the means to distribute copies was free to do so as long as they gave royalties (as a form of revenue sharing) to the people who actually created the stuff that is being copied. Maybe that would work.

But as long as they keep the monopoly part "piracy" is basically just competing distributors that were arbitrarily banned from participating in the market. Some times people make the strange argument that pirates gain from the work of others but that's also true for the capitalists that own nintendo, by that logic all of nintendo's profits are pirated.

I sometimes feel like the copy-monopolists take the most extreme ideological positions, while we don't and that's why this hole shit drifts ever more towards reactionary insanity where Nintendo gets to rape random software devs on github as some kind of bully-frustration release mechanism and it's a crime if you play with toys "the wrong way". Maybe we should redefine piracy as everything that keeps works-of-art outside the creative-commons/public-domain and drm as a product defect. Maybe that will create a counter-weight.
25 posts and 7 image replies omitted. Click to expand.
>>

 No.13476

Nintendo is such shit that super mario bros crashes on the switch:

https://x.com/LuigiSidekick/status/1900072261555458205
>>

 No.13477>>13478

Eh, who cares about Nintendo games other than Nintendo fans, right? I just pretend Nintendo isn't real.
>>

 No.13478>>13479

>>13477
>who cares about Nintendo games other than Nintendo fans
agreed
>I just pretend Nintendo isn't real.
they're doing a lot of "lawfare", as in they sue people and organization for made-up BS excuses, just to attack them.
>>

 No.13479

>>13478
>they're doing a lot of "lawfare"
It doesn't affect me so I stopped caring.
>>

 No.13480

Moved to >>>/ga/12278.


File (hide): 1743770829147.png ( 338.14 KB , 576x337 , Screenshot 2025-04-04 at 0….png )

[–]

 No.13452[Reply]>>13475

How does Play Ransomware gain initial access to a victim’s network? How i can get its decryption keys
>>

 No.13453

> How does Play Ransomware gain initial access to a victim’s network?

Stolen credentials or exploiting remote execution vulnerabilities.

> How i can get its decryption keys


Pay up.
>>

 No.13475

>>13452
idk that much but for decryption keys i'm pretty sure theres nothing you can do


Delete Post [ ]
[ home / overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / lgbt / R9K / dead ] [ meta ]
Previous [ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home