• 0 Posts
  • 21 Comments
Joined 1 year ago
cake
Cake day: August 14th, 2023

help-circle


  • to the downvote brigade I highly recommend go watch the full video and decide for yourself

    Yeah it’s obvious she’s weaponizing the police against a guy who she doesn’t like, by knowingly playing directly into the “police will overreact against a black guy” card, and faking panic in her voice. This is violent escalation to a non-violent situation. The faked panic is straight up sociopathic.

    People who don’t leash their dogs are assholes, and his response to that was relatively tame.

    I don’t see how you can watch this and respond the way you have, unless you’re also the type of asshole who feels entitled to walk dogs without leashes, or generally dislike black people, or are completely oblivious to the social context in which police in New York interact with black people.



  • The order to block Twitter went to all Brazilian ISPs, and Starlink is the only one that didn’t comply on Saturday. So the escalation stems from the disregard of an order that everyone was required to obey, but the intertwined nature of both companies being controlled by Musk is both part of the reason why SpaceX would even consider not complying with local law in a country it operates in, and why the Brazilian courts seem to be willing to aggressively enforce their own orders.

    Edit: I’m convinced. This comment as originally written presented the facts out of order.







  • I think the comment is specifically talking about storing future times, and contemplating future changes to the local time zone offsets.

    If I say that something is going to happen at noon local time on July 1, 2030 in New York, we know that is, under current rules, going to happen at 16:00 UTC. But what if the US changes its daylight savings rules between now and 2030? The canonical time for that event is noon local time, and the offset between local time and UTC can only certainly be determined with past events, so future events defined by local will necessarily have some uncertainty when it comes to UTC.



  • They did, eventually. The first PlayStation was relatively easy to pirate for (with a mod chip), but it took a while for that stuff to become available. Someone had to go and manufacture the chips, or reverse engineer the check.

    By the time that scene matured, Sega released the Dreamcast right into a more sophisticated piracy scene that could apply lessons learned to the Dreamcast right away.

    On paper, Sega had more sophisticated copy protection than the first PlayStation did. But it also released 4 years later.


  • you could go to your local library and carry a USB stick.

    I don’t remember it this way. Nothing else came close to the portable storage capacity of CD (and thus CD-R and CD-RW). The iomega zip drive was still a popular medium, allowing rewritable 100mb or 250mb cartridge. That was the preferred way to get big files to and from a computer lab when I was an engineering student in 2000.

    USB flash drives had just been released in 2000, and their capacity was measured in like 8/16/32mb, nowhere near enough to meaningfully move CD images.

    Then again, as a college student with on-campus broadband on the completely unregulated internet (back when HTTP and the WWW weren’t necessarily considered the most important protocols on the internet), it was all about shared FTP logins PMed over IRC to download illegal shit. The good stuff never touched an actual website.



  • Um, nobody is talking about chemically converting the released carbon dioxide back into chemical compounds with stored chemical energy, like hydrocarbons and graphite. They’re talking about physically sequestering CO2, or binding the carbon into materials that aren’t combustible (like calcium carbonate).

    Put another way: if I burned some hydrocarbons in a fireplace and put a balloon over the flue, I’d capture some carbon dioxide (and probably some water) in that balloon, and the carbon in that balloon would’ve cost me less energy to capture than was released in burning the hydrocarbons to begin with. So long as I could keep the balloon from leaking or deflating.





  • Things might be different by now, but when I was researching this I decided on the Yale x Nest.

    It’s more secure than a keyed lock in the following ways:

    • Can’t be picked (no physical keyhole).
    • Codes can be revoked or time-gated (for example, you can set the dog walker’s code to work only at the time of day they’re expected to come by).
    • Guest codes can be set to provide real-time notifications when used.
    • The lock keeps a detailed log of every time it’s used.
    • The lock can be set to automatically lock the door after a certain amount of time.

    It’s less secure than a physical traditional lock in the following ways:

    • Compromise of a keycode isn’t as obvious as losing a key, so you might not change a compromised keycode the same way you might change a lost key.
    • People can theoretically see a code being punched in, or intercept compromised communications to use it.
    • Compromised app or login could be used to assign new codes or remotely unlock

    It’s basically the same level of security in the following ways:

    • The deadbolt can still be defeated with the same physical weaknesses that a typical deadbolt has: blunt force, cutting with a saw, etc.
    • The windows and doors are probably just generally weak around your house, to where a determined burglar can get in no matter what lock you use.
    • Works like normal without power or network connection (just can’t be remotely unlocked or reprogrammed to add/revoke codes if not online)

    Overall, I’d say it’s more secure against real-world risk, where the weakest link tends to be the people you share your keys with.