Skip to content

Starlink tries to block Virginia’s plan to bring fiber Internet to residents

Technology
147 88 2
  • 439 Stimmen
    20 Beiträge
    9 Aufrufe
    B
    Mate, everyone knows who he is. His wife was fired from her federal job over this. He gave an interview with his real name. The feds can know where basically anyone is if they want to. If taco ordered the secret service to carry out an assassination, very little could be practically done to stop them. No one has real protection against law enforcement. Right now they're still staying within lines in a half-assed manner so they don't get pushback from stale liberals and (sometimes) antiauthoritarian snowflake regressives.
  • It's 2025, the year we decided we need a widespread slur for robots

    Technology technology
    81
    180 Stimmen
    81 Beiträge
    323 Aufrufe
    A
    Well you're cranky, aintcha.
  • 14 Stimmen
    33 Beiträge
    292 Aufrufe
    I
    Who said they need to retrain? A small modification to their weights in each copy is enough. That's basically training with extra steps.
  • 337 Stimmen
    19 Beiträge
    192 Aufrufe
    R
    What I'm speaking about is that it should be impossible to do some things. If it's possible, they will be done, and there's nothing you can do about it. To solve the problem of twiddled social media (and moderation used to assert dominance) we need a decentralized system of 90s Web reimagined, and Fediverse doesn't deliver it - if Facebook and Reddit are feudal states, then Fediverse is a confederation of smaller feudal entities. A post, a person, a community, a reaction and a change (by moderator or by the user) should be global entities (with global identifiers, so that the object by id of #0000001a2b3c4d6e7f890 would be the same object today or 10 years later on every server storing it) replicated over a network of servers similarly to Usenet (and to an IRC network, but in an IRC network servers are trusted, so it's not a good example for a global system). Really bad posts (or those by persons with history of posting such) should be banned on server level by everyone. The rest should be moderated by moderator reactions\changes of certain type. Ideally, for pooling of resources and resilience, servers would be separated by types into storage nodes (I think the name says it, FTP servers can do the job, but no need to be limited by it), index nodes (scraping many storage nodes, giving out results in structured format fit for any user representation, say, as a sequence of posts in one community, or like a list of communities found by tag, or ... , and possibly being connected into one DHT for Kademlia-like search, since no single index node will have everything), and (like in torrents?) tracker nodes for these and for identities, I think torrent-like announce-retrieve service is enough - to return a list of storage nodes storing, say, a specified partition (subspace of identifiers of objects, to make looking for something at least possibly efficient), or return a list of index nodes, or return a bunch of certificates and keys for an identity (should be somehow cryptographically connected to the global identifier of a person). So when a storage node comes online, it announces itself to a bunch of such trackers, similarly with index nodes, similarly with a user. One can also have a NOSTR-like service for real-time notifications by users. This way you'd have a global untrusted pooled infrastructure, allowing to replace many platforms. With common data, identities, services. Objects in storage and index services can be, say, in a format including a set of tags and then the body. So a specific application needing to show only data related to it would just search on index services and display only objects with tags of, say, "holo_ns:talk.bullshit.starwars" and "holo_t:post", like a sequence of posts with ability to comment, or maybe it would search objects with tags "holo_name:My 1999-like Star Wars holopage" and "holo_t:page" and display the links like search results in Google, and then clicking on that you'd see something presented like a webpage, except links would lead to global identifiers (or tag expressions interpreted by the particular application, who knows). (An index service may return, say, an array of objects, each with identifier, tags, list of locations on storage nodes where it's found or even bittorrent magnet links, and a free description possibly ; then the user application can unify responses of a few such services to avoid repetitions, maybe sort them, represent them as needed, so on.) The user applications for that common infrastructure can be different at the same time. Some like Facebook, some like ICQ, some like a web browser, some like a newsreader. (Star Wars is not a random reference, my whole habit of imagining tech stuff is from trying to imagine a science fiction world of the future, so yeah, this may seem like passive dreaming and it is.)
  • Right to Repair Gains Traction as John Deere Faces Trial

    Technology technology
    30
    1
    621 Stimmen
    30 Beiträge
    434 Aufrufe
    R
    Run the Jewels?
  • Android 16 is here

    Technology technology
    73
    1
    145 Stimmen
    73 Beiträge
    1k Aufrufe
    bjoern_tantau@swg-empire.deB
    [image: be056f6c-6ffe-4ecf-a137-9af60aef4d90.png] You people are getting updates? I really hate that I cannot just do everything with the pocket computer I own that is running a supposedly free operating system.
  • 5 Stimmen
    2 Beiträge
    33 Aufrufe
    alphane_moon@lemmy.worldA
    I don't drive and have minimal experience with cars. Does it make a big difference whether your Android Automotive solution is based on Android 13 or 15? It's been a long time since I've cared about OS upgrades for Android on smartphones, perhaps the situation is different with Android Automotive?
  • 141 Stimmen
    4 Beiträge
    48 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]