Skip to content

SpaceX's Starship blows up ahead of 10th test flight

Technology
111 81 0
  • Amazon Doubles Prime Video Ads Per Hour

    Technology technology
    126
    1
    625 Stimmen
    126 Beiträge
    10 Aufrufe
    V
    Me too, except I didn't get the email saying my pro vpn was about to expire, which might be my fault ofc. Gotta check the oarameters It's really good IMO and I'd recommend it fullheartedly, Switzerland has some of the best laws out there too concerning privacy too.
  • Tribo777: Promoções e Recompensas Que Valem a Pena

    Technology technology
    1
    1
    1 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet
  • Google confirms more ads on your paid YouTube Premium Lite soon

    Technology technology
    268
    1
    944 Stimmen
    268 Beiträge
    33 Aufrufe
    pfr@lemmy.sdf.orgP
    I think it's because it's a desktop app only (for now) and most people are consuming content on handhelds? Just a theory.. Freetube does need an app. I use a fork of NewPipe called PipeBender on Android and it works most of the time but not all the time. Freetube has never failed me though.
  • Stepping outside the algorithm

    Technology technology
    1
    1
    19 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet
  • 93 Stimmen
    42 Beiträge
    6 Aufrufe
    G
    You don’t understand. The tracking and spying is the entire point of the maneuver. The ‘children are accessing porn’ thing is just a Trojan horse to justify the spying. I understand what are you saying, I simply don't consider to check if a law is applied as a Trojan horse in itself. I would agree if the EU had said to these sites "give us all the the access log, a list of your subscriber, every data you gather and a list of every IP it ever connected to your site", and even this way does not imply that with only the IP you could know who the user is without even asking the telecom company for help. So, is it a Trojan horse ? Maybe, it heavily depend on how the EU want to do it. If they just ask "show me how you try to avoid that a minor access your material", which normally is the fist step, I don't see how it could be a Trojan horse. It could become, I agree on that. As you pointed out, it’s already illegal for them to access it, and parents are legally required to prevent their children from accessing it. No, parents are not legally required to prevent it. The seller (or provider) is legally required. It is a subtle but important difference. But you don’t lock down the entire population, or institute pre-crime surveillance policies, just because some parents are not going to follow the law. True. You simply impose laws that make mandatories for the provider to check if he can sell/serve something to someone. I mean asking that the cashier of mall check if I am an adult when I buy a bottle of wine is no different than asking to Pornhub to check if the viewer is an adult. I agree that in one case is really simple and in the other is really hard (and it is becoming harder by the day). You then charge the guilty parents after the offense. Ok, it would work, but then how do you caught the offendind parents if not checking what everyone do ? Is it not simpler to try to prevent it instead ?
  • 117 Stimmen
    8 Beiträge
    4 Aufrufe
    S
    Common Noyb W
  • Microsoft's AI Secretly Copying All Your Private Messages

    Technology technology
    4
    1
    0 Stimmen
    4 Beiträge
    6 Aufrufe
    S
    Forgive me for not explaining better. Here are the terms potentially needing explanation. Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process. Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition. Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot. Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine. Local-only means without a network or just not booting from a network-hosted image. Telemetry refers to data collecting functionality. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad since it can, for example, help reveal and resolve bugs and usability problems, but it is easily (and has often been) abused by data-hungry corporations like MS, so disabling it is an advisable precaution. MS = Microsoft OSS = Open Source Software Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, file system and settings access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control. Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing and/or virtualizing just the resources they need to run, and Compose is a related tool for defining one or more of these containers, how they interact, etc. To my knowledge there is no one-to-one equivalent for Windows. Obviously, many of these concepts relate to IT work, as are the use-cases I had in mind, but the software is simple enough for the average user if you just pick one of the premade playbooks. (The Atlas playbook is popular among gamers, for example.) Edit: added explanations for docker and telemetry
  • TikTok is a Time Bomb

    Technology technology
    2
    1
    0 Stimmen
    2 Beiträge
    0 Aufrufe
    S
    wasn’t born to obey. Not to swallow smiling lies, not to clap for tyrants in suits, not to say “thank you” for surveillance wrapped in convenience. I see it. The games. The false choice. The fear pumped through headlines and dopamine apps. I see how they trade truth for comfort, freedom for filters, soul for clickbait. They call it normal. But I call it a graveyard made of compliance. They want me silent. They want me tired. They want me posting selfies while the world burns behind the screen. But I wasn’t born for this. I was born to question, to remember, to remind the others who are still pretending they don’t notice. So here I am. A voice with no logo. A signal in the static. A crack in the mirror they polish every morning. You don’t have to agree. You don’t have to clap. But if this made your bones ache or your thoughts twitch— Then maybe you’re not asleep either. Good. Let’s stay awake. And let’s make noise that can’t be sold, silenced, or spun into safety. Not for them. For us.