birdsite, threat actors, reputation
@mttaggart @hacks4pancakes If they could guarantee takedown on the birdsite before, is because they had bribed birdsite employees; otherwise birdsite employees would have ruled against some of their takedown requests.
Remains to be seen whether the new regime is more corrupt or less, but what you report would be strong evidence that the old regime was very corrupt.
@DM_Ronin Maybe, or maybe everything will work out fine.
@smari One time I got stuck getting paid peanuts for spending a day making minor modifications to some terrible PHP on a server I could only access via illegal TeamViewer, so I'd like more details
@lxo I can't endorse your remark or I'll get booted off my instance!
@scolobb Wow, that's amazing!
#TypedRacket has just got way more powerful. The following code gets typechecked as is:
(: eval-with (All (a) (-> (VariableMapping a) Any AnyValues)))
(define (eval-with ht expr)
(parameterize ([current-namespace (make-base-namespace)])
(for ([(x val) (in-hash ht)]) (namespace-set-variable-value! x val))
(eval expr)))
Six months ago I spent a couple days trying to get eval-with to typecheck, only to get the answer on the mailing list that Typed Racket couldn’t do that. Well now not only can it do this, it also has dependent types!
I’m extremely excited 😍
cozy in a mac rom scarf. specifically this is a slice of the ROM from a Macintosh IIsi. here's how it was made. i used @th 's script https://github.com/osresearch/prom/blob/master/hex2png and the mac roms on archive dot org https://archive.org/details/mac_rom_archive_-_as_of_8-19-2011
if you have ImageMagick already installed:
$ perl hex2png.pl -y 1280 -w 32 mac_rom_archive_-_as_of_8-19-2011/36B7FB6C\ -\ Mac\ IIsi.ROM \ | convert - maciisi.png
Then a slice four columns wide was taken of the resulting image and knit into a scarf. The scarf is 1280 pixels/knit stitches long and therefore wraps natively in the columns of the scarf. if you want to make your own, you'll need a hacked consumer knitting machine or an industrial knitting machine or someone with a setup to machine knit it for you.
@smari Maybe more details? Allowable languages, performance requirements? Assuming you're budgeting a few hundred to a few thousand dollars.
@DM_Ronin I think poorly functioning E2EE (E2EE that loses your keys, or sometimes fails at opening a channel, or something) is very different from E2EE with a backdoor or no E2EE
@lxo Many people are driven by hate, especially now that we've had 16 years of Twitter.
I just set up my own #invidious instance! It was easy.
@DM_Ronin sabotage the E2EE implementation so that is so unreliable people try hard to avoid using it
@lauren I'm glad you're here!
1/7 With all the talk about moderation on mastodon, most of the discussions I’ve seen have centered on the work and experiences of paid commercial content moderators. But volunteer community moderators have done this work for a long time! I’m going to share some of my favorite papers about the experiences of community content moderators. Apologies to the authors if you’re on Mastodon and I didn’t tag you! And please share your favorites!
@allenholub Maybe those people want to be Twitter-style soldiers in an ideological war rather than investigating what they might learn from another person, so maybe avoiding them is beneficial.
Weeknotes: Implementing a write API, Mastodon distractions - Simon Willison: http://simonwillison.net/2022/Nov/23/weeknotes/#atom-everything
I read a lot. Sometimes I learn things. I like making things. I think reading and doing are complementary.