Show newer

@Ganderonus
Pierwsza która mi przychodzi do głowy to to, czy roztwarzają kamień (np. mydło tego nie robi, typowy płyn do szyb albo wcale albo bardzo powoli). Kolejna to obecność twardych drobinek, które mają za zadanie mechanicznie ścierać zabrudzenie (np. takich jak są w pastach BHP). Jeszcze inna to siła utleniania (w sensie potencjał elektrodowy): np. wybielacze często mają wysoki potencjał elektrodowy. Niektóre detergenty w całości dość szybko wyparowują (np. alkohole), więc się nadają do ostatecznego mycia powierzchni, których nie należy na koniec wycierać (np. okien, żeby nie zostawiać smug).

@kuba

Mastodon oferuje kilka różnych rodzajów międzyinstancjowego blokowania. Np. można nie ściągać obrazków z pewnej instancji, nie pokazywać postów z tamtej instancji użytkownikom, którzy nie są ich bezpośrednimi adresatami (tu nie jestem pewien dokładnej semantyki), ale też można zupełnie odmawiać komunikacji z instancją. Niestety, zauważalnie często administratorzy instancji wybierają to ostatnie (np. wspomiane mastodon.technology blokuje qoto.org, jako powód podając "Suspended for choosing to federate with fascist instances."). Ta forma blokowania jest czasem potrzebna (różne wersje ataków DoS, albo tworzenie coraz to nowych użytkowników w celu obchodzenia blokad), ale IMO jest bardzo nadużywana.

@bn801 @rysiek@mastodon.technology @rczajka

robryk boosted

tech, privacy, -- 

.hg I'm sick of seeing scary warnings every boot because I dared to choose an alternative operating system.

I want a device that shows scary warnings every boot if you install Google's Android. Because, you know, that shit is full of privacy bads.

@timorl Surprisingly enough, even honk (if you emit a poll using "send activity" API) will show you responses (they will appear like text posts responding to the poll).

@timorl Also, I'm surprised that there's no UI for unvoting (given that ActivityPub has a generic Undo message).

@timorl Then it very obviously depends on software :)

@timorl You must assume they do (even if the UI doesn't show that), because IIUC poll responses are just messages sent to their ActivityPub inbox.

I wonder if we can construct a family of (increasingly large) semigroups of second-preimage resistant one-way functions. More precisely, I would like to have an indexed family (let's denote the index by i) of semigroups of functions (where the semigroup operation is composition) such that:
- i-th semigroup has size >= i,
- the members of the i-th semigroup can be described by natural numbers from a range of size poly(i),
- there are algorithms polynomial in input size that:
a) read i, descriptions of two functions from the i-th semigroup and output the description of their composition,
b) read i, description of a function from i-th semigroup, an input, and evaluate the function,
- the functions in i-th semigroup are resistant to second preimage attacks with security parameter log(i) [^].

tl;dr I want families of efficiently composable hash functions.

[^] I could just as well request a family indexed by i and the security parameter separately (and have all the complexities be poly(input size + security parameter)). This is equivalent.

@timorl I'm not so sure. Toki Pona relies a lot on associations, so I'd be surprised if it didn't rely on speakers' stereotypes of various kinds. I've grepped through the dictionary to see if there's an obvious example of that and the one thing I saw that kinda matched this pattern (and IMO definitely is a bad part of culture) was that "listen" and "obey" are the same word. @Yuvalne @tindall@cybre.space

@BlurTheFur Do you have a good description of what negative or positive refers to precisely (predicted effect on reader's mood?)? I saw it being used in ways that I only mostly understood.

@kuba When this happens, I'd run packet capture on the raspi to see if it truly receives those packets. I would also maybe try to send packets to all IPv4 IPs and see which ones end up there. If not, then this is even more broken than your ISP intimates. If yes, you get to see what IP ranges get misrouted.

I'd also run a long-term packet capture on that raspi (possibly filtering high-volume streams and possibly periodically deleting old packets as long as the problem hasn't manifested), and wait until the setup breaks again. We would then see what was sent by the raspi just before the setup breaks.

(I don't see a reason for a ISP-provided router/access point/... to talk any routing protocol on the customer-facing interfaces, and frankly little reason for it to talk a routing protocol _at all_, so that router is doing something weird anyway that arguably is a bug. Unfortunately, it's not very surprising that some sort of weird or incorrect behaviour is going on there. What I'd hope to see from the packet captures is (a) what triggers the misbehaviour, so you can in the worst case filter that out (b) possibly figure out whether that's a vulnerability that e.g. would allow someone on the outside to do the same if e.g. you have a connection open to them.)

@kuba What is your local network? A switched wired one or wireless with the same router also being the access point, or something else?

@freemo @trinsec I did (this morning): it manifested itself by an error page from Mastodon being shown to me (`We're sorry, but something went wrong on our end.`) and wasn't fixed by refresh (or cache-ignoring refresh), so hopefully you have logs of what was going on.

What's a better programmatic vector graphics library than (py)Cairo? For example, I want to draw a (linear gradient) between two curves, with the color dependent on the vertical position as a fraction of the distance between the curves. It appears that in cairo I need to mess with MeshPatterns to do that, which creates quite a few annoyances (e.g. having to draw one of the curves backwards, have to actually draw the vertical stubs at both ends, etc.).

@alcinnz Even in such a world, there's still a point to them: having a well-written description of semantics you can _expect_ from a browser (does not necessarily mean that you'll get them, but it's easy to argue that something is a bug when it contravenes the specification that it is supposed to implement).

@alpine_thistle Do you already have a written down list of such surprising facts by any chance?

@timorl
Don't confuse it with "owcowo", which everyone would understand ad "sheeplike" (but sadly the correct form is "owczo").

Also, "owoców" _is_ a word (declined form of plural fruits).

@maemachinebroke @AgathaSorceress

@timorl Also, why don't people write things like init scripts in Python in that case? Python dependency would be a nonissue in many cases.

@timorl If you want to do standard shell things (like pipes), then Python is cumbersome (and lets you rediscover funny edge cases that are normally handled by the shell -- I'm not aware of a Python library that helps with that).

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.