Show newer

@freemo @Pat @peterwhisker @peterdrake @drewfer

Nit: if the field densite were not uniform, bullets from paramagnetic materials would be (slightly) pulled towards the area with the stronger field.

@sgf

Note that Mastodon has its own API, but it also exposes (as it has to) server-to-server ActivityPub. That gives you an (IMO saner) way to request many things that Mastodon API also allows you to request. Sadly, I don't think it exposes a "all listed posts" collection anywhere.

@sgf Eh, it seems that at least Mastodon doesn't offer an ld+json feed of all public listed posts on an instance (even if it offers a web UI to view the same).

@js @lazarus

I just don't see which meaning of client-server implies that (for example, why should servers and not clients get bigger?). I do see that a client-server model _where it's hard to be a server_ causes that.

@js @lazarus

Hm~ I don't see how this works for anything that either wants to hide metadata, or anything that tries to provide realtime communications.

I also don't see why anything else encourages centralization. Are you thinking of web as content dissemination (as opposed to small group communication) network?

@js @lazarus

WDYM by server-client model? That one side needs to know the other's address to establish any sort of communication/that they need to be concurrently online to communicate/something else?

@8petros @mullvadnet

Hm~, it seems that I've used github.com/chutz/mullvad-netns in the past instead of systemd-based netns creation (I don't really recall much about it apart from not having difficulties setting it up).

Now that I've looked for related tooling, I've noticed that github.com/jamesmcm/vopono exists. However, I've first heard of it right now, so I have no opinion even on whether it actually works.

robryk boosted

@tqbf I'm sort of tired of the HN explanation that Google is doing stuff like that as a part of some secret agenda, though.

I call it an "asymmetry of nudges". One day, you dream up a way to improve security or make the platform cooler. If an unintended side effect of your proposal is that Google could lose revenue or market position... you just check yourself and don't go with it. If you try anyway, you will be arguing with execs for months or years. Even if you win, the effort to ship such features is high and the throughput is low.

The opposite is not true: if your feature could accidentally strengthen your company's position in some morally questionable way... the answer is just "we're the good guys, and it's not why we're doing this". If 3-5 years down the line, some PM in another org unit decides to use your feature precisely the way the critics feared - well, it's too late at that point.

So you get this gradual drift that is just an emergent property of the corporate culture. But if your only argument is "you have evil intentions" or "well, but your company could theoretically abuse it down the line", you're not gonna win too many debates.

@sgf Do you want to count a user as active if they made any public posts?

@8petros @mullvadnet

What distribution are you using and does it use systemd?

@ct_bergstrom

For some people, because education research is research _on_ people, which requires treating them as research subjects.

For some others, because it requires confronting the same things that frustrate them when interacting with people: e.g. that one cannot assume literal meaning of what people say is what they mean, or that whether people get convinced that X is true is very path-dependent.

@cks

Wouldn't that be even more confusing in other edge cases? If the first path entry acquires something that matches, but you have a matching entry in a later path entry cached, you'll execute that entry no matter what unless you abandon caching altogether (or use inotify or sth to invalidate it, which iirc would introduce races).

@_dm

What about using multiple remote browsers á la qubes in Qubes?

@irving Whenever that's important we already use such functions: you can construct something with circuit depth of f(security parameter)*log(input size) by computing the Merkle tree root hash.

@8petros @mullvadnet

Are you familiar with network namespaces in general? I think the simplest way to do such things is to have a netns that routes through the tunnel and run everything you want to use the tunnel there.

@stux How similar is this mechanism to fasteners either loosening or tightening when thermally cycled?

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.