Absolutely. Game had a great mix of large-scale, good pace of a fight, and social element.
VGW
Absolutely. Game had a great mix of large-scale, good pace of a fight, and social element.
VGW
More likely, most of the sources that produce photos and videos would not be using the digital signatures. Professional cameras for journalists probably would have the signature chip. Cheapo Chinese surveillance cameras? Unlikely.
Eventually, we will just have to accept that photographic proof is no longer proof.
There are ways that you could guarantee an image is valid. You would need a hardware security module inside the camera, which signs a hash of the picture with its own built-in security key that can’t be extracted and a serial number that it generates. That can prove that an image came from a particular camera, and if you change even one pixel of that image the signature won’t match anymore. I don’t see this happening anytime soon. Not mainstream at least. There are one or two camera manufacturers that offer this as a feature, but it’s not on things like surveillance cameras or cell phones nor will it be anytime soon.
Here’s a fun one
You know how you go to the public pool and you smell the chlorine keeping the water clean? That’s not chlorine you’re smelling.
Chlorine is a great sanitizer but when dissolved in water it has almost no smell. However, chlorine binds to organic substances like dead skin cells and especially strongly to urea (aka pee), forming chloramine. Chloramine has significantly less sanitizing capability than chlorine, but it has a very strong chloriney smell.
You can get rid of chloramine by ‘shocking’ the pool- adding an oxidizer or increasing the chlorine level very high to what’s called breakpoint chlorination. Shock powder is expensive though so it’s not always used as often as it should be.
So when you go to the public pool and you get that strong chlorine smell, all that means is either the pool water is dirty and hasn’t been shocked in a while, or someone peed in the pool recently.
Enjoy your swim!
That’s the sort of shit I hope they get away from.
Lower taxes and more efficient less intrusive government are good ideas. They’re just too far in the pocket of big business so ‘lower taxes and more efficient government’ often comes off as ‘let’s give the 0.01% more tax breaks and defund the bloated inefficient EPA’.
If the Democrats lose, there is not going to be any soul searching. There is going to be a lot of finger pointing and blame. And most of it is going to be at Republicans, at the media, at Trump idiots, etc.
I am hoping that Trump loses if only because I think they’re actually be some realignment within the GOP. Unlike the Democrats, there is some actual question of direction within the GOP currently from what I’ve seen. Not everybody over there is happy with Trump. Many who just want power see him as too divisive and cultish, a Trump win is a win for Trump not necessarily for the GOP. There are some actual conservatives in the GOP who feel (IMHO correctly) that Trump is more of a cult of personality than a reflection of conservative values.
If nothing else, if Trump loses this time, he is probably finished. At least I hope so and I think there’s a good chance of it. Look at the younger generations, how many people under say 30 do you see waving Trump flags?
At least I really hope that realignment happens. And I also hope it comes with a realignment of message. I think there are a lot of conservative positions that could have mainstream appeal, that deserve a voice in politics, but the GOP has abandoned a great many of them in favor of harassing gay people and immigrants. That’s not a good way for us to go as a country.
Not really because their rights have not been violated, nothing was stolen from them. They were presented with a software product that had a limited license, and they accepted that. As far as they are concerned, the developer has fulfilled their contractual obligation to them; they were never offered a GPL license so they got exactly what they were offered.
The author of the GPL’d code however is another story. They wrote software distributed as GPL, Winamp took that code and included it without following the GPL. Thus that author can sue Winamp for a license violation.
Now if that author is the only one who wrote the software, the answer is simple- Llama Group pays them some amount of money for a commercial license of the software and a contract that this settles any past claims.
However if it’s a public open source project, it may have dozens or hundreds of contributors, each of which is an original author, each of which licensed their contribution to the project under GPL terms. That means the project maintainer has no authority to negotiate or take payments on their behalf; each of them would have to agree to that commercial license (or their contributions would have to be removed from the commercial version of the software that remains in Winamp going forward). They would also each have standing to sue Llama Group for the past unlicensed use of the software.
Unless you are one of the original developers who wrote the GPL code included in Winamp, you have no standing to sue them anyway.
Not necessarily. It means that Llama group, and perhaps the original Nullsoft, have violated the license of whatever open source developer wrote that code originally. So the only ones who could actually go after them to force anything are the ones who originally wrote that GPL code. They would basically have to sue Llama group, and they might also have a case against Nullsoft / AOL (who bought Nullsoft) for unjust enrichment over the years Winamp was popular.
Chances are it would get settled out of court, they would basically get paid a couple thousand bucks to go away. Even if they did have a legal resources to take it all the way to a trial, it is unlikely the end result would be compelling a GPL release of all of the Winamp source. Would be entertaining to see them try though.
Complicating that however, is the fact that if it’s a common open source library that was included, there may be dozens of ‘authors’ and it would take many or all of them to agree to any sort of settlement.
Here’s the story:
Company buys the rights to Winamp, tries to get the community to do their dev work for free, fails. That’s it.
The ‘Winamp source license’ was absurdly restrictive. There was nothing open about it. You were not allowed to fork the repo, or distribute the source code or any binaries generated from it. Any patches you wrote became the property of Llama Group without attribution, and you were prohibited from distributing them in either source or binary form.
There were also a couple of surprises in the source code, like improperly included GPL code and some proprietary Dolby source code that never should have been released. The source code to Shoutcast server was also in there, which Llama group doesn’t actually own the rights to.
This was a lame attempt to get the community to modernize Winamp for free, and it failed.
Of course many copies of the source code have been made, they just can’t be legally used or distributed.
Today I learned. Thanks for that!
There’s currently no way to delete an uploaded image.
That’s especially problematic since pasting any image into a reply box auto-uploads it. So if your finger slips and you upload something sensitive, or if you want to take down something you uploaded previously, there’s no way to do it.
What should happen is whenever you upload an image, the image and delete key get stored in some special part of your Lemmy account. Then from the Lemmy account management page you can see all your uploaded images and delete them individually or in bulk.
So it seems you can now do this- Profile, Uploads shows you all your uploads. Go Lemmy!
I’m with you on the Twitter style format. Reddit / Lemmy is nice because you can have actual conversations. Twitter you are basically shouting into the void and sometimes it shouts back.
The only way you can do this, is if the only service you use the provider for is storage. Encrypt the data before you send it to the provider and then they don’t know what they’re storing.
If they have to do any processing on it at all, then conceptually they need a plain text copy of it to feed into the CPU. And if they have that, there is nothing you can do to stop them from stealing it or using it.
There has been some research in this field, the concept is called homomorphic encryption. That is where you encrypt something in a way that allows a third party to manipulate the data without possessing a key. It is still very limited, and likely always will be due to the extreme difficulty of the question.
with an outside control interface that’s quite literally about as optimal as it can be.
Which is probably true, as long as you make one assumption- that the operator dedicates a significant amount of time to learning it. With that assumption being true- I’ll assume you’re correct and it becomes much more efficient than a Nano/Notepad style editor.
I’m happy to concede without any personal knowledge that if you’re hardcore editing code, it may well be worth the time to learn Vim, on the principle that it may well be the very most efficient terminal-based text editor.
But what if you’re NOT hardcore editing code? What if you just need to edit a config file here and there? You don’t need the ‘absolute most efficient’ system because it’s NOT efficient for you to take the time to learn it. You just want to comment out a line and type a replacement below it. And you’ve been using Notepad-style text editors for years.
Thus my point-- there is ABSOLUTELY a place for Vim. But wanting to just edit a file without having to learn a whole new editor doesn’t make one lazy. It means you’re being efficient, focusing your time on getting what you need done, done.
A text editor that doesn’t need a tutor because the interface is intuitive enough that someone who has been using text editors (as a concept) for years can more or less instantly pick it up and start working without needing a tutorial to simply edit a config file.
To expand on this- In general you must comply with the laws of any jurisdiction where you have a business presence. This for example Meta is a USA company, but they have offices in the EU and they sell advertising in the EU from EU offices so they have to comply with EU laws for EU users. They can’t just wave off and say ‘we are a USA company, EU regs don’t apply to us’.
Lemmy is not a corporation. There is no business presence in Texas, unless an instance admin lives there or hosts the server there. So Lemmy, both as a whole and as individual instances, can simply give Texas the middle finger and say ‘we aren’t subject to your laws as we have no presence or business in your state. We are in the state of California (or whatever) and are subject to the laws of our home state. It is not our job to enforce Texas laws in California on servers hosted in Virginia.’
Thus Texas trying to enforce their laws on a Cali company is like Hollywood studios sending DMCA notices to Finland.
Yes exactly. This is a big part of why some repressive countries are starting to require identity registration in order to participate in social media. Arresting people is unnecessary if you can simply stamp out non-preferred speech at the point of discussion.
All the crypto in the world won’t help if you do stupid stuff and have crap OPSEC.
A big part of that is stay under the radar. If I were NSA I’d be running a great many TOR nodes (both relay nodes and exit nodes) in the hope of generating some correlations. Remember, you don’t need to prove in order to raise suspicion.
So for example if you have an exit node so you can see the request is CSAM related, and you run a bunch of intermediate nodes and your exit nodes will prefer routing traffic through your intermediate nodes (which also prefer routing traffic through your other intermediate nodes), you can guess that wherever the traffic goes after one or two relay hops through your nodes is whoever requested it.
If you find a specific IP address frequently relaying CSAM traffic to the public Internet, that doesn’t actually prove anything but it does give you a suspicion ‘maybe the guy who owns that address likes kiddy porn, we should look into him’.
Doing CSAM with AI tools on the public Internet is pretty stupid. Storing his stash on cell phones was even more stupid. Sharing any of it with anyone was monumentally stupid. All the hard crypto in the world won’t protect you if you do stupid stuff.
So speaking to OP- First, I’d encourage you to consider moving to a country that has better free speech protections. Or advocate for change in your own country. It’s not always easy though, because sadly it’s the unpopular speech that needs protecting; if you don’t protect the unpopular stuff you jump down a very slippery slope. We figured that out in the USA but we seem to be forgetting it lately (always in the name of ‘protecting kids’ of course).
That said, OP you should decide what exactly you want to accomplish. Chances are your nation’s shitty law is aimed at public participation type websites / social media. If it’s important for you to participate in those websites, you need to sort of pull an Ender’s Game type strategy (from the beginning of the book)- create an online-only persona, totally separate from your public identity. Only use it from devices you know are secure (and are protected with a lot of crypto). Only connect via TOR or similar privacy techniques (although for merely unpopular political speech, a VPN from a different country should suffice). NEVER use or allude to your real identity from the online persona. Create details about your persona that are different from your own- what city you’re in, what your age and gender are, what your background is, etc. NEVER use any of your real contact info or identity info.
Half-Life. I know there’s been some successful efforts to modernize it, but those only bring it up to Source 2 era.
I would love a fully modern remake. Modern lighting and raytracing could do great things for the detail of a headcrab infected scientist.