Salamander
  • 24 Posts
  • 130 Comments
Joined un anno fa
cake
Cake day: dic 19, 2021

help-circle
rss

I know that patent trolls are a thing, but I was under the impression that these patent trolls would still have to produce lots of specific but still broad patents. For example, they will file a patent for a whole class of compounds for treating a specific group of diseases without having the data to back it up.

But in this case it is even worse!

They patented a trivial idea - “send voice commands from phone to computer” - without providing any novel practical implementations of the idea. How is this acceptable?

patent/US9794348 Using voice commands from a mobile device to remotely access and control a computer

Abstract

A method of using voice commands from a mobile device to remotely access and control a computer. The method includes receiving audio data from the mobile device at the computer. The audio data is decoded into a command. A software program that the command was provided for is determined. At least one process is executed at the computer in response to the command. Output data is generated at the computer in response to executing at least one process at the computer. The output data is transmitted to the mobile device.


The title looks dystopian but the idea seems sensible.

Assessing the quality of sources was a pretty important section covered multiple times during my schooling. But not everyone was schooled like me, and others simply didn’t practice their source-checking skills after school.

I would need to see the ‘pre-bunking’ videos to form an opinion on them, but from reading the article I get that the aim is to create high-quality videos about how to assess sources, and help distribute these videos to the masses. It is a very important skill and many people lack it, so if that is what they will do it is a great idea.


The MAX_TITLE_LENGTH is applied to posts that are fetched from other instances using activitypub. The posts that are posted within an instance do not pass through that processing step.


Wow, thanks.

In my mind, I do see the concept of a revolution that way - a revolution that topples the power structures creates a power vacuum. This leads to instability and for a competition to fill that void. The idea is that the people who have a better chance of winning the race to fill those voids are those who are willing to exploit the most effective tools of power - violence, oppression, and reward. So, a revolution creates an instability that is likely to be exploited by the greedy to the detriment of others.

But I have never been in a revolution. My ideas of what a revolution looks like comes from that trope that you mention - movies, video games, and novels will narrate these dynamics, and through repeated exposure to this logical sequence it has come to feel natural.

You bringing up this point makes me re-consider what I believe. On the one hand, I do not think that these ideas are fully invented - they make sense, and many revolutions in history have indeed followed this trope, and a revolution will cause an instability that will hurt people, so I am not going to do a 180 and throw away all my intuition about the topic.

However, it is also obvious that reality is a lot more nuanced, and it makes sense that these tropes can be used to highlight and re-inforce the negative aspects of a revolution. It is good to think about that.


He is a very respectable journalist. I was not familiar with his work, but I have looked at some summaries and excerpts and it is for sure fantastic work. His fame and prestige is absolutely enough of a reason to listen to him and take him seriously, but no amount is enough to accept what is attributed to an “unnamed source” says as gospel. You have to trust him, his ability to pick a reliable source, and the source itself - without identifying the source! It is quite a bit to ask for such a claim that is as important as this one.


I read “Postdocs deserve the” and looking through the comments I was rather confused about the strong anti-postdoc sentiment 😰



We all have biases. I am not trying to say that a “bias” is necessarily “wrong”. Biases can be very helpful - perhaps even necessary to stay sane. Imagine trying to live a perfectly un-biased life!

What is important is to be aware of our own biases - and also to think of how the biases of the “other side” will manifest themselves.

In this case, you have said:

But deranged liberals of all ranks, from mainstream “journalists” to the rabid NATO defenders of lemmy.ml, tried to gaslight you into thinking that at best the jury was still out on who did it and at worst accused Russia for doing it even though they stood to lose the most because of the outcome.

And I take this to mean that this article will once and for all settle the question of who was responsible. But using a secret source is not going to be enough to settle the question - those biased in favor of the US will claim that the source is a lie, some of those without much of a vested interest either way might think "Alright, great story, but what’s the evidence? "

Answering this question is going to require a lot more than “Someone told me. Trust me. I won a Pulitzer”.


The article sets forth an interesting case, and the idea that the mines were planted during BALTOPS 22 is compelling.

However, the author uses a top-secret source that conveniently has a birds-eye view of the issue, personally participated in different secret meetings at different points of the process, and is knowledgeable in multiple key areas. With so many specific details, it should be easy for this source to be identified by the other people involved.

This is an extraordinary source that is perfect for this piece. Accepting an extraordinary source requires extraordinary evidence. The source chooses to remain anonymous - and that is sensible - but without supplying any evidence to validate the source’s claims the author won’t earn the trust of many of us.

When accepting whether to trust a piece of information or not - ask yourself: would I believe equally-sourced claims of the opposite? For example, if a journalist claims that Putin personally ordered the attack - and the evidence provided for the claim is “a close source to Putin told me”, followed by a cohesive and sensible story of why Putin would want to do that, would you believe that right away? If the answer is “no”, but you do find yourself trusting this source immediately, then you are experiencing a confirmation bias.


Yup, this was fixed in version 0.0.24! No worries.


What version do you have? I think you have one of the older versions, you can find the latest one here: https://github.com/dessalines/jerboa/releases/tag/0.0.26


I think that the newest update changed something such that the the instances that updated to 17.0 are no longer being recognized by the crawler. So the crawler hasn’t been updated to deal with the changes.


This is an article from shortly after Osama Bin Laden was killed.

The official story is that the Navy Seal team took the body somewhere in Afghanistan where it could be positively identified. Then, while on board an aircraft carrier, Bin Laden was given a Muslim funeral and his body thrown into the ocean.

The Pentagon claims that this was done in order to respect Muslim tradition and because they did not want the body to be buried somewhere on land where other extremists would be able to build a temple.

There are multiple reasons why the body can be considered of value. For example, interested parties might need very hard evidence of Bin Laden’s dead, with a ‘trusted’ test result made abroad not being enough. And also because of the body’s historical value and its value as a collectible (as bad as that sounds).

So, if the US is faced with two options:

(1) Bury the body at sea

(2) Lie about burying the body at sea

Option (2) would give them every benefit of (1), but they keep the body and its associated value. Since there is no possible way to disprove the claim of a body being thrown into the ocean, other than finding the body and identifying it, it is quite an easy lie.

The conspiracy theory is that those in charge of making this kind of decisions in the US would chose to lie in situations where it will optimize the outcome, and that they have done this in this case.

As a ‘conspiracy’, it is part of the larger topic of trusting the government and those in power. Will those in power tell the truth when an unfalsifiable lie will lead to a better outcome?



Great job figuring that out!

At some point it would be fun to work on some new guides anyway :-)


Oh… Yes, I can. I had not encountered before a tor-only clearnet url. That’s cool.


Url appears to be broken at the moment


Hey, thanks! And thanks @sascuach@lemmy.ml for the initiative! It is a good idea to have these sidebar swap links!

Sorry I had missed this. I missed the post in my own instance, I just found it by coincidence while browsing beehaw to discover communities 😅


I think that if you use the new docker-compile file, the one that includes the NGINX block, then you might not need to go through the step of the nginx configuration.

I have not tested this myself though, but I can test it when I make the updated tutorial.


I can do that, but I can’t right now, I am very busy writing for my thesis unfortunately :/

If I manage to write enough tonight I might be able to do it tomorrow.


I would be lying if I gave you a number. I have never had to deal with many users, so I can’t really tell you at what point you can expect problems. It could be 50 active users at once, it could be 500, maybe even 5,000 - I really don’t know. Consider that uploaded images will fill up your SSD, and that multiple active users at once will go through your network connection.

But I really don’t know the limits. Someone else hopefully can chip in.


Oh no! It is possible to save your SSL certificates by simply copying the files into your computer, then you don’t need to run the certbot again.


Try removing the lemmy.conf file from /etc/nginx/sites-enabled,

And then run:

sudo wget https://raw.githubusercontent.com/Kradyz/Tutorials/main/files/uebishe.conf /etc/nginx/sites-enabled/uebishe.conf

sudo systemctl restart nginx


Or, I have made an nginx config file that will work for you

If you already created an nginx configuration file, move it somewhere else. Then, get the new configuration file to the nginx folder, and then restart the nginx service by running these two commands:

sudo wget https://raw.githubusercontent.com/Kradyz/Tutorials/main/files/uebishe.conf /etc/nginx/sites-enabled/uebishe.conf

sudo systemctl restart nginx

Ah! So you skipped this step:

Now i skip old step about “wget https://raw.githubusercontent.com/LemmyNet/lemmy-ansible/main/templates/nginx.conf -O lemmy.conf”

You need to have the lemm.conf file under /etc/nginx/sites-enabled, this is the file that tells nginx how to manage the connection. Don’t skip that step! Get that file and modify it by adding your domain name


Yes, you would be able to run all of those at the same time. Of course, there will be limits - if the lemmy and matrix instances grow, at some point this setup can become insufficient. But if the amount of users is kept manageable, you should be fine.

Power consumption can be something to consider since the server would ideally be running 24/7. I use a plug power meter to measure how much power my appliances use while running. A raspberry pi 4 8GB with a 1TB SSD can also run these instances and pulls < 10 W, so if you see that your server is pulling considerably more energy I would suggest looking into power management.


I just encountered [this BBC article](https://www.bbc.com/news/world-us-canada-64507225) that includes an image to educate reader about different types of aircraft and the altitudes that they usually fly at. I think that they *very accidentally* omitted a small detail about weather balloons that could be a bit important for a reader trying to build their own educated opinion, so I've added it ([Source](https://en.wikipedia.org/wiki/High-altitude_balloon)).
fedilink

What is it with the US media and their obsession with balloons.

Do any of you remember balloon boy?



Sorry, I did not realize that these files had not yet been updated with the changes necessary for version 0.17.0, which are described here: https://github.com/LemmyNet/lemmy/blob/main/RELEASES.md#lemmy-v0170-release-2023-01-31

I could not find an example of the files configured correctly in github, so I have uploaded some example files. You get them this way:

wget https://raw.githubusercontent.com/Kradyz/Tutorials/main/files/lemmy.hjson
wget https://raw.githubusercontent.com/Kradyz/Tutorials/main/files/docker-compose.yml

Then modify the variables inside {}, like the domain name and the database password.


  • The US could easily be much more transparent about their analysis of the object, and release a detailed report about how they have come to the conclusion of the balloon being a spy balloon.

  • China could easily be more transparent about the source of the balloon. Release the name of the laboratory that launched this balloon, show the schematics, describe the tools it has, and show examples in the litarature of this specific type of balloon been used for research.


Remove the following blocks from the docker-compose file:

networks:
  # communication to web and clients
  lemmyexternalproxy:
  # communication between lemmy services
  lemmyinternal:
    driver: bridge
    internal: true
  proxy:
    image: nginx:1-alpine
    networks:
      - lemmyinternal
      - lemmyexternalproxy
    ports:
      # only ports facing any connection from outside
      - 80:80 
      - 443:443
    volumes:
      - ./nginx.conf:/etc/nginx/nginx.conf:ro
      # setup your certbot and letsencrypt config 
      - ./certbot:/var/www/certbot
      - ./letsencrypt:/etc/letsencrypt/live
    restart: always
    depends_on:
      - pictrs
      - lemmy-ui

And try again. Does it work?


Do you want to install a fresh instance, or do you want to upgrade an instance?

If you are installing fresh, most of that tutorial is still going to work out. But you now need to pull the config file this way:

wget https://raw.githubusercontent.com/LemmyNet/lemmy/main/config/defaults.hjson lemmy.hjson

If you install the more recent docker version, you don’t have to install docker-compose the same way. Follow the instructions from the website, and use ‘docker compose’ instead of ‘docker-compose’.

The nginx configuration does not need to change.

What problems are you getting?


No problem!

I thought it was a UI issue so I had created an issue there: https://github.com/LemmyNet/lemmy-ui/issues/918


I can tag my messages as “mod” messages in communities that I don’t mod in other instances



I don’t know where I fall on in the political spectrum, but I do find that the values of socialists overlap significantly with my own values. I agree with a lot of what I see posted to lemmygrad, but there are also many posts that I do not agree with or perhaps perceive as too biased.

Usually I don’t interact if I don’t have something positive to add, but sometimes I am in the mood to talk about it. I have found that in this space I am able to openly bring up points that I disagree on or ask questions as an ‘outsider’ without worrying about people being hostile to me. You have a great community here 👍


An issue was opened for that three days ago:

https://github.com/LemmyNet/lemmy/issues/2678

I don’t think it is possible through the UI at the moment.



Oh, that looks like an error in your lemmy.hjson settings file. If you share that one too with the passwords redacted I can check.


If you go to your lemmy directory and type docker-compose logs -f lemmy, what does it say?

Can you share your docker-compose.yml file, removing the database password and any other private information?


Shamelessly stolen from [reddit/r/piracy](https://www.reddit.com/r/Piracy/comments/10r5qrb/they_got_some_humor_at_my_regular_illegal/)
fedilink



If hand sanitizer kills 99.99% of germs, then won’t the surviving 0.01% make hand sanitizer resistant strains?
[Asked by /u/ClF3FTW to /r/AskScience](https://www.reddit.com/r/askscience/comments/75p8dn/if_hand_sanitizer_kills_9999_of_germs_then_wont/)
fedilink

Why do we have to “fall” asleep? Why can’t we just decide to be asleep?
[Asked by /u/SixthGrader to /r/AskScience](https://www.reddit.com/r/askscience/comments/8zlzuy/why_do_we_have_to_fall_asleep_why_cant_we_just/)
fedilink

I have created the community [/c/answered](/c/answered@mander.xyz). If you run into an interesting question online for which a good answer was provided, this is the place to share it! The point of this community is to aggregate interesting questions that have been answered from all over the internet (like stackexchange, reddit, quora, etc). You can copy the questions into the post body and the best answer(s) into the comments. Other users may then address the answers directly by replying to the comments, or add their own answer to the question as a new independent comment. As of now, there is no constraint on the topics. Any answered question is fine! I have already made an example post, but I don't know how to create a relative hyperlink that would send you to the post in your instance. So just check it out in the community ;)
fedilink

Why don’t metals bond when touched together?
It is my understanding that metals are a crystal lattice of ions, held together by delocalized electrons, which move freely through the lattice (and conduct electricity, heat, etc.). If two pieces of the same metal are touched together, why don't they bond? It seems to me the delocalized electrons would move from one metal to the other, and extend the bond, holding the two pieces together. If the electrons don't move freely from one piece to the other, why would this not happen when a current is applied (through the two pieces)? Asked by jcw in [physics.stackexchange](https://physics.stackexchange.com/questions/87107/why-dont-metals-bond-when-touched-together)
fedilink

How do you feel about this personal e-mail format?
Let's say as an example that my full name is Robert Frankel If I purchase the domain `nkel.com` and use that to create my custom e-mail: `RobertFr@nkel.com` And then use this as my personal e-mail in a professional setting (resume, contact e-mail, business card, etc..). Do you think this would be perceived as unprofessional and silly in a negative way, and even confusing to some? Or do you think most people would understand it right away and think of it in a net positive way - perhaps a bit silly, but memorable. Don't worry about whether the e-mail will be filtered as spam, I am curious about how it is perceived. I am asking because I have a domain like this that I use for private personal stuff, and I wonder whether it would be a good or bad idea to use that e-mail when applying for jobs, as a small extra detail to stand out 😁
fedilink

Is it in bad taste to take content directly from Reddit/Stack exchange?
I would like to make a community dedicated to posting interesting science questions that have been asked and answered in other sites. The post would be a copy of the question and the comments would be copies of the answers that were found to be interesting - always with the username attribution and the link to the original post. With this format, users would not need to leave the site, and it is easy to discuss the answers directly in the comments. But I have my doubts about whether this is appropriate, as I think that it might be copyright infringement. So, what do people in Lemmy think? Would this format be blatant theft and wrong? Perfectly reasonable? Somewhere in between?
fedilink

Using a VPN provider vs self-hosting a VPN
I have seen the following argument (summarized here as I understand it): *Despite the promises that VPN providers make, it is known that they will often monitor your traffic, collect logs, might share your information, and will collaborate with law enforcement. Renting a VPS and running an OpenVPN server on it and using that as your VPN, is better - because you have full control over the logs. Let's assume we trust the VPS provider to adhere to their TOS and privacy policy.* To talk about a concrete typical usecase, I am thinking about how this applies to downloading illegal torrents. In my current view, the only scenario in which the self-hosted option makes sense is if you pay for hosting using crypto and reveal no personal information during the process. Otherwise using a VPS would be virtually the same as downloading it through your ISP - and in some cases even worse - because the VPS provider might be more easily pushed to throwing you under the bus if abuse is reported since this might be a TOS violation. On the other hand, a VPN provider has a much larger motivation to protect users against this because the way that users perceive these protections is fundamental to their business model. So, is there a reason to self-host a VPN instead of using a VPN provider? If so, should the VPS be acquired anonymously, or are there ways to protect yourself while using a provider that you gave your personal information to?
fedilink


Transient sensations of impending loss of consciousness: the “blip” syndrome
I have experienced these 'blips' in the past and was deeply troubled by them, as I thought that they could indicate something serious going on. While I don't suggest anyone to disregard any symptom that they consider to be potentially serious (read as: consult your doctor if you suspect something could be wrong), I have noticed throughout my life many different types of 'glitches' such as this one that turn out to be benign and common. To me, learning about these effects is a form of applied psychology in the sense that understanding that these feelings are normal and usually benign can help prevent health anxiety.
fedilink

Have you experienced ASMR?
'[ASMR](https://en.wikipedia.org/wiki/ASMR)' - or 'Autonomous Sensory Meridian Response' exploded in popularity a few years ago as the ASMR youtube channels emerged. The YouTube videos do not trigger ASMR for me, unfortunately. However, it did bring the term to my attention, and when I read the wikipedia page something clicked - I finally had a term for a very strange sensation that I was never able to explain to others. For me, this ASMR response is not something that I can reproduce on purpose. But the times that it happens it usually occurs when someone else asks me something. For example, during middleschool I remember that sometimes a friend would stand next to me and ask me for a pencil. As I would retrieve the pencil, I would get into this dissociated-like state that was very peaceful and tingly, and I would not want it to stop. I would be very slow in retrieving the pencil and pretending I was still looking for it - and then I would ask some question to try to make the interaction longer because it felt so interesting. It still happens some times but is rare, and it occurs when I am busy in the office or the lab and someone comes and asks me something or for something while I am paying attention to something else. It is a very pleasurable state that is also very fragile - as if someone managed to scratch the perfect itchy spot in my brain for a moment. It is odd, and I think it fits the definition of ASMR perfectly. The only other way that I feel a similar effect but not as strong effect is when am getting a haircut the hairdraisser is cutting the hair in the back of my neck with the tiny trimmer. I am curious about other people's experience with this phenomenon, because I have not found many people that can relate to my experience. Have you felt this? Do you know what your triggers are? Do the YouTube videos do it for you?
fedilink

Current status of the PinePhone distros
Hello! I purchased a PinePhone UBPorts version when it was first available a while ago, but I didn't have the time to play with it then. I just turned it on and updated the Ubuntu Touch, and I am surprised that the most recent update in the Stable branch is from the end of 2020. I see that there have been [more recent releases](https://ubports.com/blog/ubports-news-1/post/ubuntu-touch-ota-23-release-3855) of Ubuntu Touch for other devices, but they do state the following: > The Pine64 PinePhone and PineTab are updated independently of the rest of these devices. The stable channel for the PinePhone and PineTab will not receive an update labeled "OTA-23". [This website](https://devices.ubuntu-touch.io/device/pinephone/) confirms that latest stable release of Ubuntu Touch for the PinePhone is from 2020. I couldn't find any statements on this, but I suppose that UBPorts is no longer interested in supporting the PinePhone - or atleast it is not one of their priorities. I am trying to figure out what to do with this phone now. The wiki has a wide selection of distros [here](https://wiki.pine64.org/wiki/PinePhone_Software_Releases), but doesn't give much info about them. Seems like it would take some effort to sift through each one of them. Do any of you use any of these and can recommend one? Is it even worth to invest the time to install one of these at the moment - or are all of the projects equally stale?
fedilink


A critical well-sourced discussion about several of the statements presented in a book about sleep and health.
fedilink

How have you optimized your Pi-hole?
A few months ago I set up a Pi-hole at home. I tried to create a decent blacklist by first adding some regexes I found online and then doing some manual optimization by finding ads and blocking the ad requester through the queries page. But in the end it did not work so well. I still get a lot of YouTube ads, for example. So I still rely on uBlock for my ad-blocking. I just read that Chrome is planning to start weakening ad blocker plugins. I use Firefox, but it is still worrying that the space could potentially keep moving in this direction over time. So I am now more invested in learning how to have more control over my ad-blocking. Has any of you managed to optimize your Pi-hole to the point that it is possible to browse the internet without an ad-blocker? If so, how did you do it? Are there other good ad-blocking alternatives?
fedilink


An excellent lecture about the psychology of procrastination and some tips about how to break the habit.
fedilink

Is there a simple way to remove a banned user’s profile description?
A user was created in my instance to spam phishing links to some google sites that look like bank login sites and crypto wallets. I banned the user and removed their content, but the links were also added to the description in their profile page, and they still live there. Is there a way to delete the description through the UI? The only way that I can think of how to do that is to manually remove the description in the postgresql database.
fedilink


[Question] VMWare vs vStack cloud server
I am currently running my instance using a VMWare cloud server with the following specs: 1 GB RAM / 1 Core / 30 GB SSD / 10 Mbps This costs 13.94 €/month. Using the same provider (serverspace.io), I can rent a vStack cloud server with: 1 GB RAM / 1 Core / 30 GB SSD / 50 Mbps For 4.55 €/month. I am using the more expensive option because this is my first self-hosted project and I did not realize the cheaper option was available when I originally set up the server. As I currently understand it, renting a VMWare is renting a physical machine, and renting a vStack is renting one of many virtual machines installed within a physical machine. Is this correct? And, are there any practical reasons not to "downgrade" to a vStack? When should someone choose a VMWare over a vStack?
fedilink

[Test]
Setting up instance again. Testing that federation still works [EDIT] Conclusions: - Re-creating an instance and creating a user with the same name as before creates an issue when it re-interacts with a different instance. This user's page won't load. - If a user changes its display name and/or icon after interacting with a second instance, the changes will not be reflected in the second instance. At least not within a few minutes.
fedilink
0