So.. Of y’all that had covid. Did you have at the end a night where for no reason your brain amped up to 11 and can’t sleep at all? It happened to me last night and my FIL the night before.
I went to bed at 8 and woke up full on anxiety attack at 12 and could not calm my head until around 7 am. Today has sucked a lot.
@eapl.me@eapl.me are ISPs still injecting code into HTTP in this the year 2023? I remember getting notices that my comcast modem is out of date pushed into websites back a decade ago.
@abucci@anthony.buc.ci predicting weather is literally a step up from the 3 body problem into n-body chaos. AI is just statistics pushed up into chaos. The future of computing is indistinguishable from magical incantations
The AI bubble is now upon us!
I feel for ya. I have used tftp for two things in the past. Copying an image to a Cisco router to flash. And doing a network install because I didn’t have a flash drive handy.
Really?? I have not yet seen this warning. Using ublock origin.
Suuuuure. If someone could run a quantum algorithm on a smart phone that would be novel
@movq@www.uninformativ.de time to write your own browser? Or at least a fork maintained outside the EU?
I suppose the p90/p50 would be higher. Right? I never remember which way that funnel goes.
@prologic@twtxt.net in the article they say they have a p99 of 15ms reading historical data. Which is pretty nuts.. Aside from having close to 900TB of SSD…
Read this interesting retro about discords migration path from Mongo to Cassandra to now ScyllaDB.
https://discord.com/blog/how-discord-stores-trillions-of-messages
Oh. I pulled up the feed and its at eli.li instead of theoatmeal.com
@prologic@twtxt.net curious that this feed has a image from a 3rd party domain.
@mckinley@twtxt.net you got some radiation issues? I am guessing this is non ECC rams.
@lyse@lyse.isobeef.org I wish more standardization around distributed issues and PRs within the repo ala git-bug was around for this. I see it has added some bridge tooling now.
This is some cool development for the go 1.22 standard http mux. Its adding the ability to have path vars and define methods for handlers. Also the errors are quite helpful if you have conflicting paths!
https://eli.thegreenplace.net/2023/better-http-server-routing-in-go-122/
@prologic@twtxt.net I have seen these screen shots. But have not yet seen them in actuality. I use ublockOrigin. Maybe it gets these too unlike adblock.
For android I have revanced.. The only place I get ads is on TV. I haven’t found a replacement there.
jellyfin is also a good alternative with free apps for your phone.
I like how you can just toss out partitions and not have to worry about sizing them right.
@lyse@lyse.isobeef.org that and malformed XML errors were hostile AF to users that came across them.
So far it all seems prey snappy. No long pauses when pulling up threads at all.
@prologic@twtxt.net I do similar. Though probably much more simple.. I have CGNAT and use wireguard to VMs to punch through for stuff like HTTP/SSH from external.
And for SMTP I have smart hosts on the VMs that will store anf forward to my mailbox if the connection goes down.
@prologic@twtxt.net I find the L2 mode where you have one interface and multiple hosts to be tricky. Its best if you are trying to make a full mesh style. But then all hosts need to be able to see one another.
I have had more success using point-to-point connections where there are only two ends to each interface. It means you have a ton of interfaces and udp ports. but you can share the host IP across the interfaces. Add to that a simple router proto ala OSPF or RIP and you can navigate around not having a full meshnet.
I have dozens of localnet wireguard connections and many more connections to others that use bgp for route propagation.
@prologic@twtxt.net we need to finally break away from twtxt URLs and embrace @nick@server
to webfinger lookups.
@prologic@twtxt.net what is the maxlen one should keep in mind here? Like say if I was charing the collected works of Shakespeare? Or maybe just a gpg keychain?
moved my yarn to a new server.. will see if it still has the slow cache issue.
@prologic@twtxt.net I had a peering to NNTP back in the day. That would be neat to setup.
I like FIDO2 as a replacement for passwords. But you gotta keep track of the little dongle
@movq@www.uninformativ.de the true 7 bit ascii
I picked up a tiny nuc a bit ago with 64G ram and 16 ryzen cores.
How much CPU you got in the server farm? I thought you had a whole rack.
Woh.. never heard of it. Growing up it was always just the MS EDIT.EXE or for more advanced stuff Nortons editor.
I need to get influxdb up on my router. But I do about .5TB per week. So seems pretty on par to you with all that streaming the family does.
@movq@www.uninformativ.de that is soo much traffic. I don’t think I have ever broken 1TB /mo across my VMS ever.
@prologic@twtxt.net was this in reply to a different thread? Or maybe a hash collision?
@prologic@twtxt.net laughs.. I’m in danger.
@abucci@anthony.buc.ci excellent work on embedding the YO in Hello
@abucci@anthony.buc.ci @prologic@twtxt.net neat.. I saw this one quite a while ago. it is strictly line of sight and blocked by walls or things. The use cases were to have it integrated in the lights in a room and provide super fast connections to devices in an office or coffee shop.
@abucci@anthony.buc.ci my last experience with it was with a Debian package which is known for being out of date :-D
My home ISP has had a few prefixes allocated. They haven’t rolled of out yet because their custom CRM system needs to be updated to be able to allocate/bill for it. Along other reasons they gave when I asked last.
@abucci@anthony.buc.ci does fail2ban work with ipv6 yet?
@hecanjog@hecanjog.com I have a script for tmux that sets up a new if needed among other things.
http://github.com/brandur/tmux-extra
Works great with powerline.
I suppose to lesson confusion I would rename Is
to Because
So you would have:
type ErrPermissionNotAllowed []Permission
func (perms ErrPermissionNotAllowed) Is(permission Permission) bool {
for _, p := range perms {
if p == permission { return true }
}
return false
}
var err error = errPermissionNotAllowed{"is-noob"}
if errors.Is(err, ErrPermissionNotAllowed{}) { ... } // user is not allowed
var e ErrPermissionNotAllowed
if errors.As(err, e) && e.Is("a-noob") { ... } // user is not allowed because they are a noob.
@lyse@lyse.isobeef.org do you need to have an explicit Is function? I believe errors.Is has reflect lite and can do the type infer for you. The Is is only really needed if you have a dynamic type. Or are matching a set of types as a single error maybe? The only required one would be Unwrap if your error contained some other base type so that Is/As can reach them in the stack.
As is perfect for your array type because it asserts the matching type out the wrap stack and populates the type for evaluating its contents.
You can have Error return just “permission not allowed” if the array is empty. It would print the same as the first.
Why not just always use the second one?
@prologic@twtxt.net is goryon not in the google app store?
yeah.. i guess he upped that… but scrolling for a bit can burn through that quite quickly.
If you are going to compare iPhone with android you can’t just throw out bargan bin android phones.. Should compare within the same price points like the Pixel, Galaxy, Pine, or OnePlus models.
Funny.. I would never buy an iPhone again. My wife switched back this last phone update and I can’t stand the interface.
Whelp. The suckification of social media is continuing to expand. Twitter only allows 600 tweets per day unless you pay and then its 6k per day.
An official FBI document dated January 2021, obtained by the American association “Property of People” through the Freedom of Information Act.
This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata (“Pen Register”) or connection data retention law (“18 USC§2703”). Here, in essence, is the information the FBI says it can retrieve:
Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.
Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).
Signal: date and time of account creation and date of last connection.
Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.
Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.
Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).
WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.
WhatsApp: the targeted person’s basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time (“Pen Register”); message content can be retrieved via iCloud backups.
Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.
TL;DR Signal is the messaging system that provides the least information to investigators.
Ol Ben sets himself up as an intellectual for the right. He got promoted up with his connections with PragerU. Talks like he is the smartest one in the room. Though his arguments are full of logical fallacies. He is up there with Joe Rogan and the ilk destroying rational though in America.
@prologic@twtxt.net The hackathon project that I did recently used openai and embedded the response info into the prompt. So basically i would search for the top 3 most relevant search results to feed into the prompt and the AI would summarize to answer their question.
But remember the LLM is only a very good auto complete.
Most of the can run locally have such a small training set they arnt worth it. Are more like the Markov chains from the subreddit simulator days.
There is one called orca that seems promising that will be released as OSS soon. Its running at comparable numbers to OpenAI 3.5.
Interesting thoughts about multi thread vs single thread performance.
Boy, the quality of Time is fallen from when it was the Time of its Time to being nearly the Time of our Time!
Man.. Putin is really becoming the ‘Stalin’ of Russia!
Sad to see it come crashing down
Just local NAS currently
Municipal Fiber is the way
@mckinley@twtxt.net ninja backup and Borg
@prologic@twtxt.net that would work if it was using shamir’s secret sharing .. although i think its typically 3 of 5 so you get 3, one to the company, and one to the “third party”. so you can recover all you want.. but if the company or 3rd wants to they need one of your 3 to recover.
but still .. if they are providing them then whats the point of trusting they don’t have copies.
@movq@www.uninformativ.de § after we pass the key over to the GOV cloud for our protection.
@abucci@anthony.buc.ci buuuuut it show when winter!
In the time scale viewed from the planets perspective, the climate has changed many many times.. The issue is whether that change that will inevitability come is hospitable to us meat bags. Or if we are doomed to take part in the next mass extinction event.
@movq@www.uninformativ.de @prologic@twtxt.net you think we could get media cards to show youtube previews?
I setup Joplin with caddy as the WebDAV server. Works okay. The e2e encryption can get messed up sometimes. Supports markdown and images.
@prologic@twtxt.net hey.
@abucci@anthony.buc.ci read my new skibloreet about why social meets payments is the next level idea! For just §5 bitshlongs a month on my serfdomage site!
Also a interesting contender. https://store.minisforum.com/products/minisforum-um773-lite?variant=43717641994485
ECC ram would make it perfect.
@shreyan@twtxt.net probably ~1k up to 1.5k. One I found had 64G ram and 12C / 16T for 1.1k
@prologic@twtxt.net have trued to get a RasPi lately? Them things are Unobtainium
What is a good device for home virtualization these days? I have been looking at the Intel NUC 13 pro’s. Basically I want something “quiet” (ie not a screaming banshee 1U), smallish, but with lots of threads and rams. Disk will come from an external NAS.
@abucci@anthony.buc.ci Ben Shapiro has plenty to be ashamed of not the least of which is selling his home to Aquaman: https://www.youtube.com/watch?v=X9FGRkqUdf8
They haven’t written the federation code yet. Its literally run on the staging instance. People are paying to access the alpha. Though if you want a code to see what all the fuss is about there are a few with invites around here.
@carsten@yarn.zn80.net any photos on how it turned out?
I too get this error.it comes and goes. Seems cookie related.
Art is not the medium.
The medium can be material or conceptual, permanent or fleating, truthful or fictional, of human, animal, or artificial origin.
Art is the reconveyance of human emotion or experience to another via some medium.
@shreyan@twtxt.net my condolences for the pain you no doubt will inflict upon others that will have to maintain whatever you write in Ruby.
@prologic@twtxt.net closed as in you have to be an account on their service to interact with others. And can’t communicate cross service. Some require you to be logged in to view content. Others will pop up annoying overlays after scrolling some content to sign up for more.
Can I have my balll?
an interesting observation in a post twitter reality is how services that are sprouting up to claim some of the refugees are setting themselves up as closed gardens. without the option to federate with other services. like spoutable, counter.social, post, clubhouse and such.
twtxt, as I believe it was originally intended, are short little status updates – that’s it.
So, basically a .plan file for finger. But, on the web. like a *web*finger. We have come full circle on this loop!
We could ask them? But on the counter would bukket or jan6 follow the pure twtxt feeds? Probably not either way… We could use content negotiation as well. text/plain for basic and text/yarn for enhanced.
From my small experience in writing an event database, I am inclined to agree with this.
An option would be to have /twtxt.txt be the base functionality as bukket intended without subject tags, markdown, images and such truncated to 140 chars. a /yarn.txt that has all the extentions as we know and love. and maybe a /.well-known/webfinger + (TBD endpoint) that adds on the crypto enhancements that further extend things.
@darch@neotxt.dk I think having a way to layer on features so those who can support/desire them can. It would be best for the community to be able to layer on (or off) the features.
And to add close integration with salty/ratchet for realtime private chat
I’m not super a fan of using json. I feel we could still use text as the medium. Maybe a modified version to fix any weakness.
What if instead of signing each twt individually we generated a merkle tree using the twt hashes? Then a signature of the root hash. This would ensure the full stream of twts are intact with a minimal overhead. With the added bonus of helping clients identify missing twts when syncing/gossiping.
Have two endpoints. One as the webfinger to link profile details and avatar like you posted. And the signature for the merkleroot twt. And the other a pageable stream of twts. Or individual twts/merkle branch to incrementally access twt feeds.
@abucci@anthony.buc.ci that is an ironic example. Since the inventor of the seatbelt gave rights to use the technology freely.