Kalcifer

joined 1 year ago
[–] [email protected] 10 points 11 months ago

Maybe something like taskrabbit? Could pay them to pick it up, then send it through a courier.

[–] [email protected] 2 points 11 months ago

Thunder has an option to dim read posts.

[–] [email protected] 3 points 11 months ago

I recommend downloading it from f-droid if you want full functionality (like self-hosted sync) for free -- the one in the play store is monetized (however I do recommend donating to the dev if you don't want to pay the subscription fee).

[–] [email protected] 4 points 11 months ago (1 children)

Does your network not support UPnP? You shouldn't normally need to port forward in order to seed a torrent, unless your network prevents NAT traversal.

[–] [email protected] 3 points 11 months ago (1 children)

The 2022 remaster of Tomorrow Never Knows by The Beatles (spotify) has lots of sounds that pan left and right, but they may not be the kind of "rapid panning" that you are talking about.

[–] [email protected] 29 points 1 year ago* (last edited 1 year ago) (1 children)

That's because, currently, the community stats that you see in the sidebar are only from your instance -- community stats are currently not federated. Afaik, federated community stats are going to be implemented in 0.19.

 

More often than not, the best way to hide is to simply blend in with the crowds -- this also encompasses one's choice for a username. It is relatively simple to make a single throwaway account -- just come up with a username, and off you go -- however, if one makes throwaway accounts often, the task of thinking of a unique, and non-identifiable username can become a challenge. I would argue that poeple would often resort to using a pattern employing small changes for all subsequent usernames. Such patterns can be identified to a specific user if all users have their own unique patterns.

How can one reliably generate many unique-but-normal, and non-pattern-identifiable usernames?

 

Currently, only one company in the world -- ASML -- has the technological capability necessary for the creation of photolithography machines which are sufficient for the production of modern semiconductor devices. What I'm wondering is at what point does semiconductor manufacturing become practical, or even feesible for small organizations, or independents? One must be able to surpass the cost of the machines, and the resources necessary to manufacture them. I presume that a company like ASML is also extremely picky -- willfully, or by regulation, or otherwise -- about who they lend their technology to.


I'm not sure if this is the right community for this sort of post. Please let me know if not, and if there is a more suitable place to put it.

[–] [email protected] 1 points 1 year ago (1 children)

Deletion not federated yet, then.

[–] [email protected] 9 points 1 year ago

After some testing, It might be that the parent commenter just deleted their comment which nuked all the child comments. I can't rememeber if this is what Reddit does. I think it just sais "Deleted by creator", but keeps the children. Could certainly be wrong, though.

[–] [email protected] 7 points 1 year ago* (last edited 1 year ago) (1 children)

Yup it appears that our entire comment chain got nuked. So it is now confirmed that if you delete the parent, then all children get removed as well.


For any reading this message, the context is that we tested it by me replying to OP's previous comment, then OP responding to me, then I deleted my comment to see if their comment also got deleted.

[–] [email protected] 1 points 1 year ago (3 children)

I have deleted the previous message

[–] [email protected] 3 points 1 year ago (1 children)

Is that a cross? I was under the impression that it was a small microphone strung around his neck for the interview's audio. Although, it is quite possible that such sizes of microphones that could record this level of quality didn't even exist back then -- I'm not very familiar with the technology of that period.

 

On the side bar it lists the following:

  • [Matrix/Element]Dead
  • Discord

"Discord" is an active link, but the Matrix link is completely inactive. Not only is it inactive (which could have be excused as a broken link), but it is also manually labeled as "Dead", as if there is no intention of making it work. How can a community that is focused on privacy willingly favor a service that is privacy non-respecting when a perfectly functional privacy-respecting alternative exists?

 

In the official browser app, and any of the mobile apps that I have examined so far, it seems that you are only ever able to see the total number of likes, or dislikes that a post has, and you are not able to see exactly who upvoted, or downvoted the post. Does ActivityPub, or Lemmy track this information at all, or does it just keep a tally?

 

I'm not sure if this is the right community for this sort of post. I couldn't think of any other community to post it in. If there does exist a more appropriate place to post it, then please let me know.

 

I believe that the addition of an edit history would be a massive boon to the usefulness of Lemmy on the whole. A common problem with forums is the relatively low level of trust that users can have in another's content. When one has the ability to edit their posts, and comments this invites the possibility of misleading the reader -- for example, one can create a comment, then, after gaining likes, and comments, reword the comment to either destroy the usefulness of the thread on the whole, or mislead a future reader. The addition of an edit history would solve this issue.

Lemmy already tracks that a post was edited (I point your attention to the little pencil icon that you see in a posts header in the browser version of the lemmy-ui). What I am describing is the expansion of this feature. The format that I have envisioned is something very similar to what Element does. For example:

What this image is depicting is a visual of what parts of the post were changed at the time that it was edited, and a complete history of every edit made to the post -- sort of like a "git diff".

I would love to hear the feedback of all Lemmings on this idea for a feature -- concerns, suggestions, praise, criticisms, or anything else!


This post is the result of the current (2023-10-03T07:37Z) status of this GitHub post. It was closed by a maintainer/dev of the Lemmy repo. I personally don't think that the issue got enough attention, or input, so I am posting it here in an attempt to open it up to a potentially wider audience.

 

As I noted within my post, #[email protected] (alternate link), URL thumbnail generation in Element is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:

In encrypted rooms, like this one, URL previews are disabled by default to ensure that your homeserver (where the previews are generated) cannot gather information about links you see in this room.


Post Edit History

2023-10-02T00:54Z
1c1,2
< As I noted within my post #[email protected] ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server.
***
> As I noted within my post #[email protected] ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:
> > In encrypted rooms, like this one, URL previews are disabled by default to ensure that your homeserver (where the previews are generated) cannot gather information about links you see in this room.

2023-10-02T01:28Z
1,2c1,2
< As I noted within my post #[email protected] ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:
< > In encrypted rooms, like this one, URL previews are disabled by default to ensure that your homeserver (where the previews are generated) cannot gather information about links you see in this room. 
***
>  As I noted within my post, #[email protected] ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:
> > In encrypted rooms, like this one, URL previews are disabled by default to ensure that your homeserver (where the previews are generated) cannot gather information about links you see in this room.

2023-10-02T03:44Z
1c1
< As I noted within my post, #[email protected] ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:
***
> As I noted within my post, #[email protected] ([alternate link](https://lemm.ee/post/9955859)), URL thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:

Post Signature

ul7mHTfs8xA/WWwNTVQ9HzKfj/b+xw+q9csWf60OJrT58jMJpmsX8/BicwFodR8W
Llo93EMtboSUEtYZ+wQhaL/HmrEr6arup7gJzZgslOBWPFj5azADHSpjX9RYuvpt
Fk2muTUgJP2e+SW3BGDPmlcluw6mQOYcap84Fdc1eU47LOZprBXob97qInMK5LrL
tzNqARRtXGdogZtQYlNCqCd9eQgqTwPfxKVadmM6G3xQMh6mWQxQz56sCXqj+mlG
OqJyZIgB1UXEuVZeAO3pl9wN+cSM4eqHLHQwEd+aVeSPf75r2d7mZs+VNwr1WfMu
0sWcPh3aZLXKqdls6UJMEA==
9
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

I recently found that there is a room setting to enable the generation of URL previews. This makes me wonder, though: Who is generating the thumbnails? Does the server generate them, and then send the images back (this is an obvious privacy, and security vulnerability)? Does a user generate them locally, and send them to the other recipient (this is what Signal does)? Does the receiver generate them on their end (this is also a potential security vulnerability)?

EDIT (2023-10-01T21:38Z): I found this documentation which outlines the possible methods, but, from what I can see, it doesn't specify what one is actually used in practice. I was also unable to find any information in the Matrix spec.

EDIT (2023-10-01T21:41Z): In this set of release notes for Synapse 1.45.1, I found the following:

Note that URL previews are generated server-side, and thus generally disabled in encrypted rooms to avoid leaking information about message content to your homeserver. You may need to adjust the room's settings to see the new oEmbed previews.

If this is true, and all thumbnails are generated serverside, this is an enourmous security, and privacy risk.

EDIT (2023-10-01T22:18Z): Further research has found the following two open issues:

This confirms my suspicion -- at the very least, for Element (I have still been unable to find any official standardized method within the Matrix protocol). My PSA that I would provide, then, to any who are reading this, is to not enable thumbnail generation, as it is a major privacy, and security vulnerability.

 

cross-posted from: https://lemm.ee/post/9588905

Lemmy is licensed under the AGPLv3. I don't want to rely solely on my own legal interpretation of the license, so I'm wondering if anyone has any explicit knowledge on the matter.

As an aside, am I correct in assuming that, if someone does make changes to the source code, they must host, and link to it?

EDIT (2023-09-27T22:22Z): I am just now seeing that at the bottom of a Lemmy instance's site, there is a link that says "Code". It appears that this is handled automatically.

 

Lemmy is licensed under the AGPLv3. I don't want to rely solely on my own legal interpretation of the license, so I'm wondering if anyone has any explicit knowledge on the matter.

As an aside, am I correct in assuming that, if someone does make changes to the source code, they must host, and link to it?

EDIT (2023-09-27T22:22Z): I am just now seeing that at the bottom of a Lemmy instance's site, there is a link that says "Code". It appears that this is handled automatically.

view more: next ›