[-] [email protected] 7 points 1 month ago

They said "please stop donating". Returning funds or organizing what to do with them is a bunch of work. If they're shutting down because running the instance is too much work and they feel hassled then I wouldn't begrudge them just keeping the few thousand left over.

[-] [email protected] 5 points 1 month ago

Makes sense.

For a reference point: I'm a millennial, living in a pretty liberal state of the US. Reading the front page of Reddit (not logged in, running ad-blockers so I think I get a "generic" experience), Ars Technica, occasional HackerNews threads, Something Awful forums. My friend circles are unanimous that Israel is an apartheid state, Russia is an invader, immigrants are not any kind of problem. It includes a few trans people who are vocal about their experiences. I would not call it a radically progressive group. For example, I don't think most of them would actually be comfortable with mass-executions of wealthy people.

Before joining Lemmy, I'd never encountered "tankies" in enough quantity for them to have any kind of label or for anyone to self-identify as "anti-tankie". It's still a weird idea to me.

[-] [email protected] 7 points 1 month ago

I appreciate you explaining it. My LLM wasn't working so I didn't understand the joke

[-] [email protected] 7 points 2 months ago

I think Mojo's comment is meant sarcastically. I.e. UCH does murder sick people.

But to your question: the presumption of innocence. You've got the burden-of-proof backwards; it's not "prove he didn't commit murder" but rather "prove he did". What I've seen is: some blurry pictures of a white man with brown hair in NYC, security footage of a white man with brown hair doing the killing, and the police say that they found a confession-manifesto and a ghost-gun on Mangione when they arrested him.

As a white man with brown hair who doesn't trust the police, I feel concerned about this standard of evidence!

The physical evidence would seem pretty strong but: a manifesto is something you mail, not carry around with you waiting to be arrested. And a ghost-gun is something you throw away immediately, not hang on to across state lines.

My main point here isn't that it's a slam-dunk "no possible way he could have done it". But that it's just not a ton of evidence. And the pressure to get a conviction and execute someone is incredibly strong. I'd say there's decent evidence that the NYC cops are corrupt and setting up an innocent man to make themselves look good. If we're going to jump to a verdict before the trial, what made you pick the one you picked?

[-] [email protected] 7 points 2 months ago

To someone watching network traffic, a VPN connection looks like two machines exchanging encrypted packets. You can't see the actual data inside the packet, but you can see all the metadata (who it's addressed to, how big it is, whether its TCP or UDP, when it's sent). From the metadata, you can make guesses about the content and VPN would be pretty easy to guess.

When sending a packet over the Internet, there's two parts of the address: the IP address and the port. The IP address is a specific Internet location, blocks of IP addresses are owned by groups (who owns what is public info) and there are many services that do geo-ip mappings. So if you're connecting to an IP address that belongs to a known VPN provider, that's easy.

The second part of the address is the port-number. Servers choose port-numbers to listen to and the common convention is to use well-known ports. So, for example, HTTPS traffic is on port 443. If you see a computer making a lot of requests to port 443, even though the traffic is encrypted we can guess that they're browsing the web. Wikipedia has a list (which is incomplete because new software can be written at any time and make up a new port that it prefers) and you can see lots of VPN software on there. If you're connecting to a port that's known to be used by VPN software, we can guess that you're using VPN software.

Once you're running VPN software on an unknown machine and have configured it to use a non-standard port, it's a bit harder to tell what's happening, but it's still possible to make a pretty confident guess. Some VPN setups use "split-tunnel" where some traffic goes over VPN and some over the public Internet. (This is most common in corporate use where private company traffic goes in the tunnel, but browsing Lemmy would go over public.) Sometimes, DNS doesn't go through the VPN which is a big give-away: you looked up "foo.com" and sent traffic to 172.67.137.159. Then you looked up "bar.org" and sent traffic to the same 172.67.137.159. Odds are that thing is a VPN (or other proxy).

Finally, you can just look at more complex patterns in the traffic. If you're interested, you could install Wireshark or just run tcpdump and watch your own network traffic. Basic web-browsing is very visible: you send a small request ("HTTP GET /index.html") and you get a much bigger response back. Then you send a flurry of smaller requests for all the page elements and get a bunch of bigger responses. Then there's a huuuuge pause. Different protocols will have different shapes (a MOBA game would probably show more even traffic back-and-forth).

You wouldn't be able to be absolutely confident with this, but over enough time and people you can get very close. Or you can just be a bit aggressive and incorrectly mark things as VPNs.

[-] [email protected] 5 points 3 months ago

Wow! That is a big bean!

[-] [email protected] 7 points 3 months ago

OpenTofu is mostly getting users from the corporate world. My work is on Slack and we're moving to OT. The lowest-friction for me as an OT-when-at-work user is to add another Slack. (I'd personally rather that they used an open platform. But it's easy for me to see why they didn't.)

[-] [email protected] 5 points 3 months ago

There's substantial Israelis who aren't calling for genocide. But it's like the US after 9-11 and they've mostly gone into hiding because the right-wing media presence is so overpowering and successful on the "with us or against us" message.

[-] [email protected] 8 points 3 months ago

I like my Shield TV: https://www.nvidia.com/en-us/shield/shield-tv/

I did need to install a custom launcher on it when the standard AndroidTV launcher added ads.

[-] [email protected] 5 points 3 months ago

Is nobody else speaking to them? I think nobody else is coddling them. Like, leftist women aren't saying, "I won't date you unless you cut your dick off." But they are saying, "I won't date you unless you do at least 10% of the housework." I think the bar for acceptance among the left is pathetically low.

[-] [email protected] 5 points 3 months ago

Most of my cookie recipes use eggs!

[-] [email protected] 8 points 3 months ago

As an undergraduate, I wondered how it was possible to write code professionally, because I could only barely fit the semester-long programming assignment in my head. When I asked my professor about it, I got an independent study credit to learn about UML.

UML (as a representative example of thoughtful documentation) is a partial answer. But actually a much larger part is that with practice I can hold a lot more code in my head. Today, that semester project seems trivial and if I see a stack trace I can tell you how to fix the bug that caused that exception to get thrown.

As a senior dev, I'd answer "how do you remember what your code does?" with

  1. As you work, you get better at just remembering
  2. As you find patterns and follow them, you'll have less to remember (I bet I know what the downloadUnpackUpdate() method does!)
  3. As you do the first two, you'll learn to recognize when comments are helpful
view more: ‹ prev next ›

Mniot

0 post score
0 comment score
joined 3 months ago