@jonah @privacyguides Sorry, maybe that was too harsh, but I really think the article should be amended to... Place a explicit bold red warning about the risk of loss at the top of the passkey section.
I know that it does mention that it's possible to sync them and it's possible to have multiple passkeys, but... It doesn't show how, and it doesn't mention that that's not the default.
@jonah @privacyguides Oooof, ooof, ooof, this is really irresponsible.
This article only mentions the cons of passwords and only mentions the pros of passkeys.
Most paskey solutions are completely non-portable, proprietary, locked to a single device, and have no backup. So if you lose your device, you lose everything.
I don't think we should be advocating for a passkey usage until there's a coherent story about what happens when you lose your device.
Njalla ?
If you want fully "cooperative", there's always namecoin .bit domains. They just... Require a custom client, and dont auto-renew, and.... 😥
QueerCoded Learn to Code Workshop
<p>QueerMunity, Saturday, May 3 at 01:00 PM CDT</p><ul><li><p>Learn to Code</p></li><li><p>Find Community</p></li><li><p>Get to Know your Computer</p></li><li><p>Build your own Website / Software<br><br></p></li></ul>
https://calendar.layerze.ro/event/queercoded-learn-to-code-workshop-1
@neil boogertown usa
being able to use your programs properly? that's insecure. have you tried making them unusable
Cyberia Congress
<p>online, Sunday, April 27 at 12:00 PM CDT</p><p>Second Congress of Cyberia for 2025</p>
@kawaiipunk Okay, I didn't actually make this food. It's from a local diner, but I just wanted to share the pictures.
omfg the font used in this famous anti-piracy campaign used a pirated commercial font.
Today Melissa Lewis over on BlueSky pointed out that the font used nin the infamous "You wouldn't steal a car" anti-piracy campaign was actually designed by Just van Rossum, whose brother, Guido, created the Python programming language (bsky.app/profile/melissa.news/post/3ln7hx5rhcj2v)
She also pointed out that the font had been cloned and released illegally for free under the name "XBAND Rough". Naturally, it would be hilarious if the anti-piracy campaign actually turned out to have used this pirated font, so I went sleuthing and quickly found a PDF from the campaign site with the font embedded (web.archive.org/web/20051223202935/http://www.piracyisacrime.com:80/press/pdfs/150605_8PP_brochure.pdf).
So I chucked it into FontForge and yep, turns out the campaign used a pirated font the entire time!
@kawaiipunk you are making me drool, but I just want something green added, and btw can I drench it in hot sauce? ❤️🔥 that's the USA punk way, lol ❤️
@djh I'm starting to remember this now.. The z curve has slightly more discontinuities iirc but its also easier to find the sub sections. My method is kinda "brute force" based on sampling a reduced resolution version of the curve in order to decide where to split up the sections before running the actual DB queries.
But in my opinion, the most important thing to call out about all of this is that you don't need different database software / you don't need to modify the database at all. The app that talks to the database just needs to Use this "one weird trick" to generate keys and query ranges.
i don't understand what the bigmin thing is, Are you talking about an in-memory search or a database (on disk)?
I made my own version of software that does this. It uses a different space filling curve but the idea is the same. How I thought abt the query running really far outside the requested area: essentially you have to decide whether you want to prioritize fewer individual IO operations or less wasted IO bandwidth.
Since data on disks is laid out as one sequence, typically it's faster for a disk to read a little bit more data if it only has to do one single sequential scan, as opposed to reading a bunch of different little bits and pieces.
My solution simply downsampled the curve until It was no sweat for the computer to make a list of every single point on the curve within the queried area. From there, I settled on an algorithm that looked at the points on the curve and decided how many segments it would split them into. If the distance between two points was larger than the queried area, then I wouldnt join those two points into a contiguous segment, I would split the segments at that point.
The cool thing: this 1 rule perfectly expresses the trade-off between how many IO operations and how much wasted bandwidth. And it's tweakable at query time, not at indexing time. So you can set a coefficient for that threshold depending on the performance characteristics of your disk when handling your given data set.
I'm blocking the ui thread until I know whether the email was accepted or rejected. So I can't just wait 30 seconds for a bounce notif and then assume success. No one would use this site if you have to wait 30s every time you log in
I had considered that option, but I decided against it because I want to be able to tell the difference between time out and a success.
@drahardja get in the Eva shingy
I am a web technologist who is interested in supporting and building enjoyable ways for individuals, organizations, and communities to set up and maintain their own server infrastructure, including the hardware part.
I am currently working full time as an SRE 😫, but I am also heavily involved with Cyberia Computer Club and Layer Zero