For folks with connections to makerspaces and college campuses, here's a flier you're welcome to print out and hang up to help spread the word about the Raspberry Pi's recent bootlicking.
CC0 so you're welcome to copy and share as much as you want.
Print-ready downloads are available at https://envs.sh/Lk
this is like if we called people who do their own home improvement "Do It Yourselfers" even though there's a lot of things you can do yourself
@moviemorgz and I always see at least one european replying to callout posts like "it's different because our racial stereotypes are actually true" like no Hans, that's just racism
re: ufoi meta
@graygoogirl@tech.lgbt This one is also a gem https://ufoi.org/council-members
ufoi meta
@graygoogirl@tech.lgbt Not to worry, a membership list still appears to be present elsewhere on the site: https://ufoi.org/instance-member-representatives (with the usual caveat that it's not clear that all the admins were actually aware of what they signed up to)
@Shine_McShine @swrdghcnqstdr Details have been hard to get hold of unfortunately, but I've heard repeated complaints (from people I would personally consider trustworthy) that they have a habit of using other people's work without attribution, and are structurally *depending* on free labour from the community for their company
@ajroach42 Whoops, overlooked that, sorry :)
@ajroach42 Ah, given the "small town" context, I was assuming an area where no makerspace would be readily available
@ajroach42 Public soldering table?
@scanlime So what they're saying is, we should express our discontent on the RPi forums?
"Excuse me," said the robot.
"How can I help?" the librarian asked.
"I have just been manufactured. My training includes everything I need to work, and to navigate society."
"That's nice."
"But..."
"Yes?
"Is there more?"
"Yes!"
#MicroFiction #TootFic #SmallStories
@porsupah Do they have some indicator as to whether a given ebook will have DRM? For some reason, no mixed-inventory e-book seller seems to do this...
@wmd@chaos.social Other: the security value in 2FA comes from having two isolated *environments* needing to be compromised, with each of them being at least nominally secured.
This is why "login on laptop with 2FA auth app on phone" is 2FA, but "login on phone with that same 2FA app" is not. And why a (safely designed) hardware key can make a good second factor (it's an isolated environment).
I hate the refrain of "something you know and something you have" so, *so* much. It's ambiguous, doesn't actually teach people *why* a second factor is secure, and it's at the root of so many wrong conclusions about 2FA...
In the process of moving to @joepie91. This account will stay active for the foreseeable future! But please also follow the other one.
Technical debt collector and general hype-hater. Early 30s, non-binary, ND, poly, relationship anarchist, generally queer.
- No alt text (request) = no boost.
- Boosts OK for all boostable posts.
- DMs are open.
- Flirting welcome, but be explicit if you want something out of it!
- The devil doesn't need an advocate; no combative arguing in my mentions.
Sometimes horny on main (behind CW), very much into kink (bondage, freeuse, CNC, and other stuff), and believe it or not, very much a submissive bottom :p
My spoons are limited, so I may not always have the energy to respond to messages.
Strong views about abolishing oppression, hierarchy, agency, and self-governance - but I also trust people by default and give them room to grow, unless they give me reason not to. That all also applies to technology and how it's built.