Show newer

request for historical/scientific context, food/nutrition :boost_requested: 

@mvgorcum@chaos.social Podcasts are not really accessible to me, unfortunately.

@emily I am suddenly reminded of the *actually* reversible A and micro-B cable I had at one point, which certainly was a creative way to try and solve this issue

you can make connectors that look reversible from the outside (A, arguably mini), or you can make a fancy reversible connector that a nontrivial number of engineers will half-ass and get wrong (C), or you can use the one that has an obvious orientation so nobody has this problem at all

Show thread

Oh, remember those USB-rechargeable 9V batteries I bought a while ago?

Yeah, definitely DO NOT use them in a smoke alarm. They go from 9V to 0V as soon as the internal cell’s under-voltage cutoff is hit. A real 9V battery slowly loses voltage as it discharges, the smoke alarm monitors this and makes annoying beeping noises when the battery voltage goes under a threshold.

⚠️ Going from 9V straight to 0V gives you a dead smoke alarm with no warning ⚠️

UPDATE: I pulled this battery apart to find out how it works, and it’s exactly like I said here. Thread continues below with photos of the inside of the battery

aus.social/@jpm/11295159909763

I want to get out and meet more people. What's the closest thing to fedi IRL?

As a collaborative artist, I wanted to push back on the idea that creative teams need a strong leader.

Collaborative process is a skill that people study and practice. Most teams aren't trained in that skillset, but they could be.

miriamsuzanne.com/2024/08/08/v

Hey app developers, especially plural folks:

Check out @ampersand - It's an open source app being made for tracking and journaling for plural systems.

The lead developer is currently struggling a bit and would appreciate some help getting it in a usable state. It sounds really useful to me but I don't have much ability to contribute to its development myself.

Go check it out if it sounds interesting to you at all! Thanks 💜

Scotland against racism, call to action 

Stand Up to Racism #Scotland has called a national day of action on Saturday (10 August 2024)

Demonstrations in #Edinburgh, at Parliament, at 11:00; in #Glasgow, at George Square, at 11:00; in #Dundee, at City Square, at 12:30

Unite against the far-right!

Scotland against racism, call to action (Paisley) 

Far-right is planning to attack a hotel housing asylum seekers in #Paisley on Friday (9 August 2024)

Stand Up to Racism #Scotland has called a counteraction to defend refugees and oppose the fascists. 17:30 at the Watermill Hotel. be there if you can

Show thread

Scotland against racism, call to action (Bathgate) 

Tomorrow (9 August 2024) nazis are also planning to attack asylum seekers at the Cairn Hotel in #Bathgate

Stand Up to Racism #Scotland has called a counteraction for 18:00. if you can't get to Paisley, please try getting over to Bathgate to defend refugees there from fascist violence

Show thread

A frustrating part of capitalist tech that I rarely hear people talk about: when something doesn't work, I can't tell whether that's because of a bug, or because someone deemed it more profitable for it to be broken.

@Rairii@social.nano.lgbt @flaki It wasn't, but droves of developers believed it was due to the marketing and nobody checked. Everything was priced in tiny quantities like GB of traffic and MB of storage for a reason...

request for historical/scientific context, food/nutrition :boost_requested: 

@cephie The whole "consumption of ultra-processed foods results in health issues" feels a lot to me like the usual "being poor is bad for your health" in a trenchcoat.

I've not read all of the studies that it references on this point, but every single study I've read like it in the past is basically just observing a correlation without being able to highlight *why* it happens (and never talking about the role of poverty), so I'm highly skeptical of such studies by default.

re: linux server security checklist 

@madcap @katnjiapus I have personally not found any value in it from a security perspective; if you're going to be using your SSH access for server administration, then your account will functionally have to have root access anyway (password-based escalation is really easy to keylog by a hypothetical attacker...) so it mostly just adds an extra step for any administrative command you want to run.

That extra step *can* be desirable to reduce the chance of making destructive mistakes yourself, as an extra confirmation step; though it doesn't protect you from all failure modes. But that's not really a security thing so much as a slightly inconvenient usage safeguard.

re: linux server security checklist 

@madcap The problem is that these are complex questions to answer without a lot of background knowledge and experience in server management - how would one know if their IP often changes if they haven't already been doing server stuff for a while, for example?

So providing a list with "niche" recommendations that the recipient is then supposed to choose from, is usually the opposite of helpful, and just becomes overwhelming - it still doesn't tell them what they should or shouldn't do, it just creates more questions they now need to figure out.

(The usual heuristic applies here - as soon as you're saying someone could "just" do something, you should take a step back and ask yourself what this actually entails, and whether it is as easy for someone else as it is for yourself.)

I don't know the exact background and experience of @katnjiapus, but given that they ask specifically for a checklist, I would assume that they are looking for a list of "things they definitely should be doing, so they can be confident that it's set up right even if they're just starting to do server stuff and aren't familiar with it yet".

And to be clear, this is not really about you specifically, I see a *lot* of tech folks having this tendency to frontload all the information (relevant or otherwise) when someone asks a beginner question, but that's really something we should all unlearn if we want to have any hope of having people run their own services. Focus on the certainties, add the nuances later.

request for historical/scientific context, food/nutrition :boost_requested: 

@liketechnik@chaos.social Yeah. Going from the history described on Wikipedia, it sounds like the whole thing is built on "treating correlation as causation"? It's not clear to me how this classification ever became a scientifically acceptable basis to build research on.

Buster is a browser extension that solves captchas for you.

It leverages the fact that blind people should be allowed to use the web too.

github.com/dessant/buster

I love this for 2 reasons:

1. Fuck Captchas
2. Fuck Captcha Companies getting free labor from people to train AI.

I hate this because i fear if it catches on this will negatively impact blind people's ability to use the web.

See also points 1 & 2 re EVERYONE.

Meine Odysee mit einem gesperrten #Hetzner #server
Hetzner sperrte mir einen Server, weil sie von ihm einen Portscan entdeckten. Laut dump den ich bekam, probierte der Server IP Adressen von 235.185.x.x jeweils auf Port 443 durch, ob jemand zuhört. Portscans sind von Hetznerservern aus nicht erlaubt. Also wird die IP gesperrt. Der Server war mein Wireguard Endpunkt, also erstmal suchen, wo der Fehler liegt. Ein vermuteter Plasterouter wurde von mir aus dem VPN genommen, Server wieder entsperrt. Wenige Tage passiert das nochmal, und die IP wird wieder gesperrt.
Nur dieses mal will Hetzner den Server nicht mehr entsperren, auch wenn er komplett neu aufgesetzt ist, alle Keys fürs Wireguard neu erstellt, etc. Nein, da muss ja irgendwo noch ein Fehler sein, den soll ich gefälligst erstmal finden. Das war auch kein Scan mit hunderten parallelen Anfragen, es wurden in etwas mehr als 3 Minuten ein paar Hundert IP Adressen auf Port 443 angeklopft. Es war halt genug, dass die Erkennung bei Hetzner ansprang, aber es wurde keine Netzwerkkapazität beeinträchtigt.
Da ich mein VPN gerne wieder gehabt hätte geht die Suche also weiter. Die IP Adressen gehören Criteo, Online Werbung. Ah-ha, hat sich irgendwer Werbesoftware im VPN eingetreten? Zeitstempel des Dumps von Hetzner angeschaut. Siehe da, zeitgleich war ich mit meinem Rechner bei wetteronline.de
Eine kurze Suche nach Criteo und wetteronline bringt folgendes hervor: www.criteo.com/de/success-stor…
"WetterOnline verdoppelt die App-Umsätze mit Criteo Direct Bidder." Ah, ha. scannt sich da criteo etwa selbst? Also schnell ohne Überzieher, also Adblocker, auf wetteronline gesurft, und parallel einen TCPdump laufen lassen. Plötzlich kommt eine komische DNS Abfrage vorbei nach "gbc1.nl3.eu.criteo.com". Diese liefert 28 IP Adressen aus der gescannten range zurück. ( gbc2.xxxx bis gbc8.xxx liefern alle eine ähnliche Anzahl IPs zurück) Dann probiert irgendein Script auf der Homepage ein paar davon durch auf 443, bis es sich irgendwo verbindet.
Sprich criteo scannt sich selbst zum load balancing, und ich darf mich dafür rechtfertigen. Und so etwas findet man auch nicht in fünf Minuten raus, die Zeit hätte ich gerne anders genutzt.
Nachdem ich Hetzner mitgeteilt habe, dass eine Werbeschleuder sich selbst scannt, und versichert habe, dass ich den kompletten Criteo Adressblock per UFW ausgehend geblockt habe wurde mein Server wieder entsperrt.
Also, falls jemand UFW am laufen hat und keinen Bock auf criteo hat:
ufw deny out from any to 185.235.0.0/16

Kunnen we nou allemaal eens kappen met die term 'domrechts'?

Dat soort validisme is totaal onnodig, en moedigt mensen alleen maar aan om de dreiging van fascisme te onderschatten.

Show older
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.