Show newer

re: extreme transphobia 

@xgranade@wandering.shop That will likely break state resolution in rooms that that server participates in in unpredictable ways, and/or cause a lot of backfill jank.

One possible solution is to configure your reverse proxy to reject requests to the server-to-server /invite endpoint, if they originate from the offending server's IP - that will prevent that server from issuing any invites to users on your server at all (various homeservers block invites wholesale already and it hasn't broken anything besides, well, invites)

@xgranade@wandering.shop (This doesn't fix the invite spam issue which *should* be blockable on a per-server level, but isn't... at least in Synapse, afaik)

@xgranade@wandering.shop You can't really defederate *servers* (from other servers) in general without breaking things (the protocol works very differently from AP), instead you're supposed to do this on a room level via the ACL

Was playing X4 Foundations, set ship to autopilot, it steers and faceplants directly into an asteroid... and immediately plays a voice line of the ship computer saying "Autopilot epically failed."

I have so many questions

Dear software devs: either your installer installs the entire thing, or the installer should be a tiny download.

That’s a STRICT or.

No 2.7 GB installers that then proceed to download the remaining 4.3 GB of required data.

So I 3D printed a design that I thought would make for a fun pin to put on a backpack or laptop case....but so far no one I've shown it to has recognized this logo instantly...feeling old today.
#3DPrinting #DOS #RetroComputing

@smallcircles Yeah, in retrospect, "what if we based our economy and our information infrastructure on extractively manipulating everybody all the time" was maybe not a great foundation for society.

concept: Race the Supercomputer.

pick out a selection of notable supercomputers throughout history. rather than use benchmarks like instructions per second or Dhrystones or Whetstones:
- identify the tasks for which each computer was used;
- make programs for modern computers optimized to do the same tasks; and
- compare performance at those tasks.

so, for example: how much faster can your cell phone search for Mersenne primes than the Manchester Mk. 1? how much faster can your laptop calculate Japanese climatological and meteorological data than the Cray 1? how much faster can your graphics card render a planetarium-like video than the LINKS-1 system from Osaka University?

it would be a ton of work for very little benefit - especially given how many of these systems were used for proprietary or classified applications that we have little info about - but I think it would be really fun.

unsolicited suggestion 

@neil Not *directly* a solution to what you're encountering (as they don't sell individual books) but I've been quite enjoying getting books from StoryBundle lately, as they're always DRM-free epubs and there's a lot of lesser-known but interesting books in there. Maybe something you might find interesting too?

"De staat ziet alleen de publiek-private samenwerkingen. Maar er is ook het civiele domein: verenigingen, stichtingen, collectieven. We pleiten voor meer publiek-civiel-private samenwerkingen vanuit de overheid.” - @marleenstikker #StaatVanHetInternet2025 #MarleenStikker

“Als je kritisch over technologie bent, al is het bij je familie, op werk, in de board room, dan voel je dat je buiten een soort geaccepteerd narratief valt. Je moet het toepassen, je mag niet achterblijven.” - @marleenstikker

#StaatVanHetInternet2025 #MarleenStikker

“Ik wil het niet meer hebben over alternatieven, ik ga het voortaan hebben over next generation internet. Als je kijkt naar de NextCloud website, alles ziet er heel mooi uit, ze hebben suites, ze hebben van alles. De alternatieven worden steviger. Het NGI wordt gebouwd, is gebouwd.” - @marleenstikker #StaatVanHetInternet2025 #MarleenStikker

TIL about the formaction attribute in HTML. How did I never know about this before?!

@aral To clarify (after giving the ruling a quick read): it's specifically the IAB's mechanism of a 'consent string' that's ruled illegal, because it itself is identifiable/fingerprintable, rather than the consent popups themselves being ruled illegal.

At least that's how I understand the ruling, as a native Dutch speaker.

I was always taught in school that books must have protagonists and antagonists, and it occurs to me that this is a very hierarchical belief that just isn't true.

Like the Bunker series by Jordan Rivet for example, which involves plenty of conflict - but which frequently switches perspectives between the *parties* to that conflict. None of the parties is actually an antagonist!

@joepie91 It's a pretty colonialist belief in a way, like believing the hero's journey is the main story archetype. Story telling in non European contexts can be quite a lot different—and not apply this framework of story telling about singular individuals going on heroic journeys.

I miss wired headphones where you plug a thing in and it immediately works 100% of the time without having to click on anything or charge anything or wait for anything or sync anything or make sure you don't connect to too many things or walk too far away by accident or

Show older
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.