Show newer

Controversial opinion perhaps, but in my mind the purpose of a specification is to guide an implementer to a solution in such a way that when two people do this independently an interoperable solution emerges. In other words, we wanna make computers reliable exchange information.

Doing so requires two humans to understand the spec, and understand it the same way. So, when I'm reading a spec and I encounter this sentence, what exactly am I supposed to make of that:

Otherwise, if value has an @language entry whose value exactly matches language, using a case-insensitive comparison if it is not null, or is not present, if language is null, and the value has an @direction entry whose value exactly matches direction, if it is not null, or is not present, if direction is null:

Why do I need a PhD in English sentence structure to understand your spec?

Het STORMT in Rotterdam! Rebellen blokkeren vandaag de poort van de gascentrale van Uniper. Uniper is een groot en vervuilend energiebedrijf. Ze staan in de top 10 van bedrijven die de meeste fossiele subsidies ontvangen. Subsidie naar grote vervuilers, dat moet echt stoppen! #Operatiestorm (1/4)

the year is 2055. xorg is now maintained by the rust4linux project. wayland has added a 78th method for sending text to applications. google chrome is a kernel module. you can make opengl calls via ioctl. your MacBook 7080 has more legal rights than you do. 3 billion devices run java.

@joepie91 My conspiracy theory is that they've kept suing IA as a back pocket move for bad days. When business is bad and shareholders are screaming that they've getting a bad ROI, labels and such can just say it was IA's fault and we are suing them to rectify the situation.

I have no evidence, I don't get invited to shareholder meetings, but I am convinced.

@joepie91 If I were to hazard a few (perhaps not particularly well informed) guesses … any or all of
1) the land grab for making proprietary spotify/netflix-a-likes for everything
2) fear of AI companies scraping their content from the Internet Archive for training
3) the publisher lawsuit prompted everyone else to start kicking them while they’re down?

but I’ve not been following the IA’s legal trouble recently due to having so much else to think about

So here's a question... why do record labels, publishers, etc. suddenly have such a big interest in suing the Internet Archive in the past few years, despite the Archive having been around for many years doing basically the same things, and there being 0 chance that the IP companies didn't know about it?

Grappig weetje over #Amersfoort. Als je met de trein vanaf het centraal station wegrijdt naar het noorden, is er bij de Eem een gebouw waar elke maand een andere nadenkspreuk op het dak staat. Sinds er ooit “Welkom in Alkmaar” heeft gestaan ben ik elke keer weer nieuwsgierig wat er staat.

nlpol 

"De Verenigde Staten van Amerika zijn in handen gekomen van Trump, dus nu is het nodig om de Verenigde Staten van Europa te beginnen, want dat model werkt duidelijk zo goed. Oh ja en iets met polarisatie."

Volt snapt er weer he-le-maal niets van. Zou mooi zijn als ze het militaristisch ingestelde deel van de partij er eens uit zouden keilen.

I've seen so many cool themes come by through @macthemes - I honestly wish I could use some of those on a Linux system today.

(If you're going to do this, think about how much you would charge to be willing to do this kind of work, and double it. Then double it again.)

Show thread

I guess now is the time, as a freelancer, to start building up a reputation as "the guy who comes in to clean up the mess that the LLMs and LLM-bros left behind... for a fee"

unsolicited advice for folks running macbook laptops from the early/mid 2010s 

also now that my fan isn't on literally ALL the time, and with a new 3rd party battery, I can easily get 4–5hrs of light usage on a single battery charge, which feels close to what I got when it was brand new (despite apple's advertised figure of 10 hours on a single charge)

Show thread

unsolicited advice for folks running macbook laptops from the early/mid 2010s 

thermal paste apparently breaks down after a few years, so yours might not actually be conducting heat that well anymore. between the fan and the paste, my processor now keeps cool enough that it doesn't throttle frequency at 100% load, which makes a ton of difference for (e.g.) sharing your screen while on a video call. it's a tricky procedure but not impossible and ifixit has a bunch of guides ifixit.com/Search?doctype=guid

Show thread

unsolicited advice for folks running macbook laptops from the early/mid 2010s 

if you have the skills and inclination: consider replacing your thermal paste! my 2013 macbook air has always been a tolerable daily driver, but after i changed the thermal paste it tipped back over into being a joy to use. plus while you're in there, you can ACTUALLY clean the fan (I thought I'd been cleaning the fan, but when i actually removed it from the heat sink I saw that there was a huge chunk of lint in there)

(If all goes as expected, it should also be a neat way for different fedi instances to share the storage cost of static media among each other, instead of everyone needing to keep full copies, because it's a deduplicated storage system)

Show thread

Anyway the idea here is to have a distributed storage system that can be run on spare mismatched storage space by a group of friends, or a group of sysadmins, or whoever else, and be resistant against compromise and censorship. Both for personal data storage but definitely also for things that are meant for public access.

Which seems to have rapidly gotten a lot more relevant since I started on this project...

Show thread

The problem was that you can't have something addressed by both its content hash *and* a hash of its decryption key (for a decryption process that's several lookup steps removed from the initial one).

Or well, I *thought* you can't, but it turns out that with a small design change, you can in fact do that

Show thread

It turns out no matter how many times you try, you can't clone-tool away a spec of dirt on your screen

The idea is to have a distributed storage system that lets you set up a cooperative storage cluster between multiple semi-trusted parties; with RAID-like striping across participants (so more efficient than duplication) but with all data being encrypted and independently verifiable, so it's resistant to stuff like hacked systems. It's strongly inspired by Tahoe-LAFS (but makes some different design choices for practical reasons).

I got stuck on a seemingly trivial problem; how to make the hashes of different storage objects verifiable while also allowing retrieval of a file when the only thing you have is its decryption key

Show thread
Show older
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.