Show newer

Programmer Art: crude, crappy temporary graphics that you put in a game while you figure out if the mechanics are fun enough to bother finishing it and sorting out a proper artist before release

Programmer Naming: a crude, crappy temporary name that you keep forever and ever amen, twenty years later the top question on your FAQ page is NO, we will NOT change the name, in fact we consider that it is YOU SIR who art being CRINGE,

Show thread

Nobody tells you that telekinesis implies telekisneezis 🤧

Arguing over shipping container specs in science fiction

OH 

"What's this fucking ripoff Nine Inch Nails song??"
...

"Oh it is Nine Inch Nails."

Wargaming is central planning for the TTRPG action economy

I have unfortunately been left alone with Photoshop, so…

GLUTEN TAG.

Has anyone ever collided with a bat?

I'm always worried that one day while I'm taking a walk through the park they'll miscalculate and instead of whizzing past me by like twenty centimeters, they'll whack right into me

re: Cryptocurrency guide for people who justifiably hate it 

@Byte it makes me sad seeing it used to bypass what are basically restrictions on charity. But that's the world we live in...

@deersyrup maybe Cromite, or if adblocking bu default is too much, then ungoogled-chromium.

re: ssh practice 

@4censord @ranja yeah I'd agree with all this while also adding that preconfigured point to point VPNs with wireguard for example come with a secure configuration out of the box for LAN access, and I would expect configuration mistakes in ssh from most sysadmins (bad packaged defaults, changed incorrectly or incompletely). This is both defense in depth, reducing attack surface of open ports, and an attempt to minimize chances of human misconfiguration.

Also the benefit of both initially allowing access to, and then revoking access to all 'internal' (LAN infrastructure) at once by revoking an individual's VPN access.

I don't think I am alone in this, since I've seen more enterprise org products targeting this approach, by integrating an organization's auth system, and VPN infrastructure connecting to a shared bridged LAN for easier, more secure development or shared operations. Just look at enterprise software built on Wireguard for some examples of how far you can take this approach. I prefer things less tightly integrated for personal stuff of course, but there is a serious draw based on scaling secure access to shared infra as well.

trans anatomy knowledge expectations vs reality 

The only thing I understand about Human anatomy are which muscle groups are activated by which exercises.

Cis people asking me about "the surgery" feel like I am obligated to know more... Which... I'm really not. I can spot you in the gym I'm not suddenly a surgeon because I take hormones. I imagine others don't even know that very well. Weird expectation.

Anyways I am going to start quizzing everyone cis over 30 on colonoscopies in great detail now :P

ssh practice 

The latest standard for remote access should NOT be a *public* ssh port. I don't care about what method of authentication is in place, or what obfuscation is available. Honestly ssh ports should be LAN-only and behind strict firewalls. If you want remote access, setup a modern point to point VPN which gives you the modern cryptographic security as a default, then ssh from within the VPN on the relevant LAN.

Oh... new terrifying Linux malware that can silently bypass all system authentication and gain full access of your computer via SSH just dropped, and it's apparently immune to getting wiped by system updates and has been floating around for months

Once again considering using an antivirus on Linux 😭

Cryptocurrency guide for people who justifiably hate it 

For the record if the world really went to enough shit to justify you personally needing to use cryptocurrency to bypass economic warfare against you, don't even consider anything other than Bitcoin and Monero, with Monero being more secure and anonymous, with more fees.

I don't endorse the society which would force people into waiting for blockchain transaction verification that takes a few minutes each time, and paying 'gas' fees, but it might be forced on a few marginalized people. So know going in: don't trust any other "coin" and also use a local crypto wallet not connected to your web browser. Cash out of cryptocurrency exchanges (currency conversion accounts) into your local wallet immediately, every time, and use backups. At the very least, backup the wallet to both your phone and a trusted computer you control yourself.

Of course the best advice is, don't be forced into using cryptocurrency, since financial fraud and recovery services and instant transactions are actually pretty nice features we all benefit from.

Stack overflow developer survey hilights:

- More developers actively distrust the accuracy of AI tools than trust it

- A majority of developers don't use AI agents

- 66% of developers are frustrated with AI solutions that are almost right

- Privacy, pricing and better alternatives are top reasons developers turn their back on a technology

- Positive sentiment to AI tools has decreased in 2025

anime trash, trans thoughts 

Speaking of critical analysis of the media we engage with, and I'm speaking from my own experiences and observations here, I think a lot of predominantly online trans girls idolise and romanticise anime characters like Lain and Tomoko to an unhealthy degree.

Like yes yes, they are cute and silly and just like me fr...but being quite mentally unstable and socially awkward to your detriment is NOT GOOD FOR YOU GIRL 😭😭

YOU ARE 25, FIND BETTER ROLEMODELS

Show older
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.