Eskating cyclist, gamer and enjoyer of anime. Probably an artist. Also I code sometimes, pretty much just to mod titanfall 2 tho.

Introverted, yet I enjoy discussion to a fault.

  • 18 Posts
  • 642 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle

  • And they let you buy the music outright, too!

    Recently quit youtube premium due to the price hike finally hitting my country. I’ve been using yt music for my listening.

    Since that went away along with yt premium, I dusted off my old music file collection (mix of itunes and bandcamp purchases, cd rips, and soundcloud downloads).

    Discovered Qobus looking for places to buy my favorite music to update my collection.

    I used to keep my entire collection on my phone, but I opted to start using ytm since I had it and my collection got too big…

    But now, I have to say I am blown away with how nice Symfonium+Jellyfin (or another music server) is to use!

    Last time I looked into it, nothing handled dynamically keeping a portion of your music on-device for offline play this well!




  • Thats because once discussion on something concludes, you generally make it law.

    “Murder is bad” is very much agreed on to be a good thing. To me it is only logical for the next step to be “verbally encouraging or excusing murder is bad”, which might not need to be law, but it should at least not be state backed.

    There is a difference between being allowed to say whatever you think, and having the state guarantee that whatever you have to say is actually heard.

    Not being heard or listened to, is not a violation of free speech. Being removed or “silenced” online or even physically in public, is not a violation of your free speech.

    Free speech is to be free to say whatever you like, but it does not protect you from what other citizens do in response.

    If you insult someone, and they punch you in the face in response, your free speech was not violated.

    “Hate speech” is a category of “opinion” that is obviously harmful that anyone thinking straight should immediately dismiss it. The problems have started because thanks to the internet, those “opinions” can now reach all the people who aren’t thinking straight.

    For those who do identify hate speech easily, to protect those who don’t, by at least not propagating it (social media, government) is the bare minimum of what they can do.

    Taking away the megaphone if someone is using it to encourage murder is not a violation of free speech. And it’s necessary.

    With a megaphone, you don’t need to be right. You just need to be heard by enough people that the tiny percentage that will believe whatever you say, is a large enough group to be dangerous.




  • Obviusly.

    But you can’t ask an addict to start resisting their addiction, if the have nothing else.

    They need something to resist it for. If they don’t have that, their next high IS the most important thing to them.

    And this whole thing where we keep saying “the addiction will win every time” promotes a defeatist attidue towards helping these people that has lead to policies that are literally killing them.

    The addiction doesn’t win every time. If that were true there wouldn’t be any saving any addict ever.

    Addicts can and will turn anything and everything of value given to them into money, that can then buy them another high, but that CANNOT be used as an excuse to refuse to help them.

    Institutionlize, maybe, but that’s a healthcare problem, not a homeless problem. And that kind of help should be available to a person before they are ever put out of a home.



  • It does. Kinda.

    The police are seldom allowed to be in possession of CSAM, except for in terms of grabbing the hardware which contains it in an arrest. The database used in modern detection tools is maintained by NCMEC which has special permission to do so.

    And of course there are risks, but it’s just digital data. Unless you are creating more, you’re not actively harming anyone. And law enforcement absolutely needs that data to take some of the most obvious steps to prevent it being spread further.

    Obviously, someone has access, but to get to the actual media files wouldn’t be simple. What typically happens, is that anyone wanting to detect CSAM, is given a hashed version of the database. They can then scan their systems for CSAM by hashing any media they are hosting, and seeing whether there are any matches.

    Whenever possible, people aren’t handling the actual media. But for any detection to be possible to begin with, the database of the actual media does need to be maintained somewhere.

    AI is a touchier subject, as you can’t train a model to recognize CSAM not already in the database using hashes, so in those cases you have to work with actual real media. This is only recently becoming a thing.

    It also leaves open the possibility for false positives. An oft cited example is parents taking pictures of their own children for innocent reasons, or doctors and parents handling images for valid medical reasons. In a system that flagged such content, it would mean someone else would be seeing that “private” content because it was flagged.


  • There are laws around it. Law enforcement doesn’t just delete any digital CSAM they seize.

    Known CSAM is archived and analyzed rather than destroyed, and used to recognize additional instances of the same files in the wild. Wherever file scanning is possible.

    Institutions and corporation can request licenses to access the database, or just the metadata that allows software to tell if a given file might be a copy of known CSAM.

    This is the first time an attempt is being made at using the database to create software able to recognize CSAM that isn’t already known.

    I’m personally quite sceptical of the merit. It may well be useful for scanning the public internet, but I’m guessing the plan is to push for it to be somehow implemented for private communication, no matter how badly that compromises the integrity of encryption.



  • MentalEdge@sopuli.xyztoTechnology@lemmy.worldBluesky hits 20 million users
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    18 days ago

    You do realize Bluesky also tacks on .bsky.social? (Though with a dot instead of a second @)

    And even without other instances, ATProto already allows people to sign up using domains they own.

    The closest you can get to using Lost_My_Mind as you Bluesky handle is by aquiring a domain like lost_my_mind.com. And that still wouldn’t prevent someone else from signing up using lost_my_mind.net.

    And that’s before pointing out that Impersonation and mistaken identities isn’t a solved problem on twitter, either.

    Bluesky is succeeding because its a smooth and familiar experience that obfuscates away the complexity of how it works.

    Absolutely nothing about how the ActivityPub network works conceptually prevents it from being an equally smooth experience, given the work were put in.

    Your first six paragraphs hit the mark, but the following rant about the “username univerasility problem” ain’t it.


  • No.

    But they don’t need to be. They’re essentially just indexers.

    If two relays index all the same content, then any services using either will be “interconnected” in the sense that any users can see each other and interact with each other.

    Each relay host can choose what parts of the network they want to index, and as far as I can tell, any services could use multiple relays if they like.


  • I know.

    ATproto has some interesting advantages, and eventually the idea is for anyone to be able to host any microservice component of the network, including relays other than the one run by Bluesky.

    The relays don’t need to be centralized. They are indexers that provide functionality to others parts of the ATproto network.

    The problem is that there isn’t really any incentive to do so… Any additional instances or new apps running ATproto can just rely on the one big indexer provided by Bluesky, instead of running each microservice component themselves.