

A cafe selling ‘cum drops’ in Bangkok, they knew what they where doing.
A cafe selling ‘cum drops’ in Bangkok, they knew what they where doing.
Where does anyone claim it as fine classical art? But then again a banana taped to a wall sold for a few million so not that anyone has standards.
Fun fact, a lot of major musical acts don’t write any of their own works, but they perform the creative works of others. Sometimes the inspired idea is implemented with another’s assistance.
Goes on a comm specifically for pics made with AI to say things made wit AI are trash…
DVD? walks my pet dinosaur out of the room
Really though, Labyrinth is the one that comes to mind.
It doesn’t look like a list to me, but a riddle.
Would putting a Q: and A: in front of them satisfy you or would that send you off on a different tangent of chastising web users on their formatting?
Maybe instead of people needing to apply exacting rules to accommodate an accessibility tech, the tech should get better at interpreting human tendencies of writing. Even today I can write in a non-structured natural language form and a decent chat bot can typically make a reasonable interpretation of it without help.
In some ways the kid’s poem about an old lady who swallowed a fly/spider/bird/etc is a good image of our attempts at controlling invasive species. Eventually, nature will figure it out without our help.
Shh, you’ll spoil the surprise…
That’s pretty well what I started with 20 years or so ago, had them in some little box with some funny Nvidia CPU. That go upped to a pair of 3 TB that have somewhere around 10 years uptime on them if I recall by now, and kind of spiraled from there. Rsync on a schedule is nice for that.
Just part of a lab built over the years. Primary storage is a Dell R730XD filled mostly with 12 TB drives all set up in a ZFS array comprised of mirror vdevs, so redundant by default plus the built in ZFS snapshots for the rare need for a rollback on a dataset.
It only recently got that big because I had a mixed set of drives going back years and finally decided to work on getting them all to the same size and picked 12 as a good cost/volume balance, can find them at used server parts shops for a bit over $100 each.
Major risk is I don’t have a good auto alert for smart monitor issues, so just make sure to occasionally manually copy the vital stuff like photos to an external drive.
How do you stream it if nobody downloads it to seed things? The whole premise of seed ratios isn’t just a bragging score, it’s aiding the communal health.
Besides, I have around 60 TB of space here, that’ll hold several versions of damn near every Linux distro out there for a while, it’d be a shame to waste it.
Despite being comprised of similar letters Lemmy and LLM are not interchangeable…
Right, I just use the term sometimes to say hiding things, even if it’s hidden via encrypting it.
Will have to delve into the papers for simplex later here, but in the end there needs to be some type of known identity to pin a communication to, otherwise you’ve already breached the confidentiality point of the security triad by not authenticating the recipient.
I would say no criminal uses public services to do their business, but then there was the whole Signal thing at the DOD…
It depends on how many layers of obfuscation you are looking to deal with. There always needs to be some publicly shared token to initiate a connection, even if that’s only the public key of a asymmetric key pair to a 3rd party auth system.
There are ways to do it, but part of the difficulty is there are so many ways to do it that coming to an agreed method is like herding cats.
Which means encrypted messaging without a backdoor would be illegal if this passes! That’s a slippery slope!
Metadata is not content, so no E2E would not be illegal. Metadata is things like who sent messages to who at what time, duration, volume of data, other externally parsable metrics like that.
It’s interesting that this is kicking up some controversy. Personally I’ve held similar thoughts since the time of AOL, that once it leaves your system it’s no longer in your control. You can ask people to delete it, and maybe they did, or maybe they deleted the one copy but not the cache version, or maybe just didn’t and lied about it. I’ve actually accidentally found stuff I thought was long lost when I decided to just mess around with some data recovery tools and pulled a bunch of pictures back from a drive I didn’t remember them ever being on.
One of my kids I saw take a picture of a snapchat with another phone. Asked what they where doing and it was explained that if you do a regular screenshot it notified the other person, so this was how they kept a copy secretly. So with that in mind, you never know who has copies of what that was posted.
Neighbor here has one of those for her kids with an adapter to plug in batteries from Ryobi tools. Nice idea if you have a stack of batteries around already that can be swapped on the fly.
The fuck they do. I had to go hunt down some tool grooming and using my kid at that age. A lack of confidence and want of external validation are powerful drivers to do stupid things that can have massive life changing impacts.
Sweet, I’ll get some shell cruncher tongs
You got F’d when you 69’d in school? Sounds wild.