• 0 Posts
  • 15 Comments
Joined 11 months ago
cake
Cake day: August 14th, 2023

help-circle
  • Yeah, timestamps should always be stored in UTC, but actual planning of anything needs to be conscious of local time zones, including daylight savings. Coming up with a description of when a place is open in local time might be simple when described in local time but clunkier in UTC when accounting for daylight savings, local holidays, etc.






  • I’d say the real world doesn’t reward being actually gifted.

    More accurately, the real world punishes being below average at any one of like a dozen skillets. You can’t min/max your stats because being 99th percentile at something won’t make up for being 30th percentile at something else. Better to be 75th percentile at both.

    The real world requires cross-disciplinary coordination, which means thriving requires both soft skills and multiple hard skills.



  • not meant to be consistent with the human eye.

    Even then, postprocessing is inevitable.

    As the white/gold versus blue/black dress debate showed, our perception of color is heavily influenced by context, and is more than just a simple algorithm of which rods and cone cells were activated while viewing an image.


  • Yeah, plenty of Gen Z memes still make me laugh. They’re just in different forms, including some video “templates” where you just slap some captions on characters in the same scene:

    • Starship troopers “I’m doing my part” montage interrupted with Tim Robinson “I didn’t do shit!”
    • Diary of a Wimpy Kid scene with kids auditioning from by singing Total Eclipse of the Heart, giving way to some kid who’s actually good.

    Are they really that different from some high quality gifs or deep fried memes from the late 2010’s, advice animals from the early 2010’s, demotivational posters or absurd flash animations from the 2000’s, or joke websites from the 90’s?

    People will always be funny, and some internet jokes will start fresh before being run into the ground. Remember the ones you like, and then forget the ones you don’t.



  • The typical default configuration has the ISP providing DNS services (and even if you use an external DNS provider, the default configuration there is that the DNS traffic itself isn’t encrypted from the ISP’s ability to analyze).

    So even if you visit a site that is hosted on some big service, where the IP address might not reveal what you’re looking at (like visiting a site hosted or cached by Cloudflare or AWS), the DNS lookup might at least reveal the domain you’re visiting.

    Still, the domain itself doesn’t reveal the URL that follows the domain.

    So if you do a Google search for “weird sexual fetishes,” that might cause you to visit the URL:

    https://www.google.com/search?q=weird+sexual+fetishes
    

    Your ISP can see that you visited the www.google.com domain, but can’t see what search you actually performed.

    There are different tricks and tips for keeping certain things private from certain observers, so splitting up the actual ISP from the DNS resolver from the website itself might be helpful and scattering pieces of information, but some of those pieces of information will inevitably have to be shared with someone.


  • Almonds are a stone fruit, too. It’s just that the part we eat is inside the pit. Ever notice how almonds still in the shell kinda look like a peach pit?

    Peaches and plums used to be cherry sized, too (and cherries are stone fruits as well, but selective breeding got the fruit-to-pit ratio better for peaches/plums/apricots/nectarines).

    So some recipes call for processing cherry pits, and the flavor is pretty close to almond extract. Because almond extract is just bitter almonds processed in a similar way.




  • Things might be different by now, but when I was researching this I decided on the Yale x Nest.

    It’s more secure than a keyed lock in the following ways:

    • Can’t be picked (no physical keyhole).
    • Codes can be revoked or time-gated (for example, you can set the dog walker’s code to work only at the time of day they’re expected to come by).
    • Guest codes can be set to provide real-time notifications when used.
    • The lock keeps a detailed log of every time it’s used.
    • The lock can be set to automatically lock the door after a certain amount of time.

    It’s less secure than a physical traditional lock in the following ways:

    • Compromise of a keycode isn’t as obvious as losing a key, so you might not change a compromised keycode the same way you might change a lost key.
    • People can theoretically see a code being punched in, or intercept compromised communications to use it.
    • Compromised app or login could be used to assign new codes or remotely unlock

    It’s basically the same level of security in the following ways:

    • The deadbolt can still be defeated with the same physical weaknesses that a typical deadbolt has: blunt force, cutting with a saw, etc.
    • The windows and doors are probably just generally weak around your house, to where a determined burglar can get in no matter what lock you use.
    • Works like normal without power or network connection (just can’t be remotely unlocked or reprogrammed to add/revoke codes if not online)

    Overall, I’d say it’s more secure against real-world risk, where the weakest link tends to be the people you share your keys with.