• 0 Posts
  • 22 Comments
Joined 1 year ago
cake
Cake day: July 5th, 2023

help-circle

  • The fingerprinting I’m talking about gets encoded in the screen recording too. Subtle pixel changes here or there over the entire length of the video. It’ll be lossy when it’s transcoded, but over the whole video it’s there enough times it won’t matter. Even scaling to lower quality won’t fix it and then it’ll also be lower quality.

    It’ll be like DRM, there will be people trying to remove it like anything else. They’ll break one thing and another will come along. There would still be a black market, but most people can get an unrestricted copy in exchange for money so there’s one less reason to pirate.

    Unless you’re actually pointing a camera at the screen, then OK, you do you.








  • If you’re an ssshole don’t you come back as an insect or animal? That would mean rich folks would have to do actual good to avoid that. Whatever their policies, after the first few trust fund dung beetles and assorted other multi-lifetime embarrassments, they’d probably snap out of it.

    Hey check out the cockroach yacht club guys! Lol, how did that forced birth + soul tracking debt thing work out for you!?

    Then like half their debtors would achieve nervana and fuck off to heaven or whatever.

    I think the kharma religions, this would take care of itself.








  • My biggest problem is that battery life on my laptop was awful. I tried a few distros and they were all drawing 17-20W from battery doing absolutely nothing. Which means 4-5 hour battery life on an 90Wh battery. In Windows it gets ~10 hours.

    I screwed around with it several nights in a row, but nothing really worked.

    I’ll run Linux on servers, workstations, and containers; but never again on a laptop unless it’s been tuned by someone else.




  • Up to date post. https://old.lemmy.world/post/2923697

    Doesn’t give much on who and why, more on what/how along with dispelling some myths.

    Whoever is doing it is very quickly walking through a list of expensive queries to use in their DDoS attacks. Lemmy.world is playing whack-a-mole instead of proactively rate limiting/mitigating expensive queries. It may be that all their time is spent diagnosing and fixing with none left for proactive fixes.

    The fact that the attacks are evolving and always hitting expensive queries implies that it’s a moderately skilled person/group familiar with the lemmy codebase.

    You can speculate on motives as well as I can.

    The net effect will be a more robust server and hopefully that code/knowledge is disseminated to other instances.