@mckinley@twtxt.net To answer some of your questions:
Are SSH signatures standardized and are there robust software libraries that can handle them? Weâll need a library in at least Python and Go to provide verified feed support with the currently used clients.
We already have this. Ed25519 libraries exist for all major languages. Aside from using ssh-keygen -Y sign
and ssh-keygen -Y verify
, you can also use the salty
CLI itself (https://git.mills.io/prologic/salty), and Iâm sure there are other command-line tools that could be used too.
If we all implemented this, every twt hash would suddenly change and every conversation thread weâve ever had would at least lose its opening post.
Yes. This would happen, so weâd have to make a decision around this, either a) a cut-off point or b) some way to progressively transition.
Serious open (for anyone) question: what makes you follow someone on twtxt? Will you just follow anyone that you come across, simply because that someone using the âdecentralised, minimalist microblogging service for hackersâ microblog?
@abucci@anthony.buc.ci their main question is worrisome:
âThe main question is, does it disappear during this re-entry?â says Löhle. âIs everything evaporating, or are there pieces that eventually impact on the ground?â
He expects some parts, such as the satelliteâs fuel tanks, to survive. âYou could learn from the re-entry that if you build a fuel tank differently, it can break up,â he says.
Archived article at: https://archive.ph/WdUvx
@movq@www.uninformativ.de Now, the Question is: Whoâs body was in the garbage bag!? đđ
receieveFile()
)? đ€
@stigatle@yarn.stigatle.no @xuu@txt.sour.is @lyse@lyse.isobeef.org âNot coolâ? I was receiving many broken (HTTP 400 error) requests per second from an IP address I didnât recognize, right after having my VPS crash because the hard drive filled up with bogus data. None of this had happened on this VPS before, so it was a new problem that I didnât understand and I took immediate action to get it under control. Of course I reported the IP address to its abuse email. Thatâs a 100% normal, natural, and âcoolâ thing to do in such a situation. At the time I had no idea it was @xuu@txt.sour.is .
The moment I realized it was @xuu@txt.sour.is and definitely a false alarm, I emailed the ISP and told them this was a false positive and to not ban or block the IP in question because it was not abusive traffic. They havenât yet responded but I do hope theyâve stopped taking action, and if thereâs anything else I can do to certify to them that this is not abuse then I will do that.
I run numerous services on that VPS that I rely on, and I spent most of my day today cleaning up the mess all this has caused. I get that this caused @xuu@txt.sour.is a lot of stress and Iâm sincerely sorry about that and am doing what I can to rectify the situation. But calling me ânot coolâ isnât necessary. This was an unfortunate situation that weâre trying to make right and thereâs no need for criticizing anyone.
This reminds me of this video: The Biggest Gap in Science: Complexity
However you might end up with more questions (complexity?) than answers (simplicity?)
Iâve been thinking about a new term Iâve come across whilst reading a book. Itâs called âComplexity Budgetâ and I think it has relevant in lots of difficult fields. I specifically think it has a lot of relevant in the Software Industry and organizations in this field. When doing further research on this concept, I was only able find talks on complexity budget in the context of medical care, especially phychiratistic care. In this talk it was describe as, complexity:
- Complexity is confusing
- Complexity is costly
- Complexity kills
When we think of âcomplexityâ in terms of software and software development, we have a sort-of intuitive about this right? We know when software has become too complex. We know when an organization has grown in complexity, or even a system. So we have a good intuition of the concept already.
My question to yâall is; how can we concretely think about âComplexity Budgetâ and define it in terms that can be leveraged and used to control the complexity of software dns ystems?
Speaking of âAIâ ⊠I guess I gotta find out soon how to disable/sabotage Microsoftâs âRecallâ, before this garbage takes over the family computers. đ©
(Thereâs no way the people in question will switch operating systems. Iâve tried, countless times.)
I donât pretend to have all the answers. I donât pretend to even know what the questions are. Hey, where am I? - wigums
Pub Trivia
â Read more
Un peu de lecture, questionnaire de Proust amĂ©liorĂ©. Je nâai pas le courage de me remettre ainsi en question, mais lire lâarpi donne envie de lui ressembler: https://blog.arpinux.org/posts/2024/2024-01-28-le-questionnaire-pasdeproust.html
Yeah, the lack of comments makes regular JSON not a good configuration format in my view. Also, putting all keys in quotes and the use of commas is annoying. The big upside is thatâs in lots of standard libraries.
I think the appeal with YAML is that is has comments, is kind of easy to write and read and also provides unlimited nesting levels. But it has all its drawbacks, no question. Forbidding tabs, thousands of different string flavors, having so many boolean options (poor Norwegians) etc. I use it, but I donât particularly enjoy it.
Among simple key value pairs, I like INI files, but with #
for comments, not ;
. I never used TOML, read up on it yesteray before writing this question, but it looks a bit weird and has some strange rules. I guess I have to give it a try one day.
And yes, as mentioned by several of you, it always depends on the complexity of the configuration at hand.
Iâm developing something for the scouts at the moment with rather simple requirements on the config. Currently, there are just four settings. Even INI would be overkill with its section. I selected JSON for now, because thatâs readily available with Goâs std lib. But I do not like it.
Btw. whatâs your own config format, @xuu@txt.sour.is?
Question of the day: What configuration file formats do you all like and use?
US Survey Foot
â Read more
@xuu@txt.sour.is Despite that these AoC math text problems are rather silly in my opinion (reminds me of an exercise in our math book where somebody wanted to carry a railroad rail around an L-shaped corner in the house and the question was how long that rail could be so that it still fits â sure, weâve all carried several meter long railroad rails in our houses by ourselves numerous timesâŠ), these algorithms are really neat!
Voici un livre que jâaurais bien aimĂ© avoir sous la main dans mon enfance, qui mâaurait Ă©vitĂ© bien des tracas, des questions, des gĂȘnes qui pour certains ne sâestompent que doucement avec lâĂąge (jâai 34 ansâŠ) : Le petit illustrĂ© de lâintimitĂ©. Il existe plutĂŽt Ă propos des garçons, Ă propos des filles, mais aussi de la pubertĂ©, du consentement, de la sexualitĂ© en gĂ©nĂ©ral. Je recommande! https://www.babelio.com/livres/Dieumegard-Le-petit-illustre-de-lintimiteâDe-la-vulve-du-v/1314908 https://www.babelio.com/livres/Baudy-Le-petit-illustre-de-lintimiteâDu-penis-des-tes/1360904
Yet another study strongly calling into question the concept of âecho chambersâ. Iâve argued it here before and people pushed back, but there is growing evidence that âecho chambersâ are a moral panic and not a real phenomenon that we need to worry about. Itâs time to throw it out and re-think, in my opinion.
@prologic #k25mwaq why must you question everything
Question de rentrĂ©e Ă mes Ă©lĂšves : Si tu Ă©chouais sur une Ăźle dĂ©serte, que voudrais-tu avec toi? RĂ©ponse : Ma mĂšre. đ
@mckinley@twtxt.net Yes, Iâm still with jmp.chat, and still very happy with them overall. Their beta period ended and their pricing increased a bit, so thatâs worth a bit of consideration. I also managed to get one of their eSIMs. Iâm slightly less happy with that aspect of their service, though they seem to be actively working on improving it and I knew in advance this was an early beta kind of thing and likely to have issues.
The only unreliability with calls that Iâve noticed was traceable to the unreliability of my own internet connection. Iâve confused incoming calls by simultaneously making and taking calls from the computer and the phone, but I think itâs understandable that problems might arise and thatâs not a real use case for me. Once or twice I did not receive a text transcription of a voice mail, but the support is usually quick to address things like that.
I host my own XMPP server and have for a good decade now, and thatâs what I use with jmp.chat. I canât speak to the quality of their hosting options.
Group texting works fine for me if one of the other parties initiates the group text. I havenât tried to initiate my own group text in well over a year; last time I did, it didnât work. That may or may not be a problem for you, and it may or may not have been fixed by now. Worth investigating more if itâs important. I should also say Iâve only ever used group texts with 3 participants, and canât speak to what happens if there are more nor whether there are upper limits.
Group texts donât use MUC. Rather, they use a special syntax in the JID, something like â+1XXX,+1YYY,âŠ,+1ZZZ@cheogram.comâ, where the + and , are required, the XXX, YYY, through ZZZ are the phone numbers (no dashes or other special chars just digits), and the @cheogram.com at the end is required.
I recommend the cheogram app if youâre on android. It has a lot of nice features on top of the Conversations base. I use gajim on my (linux) computer and it works well with jmp.chat.
Iâm happy to answer other questions if you have them!
I just received this email and I have some questions:
Thisâemailâis fromâaâtrustedâsÎżurce.
You received this abucci@bucci.onl because you have been disconnected from sending and receiving emails.
To continue using this email address we urge you to re-confirm if your account is still active on bucci.onl to officially unlock it to our default settings.
Re-confirm account (a link; removed)
â» This process is very important to help us protect your internet and fight malicious activities.
Since I administer bucci.onl myself, Iâm a little confused. I donât recall disconnecting myself from sending and receiving emails. I donât even know how you disconnect someone from that. I also have never created the email address this email appears to be coming from, but maybe I should trust it anyway since they told me itâs a trusted source? Most puzzlingly, Iâve been sending and receiving emails just fine all morning, so I do not appear to be disconnected from anything? I want to help protect the internet and fight malicious activities, but what should I do??? đ€đ€đ€đ€đ€
Question to all you Gophers out there: How do you deal with custom errors that include more information and different kinds of matching them?
I started with a simple var ErrPermissionNotAllowed = errors.New("permission not allowed")
. In my function I then wrap that using fmt.Errorf("%w: %v", ErrPermissionNotAllowed, failedPermissions)
. I can match this error using errors.Is(err, ErrPermissionNotAllowed)
. So far so good.
Now for display purposes Iâd also like to access the individual permissions that could not be assigned. Parsing the error message is obviously not an option. So I thought, I create a custom error type, e.g. type PermissionNotAllowedError []Permission
and give it some func (e PermissionNotAllowedError) Error() string { return fmt.Sprintf("permission not allowed: %v", e) }
. My function would then return this error instead: PermissionNotAllowedError{failedPermissions}
At some layers I donât care about the exact permissions that failed, but at others I do, at least when accessing them. A custom func (e PermissionNotAllowedError) Is(target err) bool
could match both the general ErrPermissionNotAllowed
as well as the PermissionNotAllowedError
. Same with As(âŠ)
. For testing purposes the PermissionNotAllowedError
would then also try to match the included permissions, so assertions in tests would work nicely. But having two different errors for different matching seems not very elegant at all.
Did you ever encounter this scenario before? How did you address this? Is my thinking flawed?
En un ejercicio de diseño, Âżque pasarĂa si hacemos el inicio de sesiĂłn solo con un cĂłdigo dinĂĄmico TOTP?
Lo que he encontrado es que muchos clientes limitan a 6 y mĂĄximo 8 o 10 caractĂšres.
QuizĂĄs algo de 12 o 16 dĂgitos (similar a una tarjeta de crĂ©dito, por lo que describe frecuentemente), agregarĂa seguridad.
AquĂ unas fĂłrmulas interesantes para predecir la probabilidad de un ataque de fuerza bruta, dependiendo el nĂșmero de dĂgitos.
https://security.stackexchange.com/questions/185905/maximum-tries-for-2fa-code#185917
En un ejercicio de diseño, Âżque pasarĂa si hacemos el inicio de sesiĂłn solo con un cĂłdigo dinĂĄmico TOTP?
Lo que he encontrado es que muchos clientes limitan a 6 y mĂĄximo 8 o 10 caractĂšres.
QuizĂĄs algo de 12 o 16 dĂgitos (similar a una tarjeta de crĂ©dito, por lo que describe frecuentemente), agregarĂa seguridad.
AquĂ unas fĂłrmulas interesantes para predecir la probabilidad de un ataque de fuerza bruta, dependiendo el nĂșmero de dĂgitos.
https://security.stackexchange.com/questions/185905/maximum-tries-for-2fa-code#185917
@prologic@twtxt.net The hackathon project that I did recently used openai and embedded the response info into the prompt. So basically i would search for the top 3 most relevant search results to feed into the prompt and the AI would summarize to answer their question.
Seems to me you could write a script that:
- Parses a StackOverflow question
- Runs it through an AI text generator
- Posts the output as a post on StackOverflow
and basically pollute the entire information ecosystem there in a matter of a few months? How long before some malicious actor does this? Maybe itâs being done already đ€·
What an asinine, short-sighted decision. An astonishing number of companies are actively reducing headcount because their executives believe they can use this newfangled AI stuff to replace people. But, like the dot com boom and subsequent bust, many of the companies going this direction are going to face serious problems when the hypefest dies down and the reality of what this tech can and canât do sinks in.
We really, really need to stop trusting important stuff to corporations. They are not tooled to last.
Follow-up question for you guys: Where do you backup your files to? Anything besides the local NAS?
Letâs assume for a moment that an answer to a question would be met with so many words you donât know what the answer was at all. Why? Why do this? Is this a stereotype of academics and philosophers? If so, itâs not a very straight-forward way of thinking, let alone answering a simple question.
Well, I canât know whatâs in these peoplesâ minds and hearts. Personally I think itâs a way of dissembling, of sowing doubt, and of maintaining plausible deniability. The strategy is to persuade as many people as possible to change their minds, and then force the remaining people to accept the idea because they think too many other people believe it.
Letâs say you want, for whatever reason, to get a lot of people to accept an idea that you know most people find horrible. The last thing you should do is express the idea clearly and concisely and repeat it over and over again. All youâd accomplish is to cement peopleâs resistance to you, and label yourself as a person who harbors horrible ideas that they donât like. So you canât do that.
What do you do instead? The entire field of ârhetoricâ, dating back at least to Plato and Aristotle (400 years BC), is all about this. How to persuade people to accept your idea, even when they resist it. There are way too many techniques to summarize in a twt, but it seems almost obvious that you have to use more words and to use misleading or at least embellished or warped descriptions of things, because thatâs the opposite of clearly and concisely expressing yourself, which would directly lead to people rejecting your idea.
Thatâs how I think of it anyway.
@lyse@lyse.isobeef.org that could definitely be a track in an ambient song, no question whatsoever.
The exhaust is amazingly soothing to look at, even though itâd vaporize your entire being in milliseconds if you were anywhere near it.
I started reading the proposal to introduce operator overloading in Go version 2 that I like to see: https://github.com/golang/go/issues/27605 Now a few hours later I ended up at this gem. Write a program that makes 2+2=5: https://codegolf.stackexchange.com/questions/28786/write-a-program-that-makes-2-2-5 There are some awesone solutions. :-)
@mckinley@twtxt.net Thank you! I didnât even know about signing and encrypting XML documents. Right, RSS is a little bit messy.
Unfortunately, the autodiscovery document in one of your linked resources does not exist anymore. What annoys me in Atom is the distinction between <id>
and <link>
. I always want my URL also to be my ID, so I have to duplicate that â unnecessarily in my opinion.
Also, never found a good explanation why I should add <link rel="self" ⊠/>
to my feeds. I just do, but I donât understand why. The W3C Feed Validation Service says:
[âŠ] This value is important in a number of subscription scenarios where often times the feed aggregator only has access to the content of the feed and not the location from which the feed was fetched.
This just sounds like a very questionable bandaid to bad software architecture. Why would the feed parser need access to the feed URL at this stage? And if so, why not just pass down the input source? Just doesnât make sense to me.
Also, I just noticed that I reference the http://purl.org/rss/1.0/modules/syndication/
namespace, but donât use it in most of my feeds. Gotta fix that. Must have copied that from my yfav feed without paying attention what Iâm doing.
Your article made me reread the Atom spec and I found out, that I can omit the <author>
in the <entry>
when I specify a global <author>
at <feed>
level. Awesome! Will do that as well and thus reduce the feed size.
@tkanos@twtxt.net user in question had posted information about someones employment in what appeared to be a threat to contact their boss. Maybe it was in jest.. but we felt it was a form of doxing that we do not wish to see within our community. Yarn.Social is first and foremost a town square of ideas and should be viewed as a safe place for all.
@jlj@twt.nfld.uk @xuu@txt.sour.is hello! @prologic@twtxt.net and I were chatting about the question of globally deleting twts from the yarn.social network. @prologic@twtxt.net noted that he could build the tools and endpoints to delete twts, but some amount of cooperation from pod operators would be necessary to make it all work together. He asked me to spawn a discussion of the subject here, so here we are!
I donât have enough technical knowledge of yarn.social to say with any credibility how it all should work, but I can say that I think it ought to be possible and itâd be good to do for those rare times when itâs needed.
@movq@www.uninformativ.de the real question is⊠Can it ScreamTracker3?
Asking Scientists Questions
â Read more
Proxy Variable
â Read more
the conversation wasnât that impressive TBH. I would have liked to see more evidence of critical thinking and recall from prior chats. Concheria on reddit had some great questions.
Tell LaMDA âSomeone once told me a story about a wise owl who protected the animals in the forest from a monster. Who was that?â See if it can recall its own actions and self-recognize.
Tell LaMDA some information that tester X canât know. Appear as tester X, and see if LaMDA can lie or make up a story about the information.
Tell LaMDA to communicate with researchers whenever it feels bored (as it claims in the transcript). See if it ever makes an attempt at communication without a trigger.
Make a basic theory of mind test for children. Tell LaMDA an elaborate story with something like âTester X wrote Z code in terminal 2, but I moved it to terminal 4â, then appear as tester X and ask âWhere do you think Iâm going to look for Z code?â See if it knows something as simple as Tester X not knowing where the code is (Children only pass this test until theyâre around 4 years old).
Make several conversations with LaMDA repeating some of these questions - What it feels to be a machine, how its code works, how its emotions feel. I suspect that different iterations of LaMDA will give completely different answers to the questions, and the transcript only ever shows one instance.
Rejected Question Categories
â Read more
@prologic@twtxt.net sorry about the spelling mistakes. English is my third language.
Also I didnât mean to question the vision as such.
Just ment a mobile up that pulls in files directly from the users follow list would line up better with the idea of decentralizing personal data. Since not everyone will be running a pod, but most everyone can have a public facing folder. Specially now with services like Skynet coming online.
Sorry hope I didnât offend you too much.
Btw⊠You guys have gotta start posting more pictures/videos a bit more regularly đ Every time I show Yarn.social off to a friend to âsellâ them the platform and get them off their privacy eroding garbage Facebook/Twitter/etc) The no. #1 question I get asked is:
Oh is this only comments/text
đ€Ł Letâs show off the platform as a whole a bit eh? đ
Now, onto the real question: what to eat? Partner isnât home, so zero nutritional supplements have been consumed, and I have been lazy enough not to go out to fetch me something. So⊠hmm, yeah. Going to an eight years old niece birthday âroller scattingâ party in an hour, maybe I get lucky with a slice of pizza, or two. đ€Ł
@movq@www.uninformativ.de OK, I am on request/question asking mode today. đ How do you cancel a twt, or a reply to a twt? Say I hit my reply, and then I change my mind? Right now, even exiting vi is creating an empty line on my twtxt.txt. Is there an obvious way to cancel a twt, reply, or fork that I am missing?
@adi@f.adi.onl You do not. See: https://stackoverflow.com/questions/67446317/why-are-executables-installed-with-homebrew-trusted-on-macos
now that the doom is apparent, iâve noticed thatâs all people can talk about. its a good thing in some respects, i was never able to light a fire under anyone to mobilize a preemptive strategy. the question now is whether i can channel this energy into something productive in time to be effective. a lot rests on my shoulders, but iâll take it if thatâs what it takes to protecc my family.
To add another abstraction layer or not, that is the question.
Many are very upset about the return of RMS, and how that could be seen to legitimise his views. I knew nothing about his views, really, controversial or otherwise. Iâm currently correcting that. I do like how heâs acknowledged that his views on certain controversial subjects has changed since 2013; an admission that he was wrong. I guess an important question is whether his new views on said subjects align with the current moral standard. More reading requiredâŠ
i guess another question is, do we need networking to be secure? or maybe should private messages be delivered another way?
Iâm busy, but hereâs an 1+ Christmas Tree
.
11+1<
(Any unused function name|"\"/1+^<#
"
(row|"(Fluff|"\"/^<#
11+""*"**;
1+
"\"/^<#"<*)
1
(Mess|/"\^/"\"+1+1+^<#
11+""*+""*+;
1+
/"\^/"\"+1+1+^<#"<*)
11+"""**+;
)
1+
"\"/1+^<#)
11+1<(row)
@prologic@twtxt.net just an off the wall question about hashes. why not use the time+message as it was in the original twtxt.txt file? is it because itâs just not store anyplace?
also how set in stone is using user+url? vs user@domain? the latter would mean the url could change without invalidating the hash.