Preferences

Calamityjanitor
Joined 78 karma

  1. Thank you for pointing this connection out. It always felt a bit gross that an advertising company was leading the lobbying campaign given the industry's massive damage to teenagers mental health over the decades.
  2. I blogged about this connection a year ago, glad to see at least one article published way too late. The Murdoch papers had their own 'let them be kids' campaign with identical talking points, and Jonathan Haidt’s book The Anxious Generation also contributed.

    What's weird to me is that this advertising company simply lobbied directly for what they wanted both to politicians and the public. Normally as the article mentions you'd have a cover group that's the face of movement to obscure the true intentions. God Aussie journalists are crap.

  3. The only 'line go up' graph they have left is money invested. I'm even dubious of the questions answered graph. It looks more like a feature added to internal wiki that went up in usage. Instead it's portrayed as a measure of quality or usefulness.
  4. The article makes them look psychopathic. Underpaying staff, layoffs, constant churn and providing poor services is 'not a flaw' and 'makes sense' because they boost profits.
  5. This was always my pet peeve when working as a penetration tester. We'd run simple tools like this to cover the basics, but so many coworkers would blindly copy paste the issues without considering the site's context and suitability. Not to knock their skills, they'd find real vulnerabilities too. It's just that this stuff was considered beneath them, while I felt that giving a client tailored advice on little details like this is what they were looking for and shows attention to detail.
  6. I feel you can apply this to all roles. When models passed highschool exam benchmarks, some people talked as if that made the model equivalent to a person passing highschool. I may be wrong, but I bet even an state of the art LLM couldn't complete high school. You have to do things like attending classes at the right time/place, take initiative, keep track of different classes. All of the bigger picture thinking and soft skills that aren't in a pure exam.

    Improving this is what everyone's looking into now. Even larger models, context windows, adding reasoning, or something else might improve this one day.

  7. I was having multiple ESP devices from different brands running totally different firmwares all drop out randomly when I switched to a new Asus wifi router.

    Came across even more 'work arounds'; No spaces in the SSID, disable IPv6 for the whole network even if the ESP ignores it. Thing is all of these settings would reboot the router and reconnect everything, so it would seemingly work until the next dropout.

    I found limiting them to 802.11g instead of connecting with 'n' stopped the dropouts for good. Even now I wouldn't say that is a cure-all and that any of these other recommendations don't work, I'd guess that each AP's firmware might have different conflicts with different devices.

  8. Here in Australia they'll charge more for 5G but limit it to 150mbps. That's slower than LTE's max, no wonder 5G uptake is slow.
  9. Poor Grant in this article was always against the law but now has to talk as if it's a good idea.

    I looked into who was pushing for this law; a personality on a Murdoch owned radio station, along with Murdoch's News corp, a TV advertising company owner, and Jonathan Haidt as mentioned in the article, who is an anti-woke anti-academia hack https://3quarksdaily.com/3quarksdaily/2024/07/why-academics-...

    Feels weird and gross to me that legacy media / advertising companies are crying over kids's mental health when they've been targeting teenagers with impossible standards and negatively influencing their self image for decades.

    My personal conspiracy theory is that it was done to avoid scrutiny of advertising practices. A few months before academics started publishing findings on how problematic social media ads are; unhealthy foods, gambling, alcohol, and just plain scams. https://www.admscentre.org.au/adobservatory/

    With 'kids' removed from social media, advertisers can better get away with less savoury stuff.

  10. Realistically passwords can also be forced from your head using 'enhanced interrogation techniques'.
  11. I'm honestly just diving into this now after reading the article, and not a total expert. Wikipedia has a table of a leap second happening across TAI (atomic clock that purely counts seconds) UTC, and unix timestamps according to POSIX: https://en.wikipedia.org/wiki/Unix_time#Leap_seconds

    It works out to be that unix time spits out the same integer for 2 seconds.

  12. I think you're describing the exact confusion that developers have. Unix time doesn't include leap seconds, but they are real seconds that happened. Consider a system that counts days since 1970, but ignores leap years so doesn't count Feb 29. Those 29ths were actual days, just recorded strangely in the calendar. A system that ignores them is going to give you an inaccurate number of days since 1970.
  13. It wasn't a conspiracy theory, it's the official reason Apple told the press: https://www.wsj.com/tech/ai/apple-says-regulatory-concerns-m...
  14. Yeah just like OLED, the LED backlight on a LCD doesn't last. I just recently swapped out the backlight on my ~10 year old TV with a $30 new one off aliexpress. Way brighter again, and way less color accurate. At least it doesn't need to be ewaste now.
  15. Tools like evilnginx proxy the traffic, then grab the auth token / cookie after a successful login. From there you can send the session tokens to something like necrobrowser to automatically do whatever you want with the account. The whole hack can happen in seconds.
  16. MFA doesn't stop this kind of phishing. If you're tricked to put in your password, you'll likely put in your 2FA code right after. A yubi key or device passkey that uses webauthn can stop these methods, since the domain seeking authentication is checked and won't authenticate unless it's the original domain.

    Even then, that won't help scams and fraud that just trick you into sending money, or direct you to install malware.

  17. This is exactly what Siri wanted to be. Compare with the original Siri keynote https://vimeo.com/5424527

    I can't find the exact ~2010 article from before being bought by Apple. I remember in an interview they were talking about making a web agent that could operate and perform tasks on any website, to avoid being locked out by APIs.

  18. It is way too slow by default, I set the delay and animation time to 0 so it pops up immediately.

      defaults write com.apple.dock autohide-delay -int 0
      defaults write com.apple.dock autohide-time-modifier -int 0
      killall Dock
  19. Maybe I'm unlucky with my popOS distro but I don't understand everyone here saying their linux trackpad is as good as a mac one.

    When I two finger scroll on a mac, the content smoothly matches the movement of my finger. When I two finger scroll on linux it scrolls, but emulates a notched mouse wheel, with definite steps and no momentum. Some window management gestures worked on gnome, but as I noticed when trying to get four finger virtual desktop switching, you do the gesture then a command is run. On Mac the gesture animation starts as soon as your fingers start doing it, matching your speed and movement.

    It's cool that I can map any gesture to whatever command I want, but it is very far from a smooth and responsive touchpad experience. My uneducated guess is that certain things in the linux UI stack only operate in mouse actions and have no mechanism for passing on multitouch gestures?

  20. I see where you're coming from, and it's a bit of an old school view of E2EE. Wikipedia even has a section for the meaning of the term with a lot of citations requested, suggesting not everyone views the meaning of E2EE the same. https://en.wikipedia.org/wiki/End-to-end_encryption#Etymolog...

    I wonder how far you would take the separation of functions. If Signal started offering a service to scan your messages and attachments for spam/malware, sending them plaintext from the app to their server to do so, does that break their E2EE? If they recommended the feature, implied that not enabling it was reckless, and didn't explicitly explain the result being Signal servers reading your messages?

This user hasn’t submitted anything.