@Rustmilian@lemmy.world cover
@Rustmilian@lemmy.world avatar

Rustmilian

@[email protected]

This profile is from a federated server and may be incomplete. View on remote instance

Rustmilian ,
@Rustmilian@lemmy.world avatar

I still don't like wearing my glasses.
Sometimes I just use the pinhole method just so I don't have to wear them.
I'm not super blind, just near sighted.
I can get about my day without them most of the time. I just find them way to distracting.

Rustmilian ,
@Rustmilian@lemmy.world avatar

I'll start the ad hominems now : yes it is, plus your mom kiss dudes.

tobozo , to KDE
@tobozo@mastodon.social avatar

@kde another feature forced really hard on users, with Konsole this time: the color preview

I can't remember when this landed in KDE as it just added to the list of "new KDE features" I tried to ignore while struggling to keep focus, but that list never ceases to expand 😬

moreover, the option to disable that color preview feature I don't need is burried deep: the only way to turn it off is by creating a new Konsole profile 🤦‍♂️

image/png

Rustmilian ,
@Rustmilian@lemmy.world avatar

Give post link.

Rustmilian ,
@Rustmilian@lemmy.world avatar

Additionally, The color preview feature was added to Kate in version 22.08.0, which was released on August 18, 2022.

Rustmilian ,
@Rustmilian@lemmy.world avatar

Thanks.

Rustmilian , (edited )
@Rustmilian@lemmy.world avatar

The term is Lemmings, btw.
Because :

I was playing that old-school game Lemmings, and Lemmy (from Motorhead) had passed away that week, and we held a few polls for names, and I went with that."
https://en.m.wikipedia.org/wiki/Lemmy_(social_network)#History

Rustmilian ,
@Rustmilian@lemmy.world avatar

If you start at 25 or later when you're brain is fully formed, your IQ won't take a permanent hint unless you're a heavy smoker. It will still effect your memory to some degree tho, but that also goes for alcohol and other drugs.
Using in moderation is key.

Rustmilian ,
@Rustmilian@lemmy.world avatar

No need to apologize, you're new; I don't expect you to know all the Lemmy localized terminology yet.

Rustmilian ,
@Rustmilian@lemmy.world avatar

embrace other forms of therapy and medication that is a better long-term option.

Exactly this. For certain disorders cannabis simply won't help and potentially lead to psychological dependence.
For certain disorders like chronic pain, I don't even recommend using THC, instead go for CBD products.

Rustmilian , (edited )
@Rustmilian@lemmy.world avatar

On the addiction aspect, the addiction stems from purely psychological, at least in my experience, unlike other drugs like nicotine which is chemical/physical addiction. I've smoked weed and tobacco/vapes, was at one point dependent on weed but was able to quit cold turkey and haven't felt any cravings since.
Nicotine on the other hand is very much a constant battle that I feel like I could relapse at time, just a wiff of second hand smoke is enough to give me very strong withdrawal jitters. Infact, I feel that a heavy contributer of my weed dependency was a transference of my nicotine addiction.
In that sense, targeting mental health issues through therapy and appropriate prescriptions for co-occurring mental health conditions will likely help kick cannabis dependence.

Rustmilian OP ,
@Rustmilian@lemmy.world avatar

It's the blatant call to violence & the "haha war funny" for me.

Rustmilian OP , (edited )
@Rustmilian@lemmy.world avatar

Neither is spamming cringe in a meme community.

https://lemmy.world/pictrs/image/9d956079-253f-4556-a6b6-9b33acf96ea4.jpeg

Rustmilian OP , (edited )
@Rustmilian@lemmy.world avatar

!memes sort by new & start scrolling. You'll see the same "joke" repeated 3x times in just the last 2days by the same exact user. Keep scrolling and you'll see even more, they're making it a daily thing.

Israel doesn't have the right to exist 
Israel doesn't have the right to exist
Israel doesn't have the right to exist
Israel doesn't have the right to exist

He manically writes over and over in a sketchbook like a schizo.

Perplexity Is a Bullshit Machine ( www.wired.com )

A WIRED analysis and one carried out by developer Robb Knight suggest that Perplexity is able to achieve this partly through apparently ignoring a widely accepted web standard known as the Robots Exclusion Protocol to surreptitiously scrape areas of websites that operators do not want accessed by bots, despite claiming that...

Rustmilian ,
@Rustmilian@lemmy.world avatar

Ofc it's prone to bullshitting, it can't even stay consistent; shit will contradict itself and sight the same sources.

Rustmilian ,
@Rustmilian@lemmy.world avatar

That goes for both....

Rustmilian ,
@Rustmilian@lemmy.world avatar

The fact people bought NFTs just proves that crypto bros just buy into hype without understanding the technology.
I knew NFTs were bullshit from the start because I actually took the time to understand how they "worked".

Rustmilian ,
@Rustmilian@lemmy.world avatar

Why do you think trump started peddling Jesus bullshit last time he ran even though he's not even remotely cristian or religious. He'll shill anything as long as he thinks it'll profit him.

Rustmilian ,
@Rustmilian@lemmy.world avatar

An alarming amount of bodybuilder do steroids...
Including the Vegan ones...
The bodybuilder industry literally survives on steroids.

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3905478/#:~:text=The%20probability%20of%20lifetime%20use,anabolic%20steroids%20in%20their%20lifetime.

And it's not just anabolic steroids like shown in the ncbi study from iran, it's also androgenic steroids, growth hormones, testosterone boosters, and several different types of stimulants.

Rustmilian ,
@Rustmilian@lemmy.world avatar

The British when they see literally any cultural artifact.

Rustmilian ,
@Rustmilian@lemmy.world avatar

And how do you feel about the marches or rather individuals in these marches that go to far? To be clear I'm not talking about the people who wear rubber suits.

Rustmilian ,
@Rustmilian@lemmy.world avatar

I wouldn't classify the behavior of these specific individuals as "kink"... , I wouldn't even classify them as necessarily apart of LGBTQ+ either. I'm not saying it's common either, I'm mearly ask how you feel about them. I'm referring to the specific cases of individuals who take the opportunity to put on displays of public nudity & indecent exposure outside the bonds of the law. And I'm not referring to Will Walters; butt cheeks is not nudity.

Rustmilian ,
@Rustmilian@lemmy.world avatar

Again I'm not fucking saying it's a common issue. Now you're just misunderstanding what I'm saying in bad faith.
Again I'm merely asking how you feel about these specific individuals who go to far, and in this instance beyond the bounds of "kink" during public marches.
But you keep fucking dodging the question with your irrelevant ass bullshit strawman argument, instead of actually answering my fucking question.

My point is that you seem to be worried about an imaginary issue that

I'm not worried about shit, I'm asking for your personal opinion on these very specific cases to push the discourse into careful consideration of how such cases effect the causes pushing for social change.

Just because it makes you uncomfortable or you don’t consider it LGBTQ doesn’t mean it needs to be changed.

Not even close to what I said, again this is not about people celebrating kinks or have their tits and ass out, I do not give a shit about such things.

Rustmilian ,
@Rustmilian@lemmy.world avatar

Having their genitalia out is too far. Butts and tits are not genitalia. What else is going too far is burning down a fucking Park.

Let me also ask you what you think about nude bike rides, where dozens, if not hundreds, of people cycle nude through a city. Is that too much for you?

Nope, that can easily be exempt as a form of artistic expression and doesn't fit into the type of actions I'm referring to. If you've seen the images it's very clearly artistic expression no different from the body paint artists that are also in Seattle.

Rustmilian ,
@Rustmilian@lemmy.world avatar

The fire was started by individuals from a LGBTQ+ pride/racial injustice protest. I attended this march myself as well, it was primarily a racial injustice protest but a lot of individuals were wearing & celebrating pride stuff as well. The end result was many deciding to continue the protest at rec park, where then it was burned to the ground by unknown individuals. My question is entirely centered around individuals that go to far during these types of events, be it indecent exposure/genital nudity, or what law enforcement consider crimes in general, that's what I've been trying to get across but certain people are seemingly misinterpreting my question on purpose and dodging the question so they can insert their own bullshit argument that has nothing to do with the question at hand & putting words in my mouth I never said. The fire example is mearly mechanism to try to drive home this primary point rather than conducive to the specific topic. The entire point of the question is to draw out your personal logical reasoning and nuance of how you perceive these specific individuals, to induce a level of reflection, to allow deepening of understanding of your stance and further push the discussion into a level of interpersonal discourse. As It's a complex issue that requires careful consideration on a deeper case-by-case analysis & is important to discuss how such cases effect the causes pushing for social change and how theses causes can deal with them respective of the law and the rights of others, while still finding ways to make their voices heard and push for progress.

Nudity at Pride is rare, can happen, but it's not exclusive to Pride. And also something that I think attitudes should change on. Nudity is not something that people should fear, nor should they be shamed if they are happy being nude.

Thank you for actually answering the question instead of strawman-ing like a certain someone else. I can agree to a degree. Is there a degree of nudity that you'd draw the line at? Are there cases of, say artistic expression that you'd say would get an exemption to that line?

P.s. I'm not the one who down voted your reply, I appreciate your reply as you are the only one who actually put thought into answering the question.

https://lemmy.world/pictrs/image/d3d3ba1f-9aac-44fd-b59d-39e2149123ed.jpeg

Rustmilian ,
@Rustmilian@lemmy.world avatar

Here, I'll make it more clear to you by defining what is not too far first.
In 2023 a bunch of nude cyclists were present during the public Seattle Pride Parade, while they were fully naked, half covered, etc. Their behavior is very clearly artistic expression and not inappropriate, as they were wearing body paint and commiting to other artistic representations of nudity no different from a body paint artist that are also very public in Seattle, nor were they engaging in inappropriate behavior or attempting to induce sexual arousal. In the same vein, wearing a rubber suit can also very much fall into the same category.
Does that make it more clear?
The specific cases are those intentionally engaging in behavior that can't be defined as artistic expression and can deeply harm the overall movement, such as the rare cases of inappropriate touching/unwanted touching.
Imo, strict codes of conduct such as those used by Nudist organizations during their public events in other more lax countries should be used, not only to discourage the behavior but to also protect the integrity of the events and movements when such cases do occur. The mentioned Seattle Pride Parade for example had no official code of conduct, luckily no such case occured during this particular event.

Rustmilian , (edited )
@Rustmilian@lemmy.world avatar

you can use it in almost any app
if done right

How are you going to be able to use it in "almost any app" in a way that is secure? How are you going to design it so that the apps don't abuse the AI to get more information on the user out of it than intended? Seems pretty damn inherently insecure to me.

Rustmilian , (edited )
@Rustmilian@lemmy.world avatar
  • Malicious actors could potentially exploit vulnerabilities in the AI system to gain unauthorized access or control over device functions and data, potentially leading to severe privacy breaches, unauthorized data access, or even the ability to inject malicious content or commands through the AI system.
  • Privacy breaches are possible if the AI system is compromised, exposing user data, activities, and conversations processed by the AI.
  • Integrating AI functionality deeply into the operating system increases the overall attack surface, providing more potential entry points for malicious actors to exploit vulnerabilities and gain unauthorized access or control.
  • Human reviewers have access to annotate and process user conversations for improving the AI models. To effectively train and improve the AI models powering the OS-level integration, Apple would likely need to collect and process user data, such as text inputs, conversations, and interactions with the AI.
  • Apple's privacy policy states that the company collects data necessary to provide and improve its products and services. The OS-level AI would fall under this category, allowing Apple to collect data processed by the AI for improving its functionality and models.
  • Despite privacy claims, Apple has a history of collecting various types of user data, including device usage, location, health data, and more, as outlined in their privacy policies.
  • If Apple partners with third-party AI providers, there is a possibility of user data being shared or accessed by those entities, as permitted by Apple's privacy policy.
  • With the AI system operating at the OS level, it likely has access to a wide range of user data, including text inputs, conversations, and potentially other sensitive information. This raises privacy concerns about how this data is handled, stored, and potentially shared or accessed by the AI provider or other parties.
  • Lack of transparency for users about when and how their data is being processed by the AI system & users not being fully informed about data collection related to the AI. Additionally, if the AI integration is controlled solely at the OS level, users may have limited control over enabling or disabling this functionality.
Rustmilian , (edited )
@Rustmilian@lemmy.world avatar

Apple claimed that their privacy could be independently audited and verified.

How? The only way to truly be able to do that to a 100% verifiable degree is if it were open source, and I highly doubt Apple would do that, especially considering it's OS level integration. At best, they'd probably only have a self-report mechanism which would also likely be proprietary and therefore not verifiable in itself.

Rustmilian , (edited )
@Rustmilian@lemmy.world avatar

Their keynotes are irrelevant, their official privacy policies and legal disclosures take precedence over marketing claims or statements made in keynotes or presentations. Apple's privacy policy states that the company collects data necessary to provide and improve its products and services. The OS-level AI would fall under this category, allowing Apple to collect data processed by the AI for improving its functionality and models. Apple's keynotes and marketing materials do not carry legal weight when it comes to their data practices. With the AI system operating at the OS level, it likely has access to a wide range of user data, including text inputs, conversations, and potentially other sensitive information.

Rustmilian ,
@Rustmilian@lemmy.world avatar

AI powered Rootkit.

Rustmilian , (edited )
@Rustmilian@lemmy.world avatar

However, to process more sophisticated requests, Apple Intelligence needs to be able to enlist help from larger, more complex models in the cloud. For these cloud requests to live up to the security and privacy guarantees that our users expect from our devices, the traditional cloud service security model isn't a viable starting point. Instead, we need to bring our industry-leading device security model, for the first time ever, to the cloud.

As stated above, Private cloud compute has nothing to do with the OS level AI itself. ರ⁠_⁠ರ That's in the cloud not on device.

While we’re publishing the binary images of every production PCC build, to further aid research we will periodically also publish a subset of the security-critical PCC source code.

As stated here, it still has the same issue of not being 100% verifiable, they only publish a few code snippets they deam "security-critical", it doesn't allow us to verify the handling of user data.

  • It’s difficult to provide runtime transparency for AI in the cloud.
    Cloud AI services are opaque: providers do not typically specify details of the software stack they are using to run their services, and those details are often considered proprietary. Even if a cloud AI service relied only on open source software, which is inspectable by security researchers, there is no widely deployed way for a user device (or browser) to confirm that the service it’s connecting to is running an unmodified version of the software that it purports to run, or to detect that the software running on the service has changed.

Adding to what it says here, if the on device AI is compromised in anyway, be it from an attacker or Apple themselves then PCC is rendered irrelevant regardless if PCC were open source or not.

Additionally, I'll raise the issue that this entire blog is nothing but just that a blog, nothing stated here is legally binding, so any claims of how they handled user data is irrelevant and can easily be dismissed as marketing.

Rustmilian , (edited )
@Rustmilian@lemmy.world avatar

Yeah and apple is completely untrustworthy like any other corporation, my point exactly. Idk about you, but I'll stick to what I can verify the security & privacy of for myself, e.g. Ollama, GrapheneOS, Linux, Coreboot, Libreboot/Canoeboot, etc.

Rustmilian ,
@Rustmilian@lemmy.world avatar

Aptoide sucks.

Rustmilian , (edited )
@Rustmilian@lemmy.world avatar

Yes, on Android. From my own investigations, it appears to have a really bad malware problem despite it's claims of scanning for malware, especially for the free distributions of paid apps from the Google Play Store, which constitutes piracy and copyright infringement raising ethical issues.

Rustmilian , (edited )
@Rustmilian@lemmy.world avatar

Yes. Because it comes in two parts. The
OS level package and the browser extension, if the extension can't communicate with the OS level package then it won't work.

Rustmilian OP , (edited )
@Rustmilian@lemmy.world avatar

Yes, literally the end of her last Livestream.
https://youtu.be/qTj60x9eMu4?t=5h58m39s

Rustmilian OP ,
@Rustmilian@lemmy.world avatar

Np. I forgot to add the stream link, that's my bad. Kinda staying up all night for Lina's live stream.

Using btrfs compression as a backing device for Zram

So, I'm sure some of you know. If configured, you can use a backing device for Zram for scenarios where Zram can't compress the data, e.g. when it's full. For this you can use pretty much any supported partition format, including btrfs, what I realized is that you can used btrfs disk compression on top of that. Question is, is...

Rustmilian OP , (edited )
@Rustmilian@lemmy.world avatar
TL;DR :

Zram itself doesn't compress data in the backing device. The data written to the backing device is stored unmodified by Zram. Zram's function is to compress data within its allocated RAM space. Once that space is full, any incoming data, compressed or uncompressed, overflows to the backing device unmodified by Zram.

If the data is overflowing from Zram into the backing device because the Zram block is full, that doesn't necessarily mean that data is uncompressible. It simply means that there's no place to put it even if it was compressible. The truly incompressible data ideally should be stored in the RAM that's not allocated to the Zram block device, unless that RAM space is also already taken, then that data would go to the backing device. The scenario I'm thinking of is a lot more specific. Ofc, Zram would prioritize truly incompressable & idle data first when pushing into the backing device, keyword there is "idle", which supports the idea that the data isn't necessarily uncompressible.

Already compressed media, for example, can't really be compressed. In fact, if you try, you might just find it actually ends up bigger than the original.

There's no case where this would happen, the data being pushed to the backing device is always unmodified by Zram, regardless if it's compressible or not. Also, already compressed media would not necessarily be seen as incompressible by Zram. Zram can still compress already compressed data to some extent, depending on the type of compression used and the compressibility of the original data. For example, if the original data was compressed using a simple algorithm like LZMA, Zram might be able to achieve better compression using a more advanced algorithm like LZ4.
However, the benefit of compressing already compressed data with Zram is usually minimal as you've already said.
This is the primary purpose of CONFIG_ZRAM_MULTI_COMP to handle cases where the primary algorithm is unable to efficiently compress certain data.
Also, Btrfs uses a built-in pre-compression heuristics algorithm to analyze each file and determine if compression is beneficial. Comparatively, Zram has no such mechanism so it attempts compression regardless.

Tbh, deep down the rabbit hole is an understatement. here's a more detailed documentation of Zram.

Edits : Wording improvement's and added supporting sources.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • kbinchat
  • All magazines