This profile is from a federated server and may be incomplete. View on remote instance

[Steam] Disco Elysium: The Final Cut ( shared.akamai.steamstatic.com )

Hey folks, it's been a while! I'm here today with a giveaway for a key to one of my favorite games ever made, Disco Elysium: The Final Cut. I am so excited to share this amazing game with whoever wins this giveaway! Be warned however, there are a few things you might want to consider before entering:...

lemmyng ,
@lemmyng@lemmy.ca avatar

I've been wanting to pick this one up, but the ZA/UM drama had me hesitating.

In the meantime, I picked up Skyrim again, and while the main quest stayed the same I'm floored by the amount of flavor content that was added since my last playthrough a few years back.

lemmyng ,
@lemmyng@lemmy.ca avatar

If it was a Futurama setting, would he be Gender Bender?

lemmyng ,
@lemmyng@lemmy.ca avatar

Ambrosia apples (the big ripe ones, not the small ones that I could swear are counterfeit Gala).

Ataulfo mangoes. Yellow. Small. Delicious.

Spanish mandarin oranges. Easy to peel, delicious. Other oranges can't hold shade to this one.

Forelle pears. Fragrant, juicy... Bartlett pears will seem like cardboard after having these.

Sungold kiwi. Not only are they sweet, but the skin is thinner and has no hairs, so you can just wash them and eat them whole.

lemmyng ,
@lemmyng@lemmy.ca avatar

The London Underground is actually kind of a dumb use-case because it’s fixed infrastructure.

On the other hand it's a perfect test bed, because there's sufficient changes of direction and speed, and the fixed infrastructure lets you measure drift. Plus it being underground helps simulate GPS signal being weak or unavailable.

Wikipedia declares Anti-Defamation League 'unreliable' on Israel, antisemitism: Report ( www.middleeasteye.net )

Wikipedia's editors voted to declare the Anti-Defamation League "generally unreliable" on Israel and Palestine as well as the issue of antisemitism, adding the organisation to a list of banned sources, according to a report by the Jewish Telegraph Agency (JTA)....

lemmyng ,
@lemmyng@lemmy.ca avatar

Goes to show how low the bar is that the ADL failed to meet.

lemmyng ,
@lemmyng@lemmy.ca avatar

I don't get why people are down voting this. Your approach is a perfectly acceptable blueprint for reducing meat consumption. Getting upset at you because you haven't fully embraced veganism is letting perfect become the enemy of good enough.

lemmyng ,
@lemmyng@lemmy.ca avatar

You could try Emby. It's freemium, but the free part doesn't (or didn't, last time I used it) require an online account.

lemmyng ,
@lemmyng@lemmy.ca avatar

One of those noodle labyrinths from kids menus. Entrance is my mouth, exit is... well you can figure that out.

lemmyng ,
@lemmyng@lemmy.ca avatar

I like Summit. Don't like the permissions that Sync and Boost require. Connect is OK.

lemmyng ,
@lemmyng@lemmy.ca avatar

Structure like a skeleton. Gives you the rough shape, but you have some freedom to arrange the squishy bits hanging off it.

lemmyng ,
@lemmyng@lemmy.ca avatar

What about loss of material due to evaporation? Sand batteries can retain their mass in an unsealed container, vs water batteries which would lose mass in an open container or be under dangerously high pressures in a sealed container.

lemmyng ,
@lemmyng@lemmy.ca avatar

“The Oregon/Idaho line was established 163 years ago and is now outdated,”

Either accept that earlier laws can be outdated and reinstate Roe v. Wade, or suck it up, ya hypocrites.

lemmyng ,
@lemmyng@lemmy.ca avatar

Think of that human torso being a very complicated neck rather than a half of a human grown onto a horse.

Now I can't stop thinking of centaurs as giraffes with arms stuck to their neck.

lemmyng ,
@lemmyng@lemmy.ca avatar

Reddit has been astroturfed so much the recommendations there have to be taken with a lot of salt.

lemmyng ,
@lemmyng@lemmy.ca avatar

Lemmy and Mastodon are social media as well, and they are not profit driven. Non-social media like newspapers and cable TV also spread toxic content.

In the end, you got the causality reversed. Media (both social and non-social) gravitates towards what drives the most engagement. Negative/toxic content drives the most engagement because that content elicits a strong emotional response in the consumer.

Media amplifies the problem, but ultimately the problem is people. Toxic content is going to stick around until people stop giving it attention, and unfortunately in all of the history of humanity we have yet to figure out how.

lemmyng ,
@lemmyng@lemmy.ca avatar

There are plenty of real life scenarios that both equate and predate your example, and which don't rely on anonymity. Lynch mobs in the US, rape gangs in southeast Asian countries, Hitler rallies, heck even bully groups among children. The size of the group does not have to be big to allow toxic behavior, as long as you have a catalyst (such as someone getting away with something) that engenders a feeling of safety from consequences and in- and outgroups. The Internet is just another medium for this behavior, anonymous or not. What is different is that the internet is the first medium that actively records it.

lemmyng ,
@lemmyng@lemmy.ca avatar

You can carbonate and then add Kool aid liquid drink mix. That will keep the carbonating nozzle clean while still giving you your choice of flavor.

lemmyng ,
@lemmyng@lemmy.ca avatar

Monthly would be nice, but don't feel obligated to do it - we'd enjoy it but don't burn yourself out providing content. What I would suggest though is to make sure you put a big "FAKE" watermark on them to avoid confusing the casual onlooker.

lemmyng ,
@lemmyng@lemmy.ca avatar

Good fucking riddance to that massive waste of oxygen.

lemmyng ,
@lemmyng@lemmy.ca avatar

rapid mitosis

As in you are seeing multiple boot entries? It's likely one entry per kernel version that you have installed. It doesn't happen often these days any more, but in some situations it's handy to be able to revert to a previous kernel if for example third party modules break.

lemmyng ,
@lemmyng@lemmy.ca avatar

I'm puzzling at that reflection in the bathroom mirror.

lemmyng ,
@lemmyng@lemmy.ca avatar

At, had to zoom way in to see the detail. From the thumbnail it was just a weird silhouette.

lemmyng ,
@lemmyng@lemmy.ca avatar

When you consider how much traffic goes towards the larger sites, it's actually believable. Even before the great migration Reddit was infested with reposter bots whose sole purpose was to farm karma in order to later sell the accounts. Those bots have gotten more sophisticated now, replicating not only original posts but entire comment threads. That's not new content, but it's content nevertheless, especially in the context of the dead Internet theory. Yes, it's engagement farming, but that engagement is getting more sophisticated, both to trick the user (to drive engagement) as well as to trick the server (to prevent getting blocked).

This is a very insidious problem, because it means that such bots can and will be abused by threat actors (both internal and external) to drive popular sentiment in certain directions. We know how susceptible a generation that only watched cable news became, imagine what such campaigns can do to internet generations - if you can generate content that supports your rhetoric faster than humans but without appearing fake, then you can drown out dissident speech. Brigading is bad already, and it will get worse.

lemmyng ,
@lemmyng@lemmy.ca avatar

the sheer volume of basic scraper and exploit scanner traffic that sites get is truly staggering in some cases.

Oh yes, absolutely. I've seen sites with millions of legitimate active users where we just dropped 98% of traffic because it's all malicious, either exploit scanners or just plain DDoS attempts. Going back to your earlier comment,

I might have the wrong impression, but “Bot” in average Joe’s vocabulary seems to imply this kind of astroturfing (often not actually a bot) or spambot type of bot, not any kind of non-human request like how Imperva are (correctly) using it.

On paper, any kind of automated traffic, be it DDoS, scanners, or automated content generation is bot activity. What is happening now though is that while consumptive bot activity is steady (because the field is already saturated), generative bot activity is skyrocketing. What it means for humans is that it turns media consumption from walking through an orchard and ignoring the rotten fruit to wading through a lake of shit and finding half-edible scraps. And I harbor no illusion that it wasn't bad before LLMs - even years ago I remember resetting the filters on my Reddit client and the feed getting inundated with ragebait, porn, and all sorts of low quality content. But when I had my filters they were effective, and that is becoming less so these days.

lemmyng ,
@lemmyng@lemmy.ca avatar

It has implications on the effectiveness of VPNs on public networks.

lemmyng ,
@lemmyng@lemmy.ca avatar

Counter argument: sometimes our memory of shows is rosier than reality. Take Looney Tunes, for example. Some of those original episodes made fun of mental illness, PTSD, even suicide.

In other cases a rebooted show is absolutely stellar, like BSG.

lemmyng ,
@lemmyng@lemmy.ca avatar

Sure they can. If you put a network behind a router they will share an egress/ingress IP. And there are certain high availability setups where computers share IPs in the same subnet for hot/standby failover.

lemmyng ,
@lemmyng@lemmy.ca avatar

Phone numbers can be spoofed, and SIM cards can be cloned. The analogy stands.

lemmyng ,
@lemmyng@lemmy.ca avatar

When you do call routing with a PBX each phone has an unique extension, equivalent to the private IP of each host.

Oh, and there's also anycast, which is literally multiple active devices sharing an IP.

lemmyng ,
@lemmyng@lemmy.ca avatar

A phone number does not uniquely identify a phone either.

lemmyng ,
@lemmyng@lemmy.ca avatar

Laptops don't get a new IP address every time they switch from one AP to another in the same network either. Your cell phone will get a new IP address if it switches to a different cell network.

lemmyng ,
@lemmyng@lemmy.ca avatar

Ah, I see we are resorting to ad hominem attacks now.

lemmyng ,
@lemmyng@lemmy.ca avatar

Whoa, that's a sizeable edit to the post! Regardless the answer is pretty straightforward: your VOIP client (either the device if you have one or the software) is connected to a VOIP service which acts like a gateway for your client. Since the client initiated the connection to the gateway and is keeping it alive, you don't need to make any network changes. Once the connection is established, standard SIP call flows (you can Google that for flow diagrams) are followed.

So no, you router is not part of the cell service. The VOIP provider is part of a phone service that receives calls and routes them for you, just like the cell towers are part of a telephony provider that routes calls through the appropriate tower.

lemmyng ,
@lemmyng@lemmy.ca avatar
  1. A static IP is actually not necessary, but what you need is a consistent identifier. For the server, that's typically a DNS address, but for clients and peer to peer networks there's other ways to identify devices, usually tied to an account or some other key kept on the device.
  2. For centralised communications yes, you would need an always online server. For decentralised networks, you just need a sufficient amount of online peers, but each individual peer does not need to be always online.
  3. Pretty much, yes. Even push notifications on cell phones work this way.
  4. Route, yes. Manually. VPN is usually not necessary. In modern web-based services this is typically done with websockets, which are client-initiated (so the client address can change), and which allow two-way communication and typically only require a keepalive packet from the client every minute or so.

There's other reasons why universal addressing is not done - privacy, network segmentation, resiliency, security, etc. And while IPv6 proponents do like to claim that local networks wouldn't be strictly necessary (which is technically true), local networks will still be wanted by many. Tying this back to phone numbers - phone numbers work because there's an implicit trust in the telcos, and conversely there's built in central control. It also helps that it's only a very domain specific implementation - phone communication specifications don't change very often. On computer networks, a lot of work has been done to reduce the reliance on a central trust authority. Nowadays, DNS and SSL registries are pretty much the last bastion of such an authority, with a lot of research and work having gone into being able to safely communicate through untrusted layers: GPG, TOR, IPFS, TLS, etc.

lemmyng ,
@lemmyng@lemmy.ca avatar

Remember it's the Financial Post. Gotta take things they say with a heaping pile of salt.

lemmyng ,
@lemmyng@lemmy.ca avatar

Not sure what you are talking about. Paragraph 1 has

The malware is delivered through a fake Google Chrome update that is shown while using the web browser. 

and the article makes it pretty clear after that that the user is tricked into installing the fake apk.

lemmyng ,
@lemmyng@lemmy.ca avatar

Just because it has a CVE number doesn't mean it's exploitable. Of the 800 CVEs, which ones are in the KEV catalogue? What are the attack vectors? What mitigations are available?

lemmyng ,
@lemmyng@lemmy.ca avatar

If you remove the speeches from Trek, don't you just end up with the kind of content everyone seems to be complaining about in JJ-Trek?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • kbinchat
  • All magazines