As long as they aren’t putting ridiculous terms on model usage like SD3 and the weights are provided I’m happy with it
As long as they aren’t putting ridiculous terms on model usage like SD3 and the weights are provided I’m happy with it
This often happens to me on Windows with the Index so it might not even be a Linux specific issue
The laws generally require adults to upload some form of government ID
Absolutely insane, KYC for looking at pornography
I want to do stuff
Really interesting article. The general idea seems to be that people having their access to banking shut down has been a real problem for a long time, and is most commonly imposed on marginalized groups, but people don’t realize it’s going on, and the people on the right making noise about this issue ignore where the bulk of the problem is.
This is sometimes how I feel when I appear on the ‘anti-mainstream’ ‘free thought’ media outlets. They want to hear about the financial censorship of the Freedom Convoy, but they don’t want to hear about restrictions on Aboriginal payments. This hints to a skew in their freedom of thought, and it’s certainly not open-minded. When they approach me, they’re trying to recruit that mercenary side of me who is nominally prepared to defend their narrow free thinking, but this poses an ethical dilemma, because their selective curation of what examples of payments censorship they’re prepared to ask about or listen to amounts to a silent form of censorship in itself. Selectively hearing, and amplifying, one set of injured voices - the Truckers - can be very similar to blocking another set out.
Firstly, yes, it’s very important to fight the general principle of payments censorship (and, by extension, to protect the cash system that provides a buffer agai nst it). Secondly, I must inform them that the actual chances of payments censorship being used against them is smaller than the chances of it being used against refugees, migrants, the homeless, or sex workers, who face recent real-world cases of financial censorship.
Thanks, I’ve never been diagnosed or anything but it’s something I’ve had trouble with all my life, kind of just learned to be very wary about various social situations because I’d get it wrong a lot.
Remember people’s names or faces
Crypto is meant for self custody anyway, not great if everyone is relying on a bank to do it for them.
This makes sense to me, we could continue to develop and use important technologies while at the same time setting things up so their externalities are part of their cost and companies have financial reasons to work to reduce the impact.
I’m not sure how you’d tell unless there is some reputable source that claims they saw this search result themselves, or you found it yourself. Making a fake is as easy as inspect element -> edit -> screenshot.
Yeah but it’s funny in a different way; they are giving ignorant and condescending advice because while big cats have impressive hunting abilities, they don’t normally hunt mice.
I don’t honestly mind the idea of AI powered OS features and would use them, the problem with this is it uses Copilot and Microsoft isn’t at all trustworthy to not be collecting and misusing user data in general. This would be cool with totally open source software and AI that runs entirely on your own gpu.
entertainment where you can laugh at how they put effort into creating an illusion of professionalism but left enough gaps to make it clear it was just an illusion and he’s in way over his head
I liked the time when he tried to use linux and ended up destroying his os by blindly following googled command line instructions
There’s no way that would work either, they can just store the full edit history and auto-curate as needed.
Do you mean the attack only works against people with a split tunnel setup?
Not quite what the article says:
When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks. Network firewalls can also be configured to deny inbound and outbound traffic to and from the physical interface. This remedy is problematic for two reasons: (1) a VPN user connecting to an untrusted network has no ability to control the firewall and (2) it opens the same side channel present with the Linux mitigation.
Unlimited free distribution of copyrighted media is something I’m all for, but that’s a really tall order in terms of political capital for getting the law changed, a few protests aren’t going to do it, basically every elected official would strongly oppose it, you’d have to replace them all first.
I can respect the opinion of someone who is not making any arguments. I can respect the opinion of someone who mostly makes bad arguments but sometimes makes good arguments. I probably won’t respect the opinion of someone who only makes terrible arguments, especially if they are also an asshole about it.
Explicit types are just laziness, you should be catching exceptions anyways.