Kalcifer

joined 1 year ago
MODERATOR OF
[–] Kalcifer@lemm.ee 0 points 9 months ago (1 children)

Does your network not support UPnP? You shouldn't normally need to port forward in order to seed a torrent, unless your network prevents NAT traversal.

 

More often than not, the best way to hide is to simply blend in with the crowds -- this also encompasses one's choice for a username. It is relatively simple to make a single throwaway account -- just come up with a username, and off you go -- however, if one makes throwaway accounts often, the task of thinking of a unique, and non-identifiable username can become a challenge. I would argue that poeple would often resort to using a pattern employing small changes for all subsequent usernames. Such patterns can be identified to a specific user if all users have their own unique patterns.

How can one reliably generate many unique-but-normal, and non-pattern-identifiable usernames?

 

For example:

It is a thing that works producing stuff.

This feels wrong to me, but I can't quite put my finger on what exactly is wrong about it. It seems like it's trying to be a participle phrase, but it's not necessarily modifying the current state of "it", and is, instead, describing what "it" is.

If it is, indeed, a participle phrase, then it should be able to be written as

Producing stuff, it is a thing that works.

But, to me, this doesn't seem correct either, so it leads me to believe that the very structure of the sentence is incorrect.

[–] Kalcifer@lemm.ee 1 points 10 months ago* (last edited 10 months ago)

RISC-V is just an instruction set -- same idea as x86. While it is, of course, important to also have an open instuction set, that is somewhat separate from this post's intention. I am referring to the physical manufacture of semiconductors, RISC-V, or otherwise.

 

Currently, only one company in the world -- ASML -- has the technological capability necessary for the creation of photolithography machines which are sufficient for the production of modern semiconductor devices. What I'm wondering is at what point does semiconductor manufacturing become practical, or even feesible for small organizations, or independents? One must be able to surpass the cost of the machines, and the resources necessary to manufacture them. I presume that a company like ASML is also extremely picky -- willfully, or by regulation, or otherwise -- about who they lend their technology to.


I'm not sure if this is the right community for this sort of post. Please let me know if not, and if there is a more suitable place to put it.

 

I am referring to both the design, and the independent, and auditable manufacture of the CPU. It should be noted that such a CPU needn't fully compete with modern ARM, Intel, AMD, etc. CPUs, but it would be an incredible boon to have a fully trustworthy piece of hardware, even if it is considerably lower in it's strength. For specifics, let's say a CPU that could run a lightweight Linux distro at a "tolerable" speed.

Creating the designs for the CPU, of course while still difficult, is, most likely, the most feesbile aspect -- I presume it would "just" consist of writing the Verilog, or some other hardware description language to describe the CPU's function. The manufacture, however, is a substantial obstacle. Modern photolithography is, quite litterally, at the very forefront of human technological creation. I am just hoping that turning back the clock perhaps 20 years on the technological complexity might reduce the barrier to entry.

 

On the side bar it lists the following:

  • [Matrix/Element]Dead
  • Discord

"Discord" is an active link, but the Matrix link is completely inactive. Not only is it inactive (which could have be excused as a broken link), but it is also manually labeled as "Dead", as if there is no intention of making it work. How can a community that is focused on privacy willingly favor a service that is privacy non-respecting when a perfectly functional privacy-respecting alternative exists?

 

I believe that the addition of an edit history would be a massive boon to the usefulness of Lemmy on the whole. A common problem with forums is the relatively low level of trust that users can have in another's content. When one has the ability to edit their posts, and comments this invites the possibility of misleading the reader -- for example, one can create a comment, then, after gaining likes, and comments, reword the comment to either destroy the usefulness of the thread on the whole, or mislead a future reader. The addition of an edit history would solve this issue.

Lemmy already tracks that a post was edited (I point your attention to the little pencil icon that you see in a posts header in the browser version of the lemmy-ui). What I am describing is the expansion of this feature. The format that I have envisioned is something very similar to what Element does. For example:

What this image is depicting is a visual of what parts of the post were changed at the time that it was edited, and a complete history of every edit made to the post -- sort of like a "git diff".

I would love to hear the feedback of all Lemmings on this idea for a feature -- concerns, suggestions, praise, criticisms, or anything else!


This post is the result of the current (2023-10-03T07:37Z) status of this GitHub post. It was closed by a maintainer/dev of the Lemmy repo. I personally don't think that the issue got enough attention, or input, so I am posting it here in an attempt to open it up to a potentially wider audience.

[–] Kalcifer@lemm.ee 0 points 10 months ago* (last edited 10 months ago) (2 children)

If you look at this documentation it outlines various methods of generating URL thumbnails. Essentially, a separate request from the client for only the URL is made to the server which then returns a thumbnail. It's an absolutely moronic design choice, if you ask me.

EDIT (2023-10-02T01:35Z): Do note that the link that I provided is for Synapse v1.37 -- Synapse is currently on v1.97. Curiously, the documentation for the new versions of Synapse have removed the sections talking about URL previews. I'm not sure what's up with that.


RT373YSQwMB+y28d7xm/Xybihcmx9jgkd4RskvPuoFQ3hapIv4exdmtMe+QxsVqos5odxTVuKAftj53zXFFQyD7MK0985zDvfKYjIj+b+8rNSAG0fArG2SXVBW0mLXqRnXiZXiknoPekyu7MKr1aD8k9DMQzCap60oNWmOLoCQXdmEetiEnhGL8zW2KR9P4MxtzxMzLzPWJyLmpLbXVJdxTmHFN32IvMHiyY29iJqZegmIuav0+IP2c3leGrJs75eGW2uWoj8J8VWWzflWfRRO3FwzJFRIvrptPN0osD0wMrgLJ4FYwXZQetIEJ99TxWvxqTYak90q6HxvVygOyHPw==
 

As I noted within my post, #9955859@lemm.ee (alternate link), URL thumbnail generation in Element is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:

In encrypted rooms, like this one, URL previews are disabled by default to ensure that your homeserver (where the previews are generated) cannot gather information about links you see in this room.


Post Edit History

2023-10-02T00:54Z
1c1,2
< As I noted within my post #9955859@lemm.ee ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server.
***
> As I noted within my post #9955859@lemm.ee ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:
> > In encrypted rooms, like this one, URL previews are disabled by default to ensure that your homeserver (where the previews are generated) cannot gather information about links you see in this room.

2023-10-02T01:28Z
1,2c1,2
< As I noted within my post #9955859@lemm.ee ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:
< > In encrypted rooms, like this one, URL previews are disabled by default to ensure that your homeserver (where the previews are generated) cannot gather information about links you see in this room. 
***
>  As I noted within my post, #9955859@lemm.ee ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:
> > In encrypted rooms, like this one, URL previews are disabled by default to ensure that your homeserver (where the previews are generated) cannot gather information about links you see in this room.

2023-10-02T03:44Z
1c1
< As I noted within my post, #9955859@lemm.ee ([alternate link](https://lemm.ee/post/9955859)), thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:
***
> As I noted within my post, #9955859@lemm.ee ([alternate link](https://lemm.ee/post/9955859)), URL thumbnail generation in [Element](https://element.io/) is an enormous privacy, and security vulnerability. Thumbnails are generated server-side, regardless of E2EE settings. What this means is that the URLs that one sends would be leaked out of your encrypted chats to the server. Here is a notable excerpt from the settings within Element:

Post Signature

ul7mHTfs8xA/WWwNTVQ9HzKfj/b+xw+q9csWf60OJrT58jMJpmsX8/BicwFodR8W
Llo93EMtboSUEtYZ+wQhaL/HmrEr6arup7gJzZgslOBWPFj5azADHSpjX9RYuvpt
Fk2muTUgJP2e+SW3BGDPmlcluw6mQOYcap84Fdc1eU47LOZprBXob97qInMK5LrL
tzNqARRtXGdogZtQYlNCqCd9eQgqTwPfxKVadmM6G3xQMh6mWQxQz56sCXqj+mlG
OqJyZIgB1UXEuVZeAO3pl9wN+cSM4eqHLHQwEd+aVeSPf75r2d7mZs+VNwr1WfMu
0sWcPh3aZLXKqdls6UJMEA==
[–] Kalcifer@lemm.ee 0 points 11 months ago (1 children)

I don't follow what you mean.

[–] Kalcifer@lemm.ee 0 points 11 months ago (1 children)

I have found that instances that do seem to modify the source code just use the existing "Code" link and simply point it to their own repo instead.

[–] Kalcifer@lemm.ee 0 points 11 months ago* (last edited 11 months ago) (3 children)

The first two lines of the for loop,

byte upper_byte = input_bin >> 8;
byte lower_byte = input_bin & 0x00FF;

don't really accomplish anything. The first line is bit shifting to the right 8, and then you just bitwise and it resulting in the same thing. For example, starting with input_bin:

1000 0000 0000 0000
>> 8
0000 0000 1000 0000
& 0xFF
0000 0000 1000 0000

So, every time you go through a cycle of the for loop, you'll just start with the same values in upper_byte, and lower_byte. To sequentially output each shifted value, you'll instead want something like:

output_value = 0b1
for i = 1 to 16:
    latch(low)
    shift_out(output_value)
    latch(high)
    output_value = output_value << 1

That is, if I interpereted correctly that you want the shift registers to output the following:

output_count, upper_shift_register, lower_shift_register
1, 00000000, 00000001
2, 00000000, 00000010
3, 00000000, 00000100
.
.
.
16, 10000000, 00000000

Note: Lemmy has a bug where it doesn't format some symbols correctly, so the left angle bracket gets formatted as <. The same issue exists for the right angle bracket, the ampersand, and I would presume others.

 

Lemmy is licensed under the AGPLv3. I don't want to rely solely on my own legal interpretation of the license, so I'm wondering if anyone has any explicit knowledge on the matter.

As an aside, am I correct in assuming that, if someone does make changes to the source code, they must host, and link to it?

EDIT (2023-09-27T22:22Z): I am just now seeing that at the bottom of a Lemmy instance's site, there is a link that says "Code". It appears that this is handled automatically.

1
submitted 11 months ago* (last edited 11 months ago) by Kalcifer@lemm.ee to c/libertarianism@lemmy.world
 

Workaround

A workaround that I decided to go with was to simply extend my backup of the nextcloud snap to simply include the entirety of /var/snap/nextcloud instead of just taking the data directory, and the dump of the database. If I restore /var/snap/nextcloud, everything is immediately restored to its previous working order. This seems to accomplish what I want.

I still have no idea what was causing the previous issue, though. I'm thinking that it might be that some important files, or directories are being left out in the previous backup that nextcloud is expecting to be present, but I'm really not sure.


Original Post

I have been scratching my head for hours over this -- I'm really not sure what the problem could be. I have nextcloud installed as a Snap on Ubuntu Server.

Here's how I went about restoring the backup (fresh install of nextcloud):

  1. Copy over the data: # rsync -Aax data-backup data-directory
  2. Drop the existing database: # nextcloud.mysql-client -e "DROP DATABASE nextcloud"
  3. Create a new database: # nextcloud.mysql-client -e "CREATE DATABASE nextcloud"
  4. Restore the dumped database: # nextcloud.mysql-client nextcloud < database-dump

When I log in to nextcloud in the browser, it initially appears that it worked fine: calendar data, task data, contacts, etc. are all properly loaded, and the images viewer is displaying images; however, when you look at the files tab, there's nothing there, and, when you try to create a folder, it spits out an error saying "Unable to create folder". If I run nextcloud.occ files:scan --all it can see all the files in the data directory just fine, it's just not able to display them in the files taband I cannot figure out why. I would really appreciate any help, ideas, or suggestions.

view more: next ›