Majestic

joined 1 year ago
[–] Majestic@lemmy.ml 4 points 1 month ago

It doesn't fucking censor swear words. You can say shit and ass and damn. It censors slurs and offensive terms to historically marginalized groups only. It's just some of them are still so prevalent in our language that people take umbrage to this.

[–] Majestic@lemmy.ml 6 points 1 month ago* (last edited 1 month ago)

You need to make sure when you rip the film that you grab all English subtitle tracks. Use mediainfo to find the smallest one with least elements and that tends to be the forced/translation track. Some people when initially ripping choose to burn those particular subs and those alone into the video. Others just put them in an MKV container with the full subs and mark them as forced with the flag editor. And others don't rip them at all.

That said, if for some reason your copy didn't have such a track, it's possible that the particular forced/translation subtitles had some special marker or something that the BD disc or DVD read and tended to force on and use only those subs. In fact looking at options for exporting PGS visual image subtitles in subtitle edit there is an option to mark individual lines of subtitles as forced so that's a thing but I'm not sure any players or software currently supports it as all software I'm aware of tends to just look for whether a track is marked as forced or default and then use it or not depending on user preferences.

If you can't find good subtitles by themselves you could always acquire ('arr) another copy of the full movie and just grab the subs from that and mux them into your file. Again looking for forced flagged/named subs or else ones with less than half the elements of the other sub files.

[–] Majestic@lemmy.ml 16 points 1 month ago

The problem with this is you just know after they pass it they'll amend it to expand the definition from social media platforms to any platform of a certain size on the internet. Suddenly the whole internet is subject to censorship, review, lawsuits, banning encryption, age-gating and ID demands.

This is just a foot in the door move around kids to get the framework in then later change it to do all the stuff they really want to do like censor and chill speech, clamp down on encryption, mandate log-keeping for VPNs, implement age-gating that requires submitting IDs for anything even vaguely adult, etc, etc. In other words the beginning of an all-out attack on the open internet.

[–] Majestic@lemmy.ml 5 points 1 month ago (1 children)

“Killing Hope” was written by former intelligence officer Bill Blum (think that was the name) and details such operations (though not limited to socialist countries).

I’ll try to find some links on the subject and edit my reply to include them but it may be a day or two.

[–] Majestic@lemmy.ml 22 points 1 month ago (13 children)

No one but genocide loving zionists wants to hear the lying screeds of a genocidal, racist, apartheid regime. I care as much to read that as a copy of the latest "Jewish crimes" written by Nazi magazines in the 1930s.

[–] Majestic@lemmy.ml 16 points 1 month ago* (last edited 1 month ago) (3 children)

All the big pirate sites use them though. Even private ones like TL. If they don’t they get DDOSed. They all turned it on over the past year or so after being badly attacked.

[–] Majestic@lemmy.ml 2 points 1 month ago

Lot of cope and denial in these threads. Yes the same-day is probably a rosy estimate based off people using 6 digit codes or something easy to crack, doesn't mean it's false or that they can't hypothetically target longer alpha-numeric passwords. For all we know they might not even be brute-forcing and could be conducting some sort of exploit that over time reveals the encryption keys themselves in some way.

I'm still very curious about the nature of the mechanisms of action. I assume they manage to bypass the basic lock-out against entering too many passcodes too quickly somehow which is what enables this. If throttling could be properly enforced (to say nothing of something like 10 attempts and it refuses all future attempts and erases the key type of thing) this type of attack wouldn't be practical for anyone using anything above a 6 digit numerical passcode in any reasonable timeframe. I wonder if they exploit wireless radios including cellular, wifi, bluetooth and force some code on the phones via these usually-on chips that enables this via exploiting problems in their architecture. Perhaps something that locks up, prevents functioning or resets certain checks via flooding parts of the hardware/software from these points of access. Or if it really is purely phy/log access to the lightning/usb-c port.

[–] Majestic@lemmy.ml 4 points 2 months ago

Still do. Aid bills regularly include billions for the zionist colony on stolen Palestinian land, mostly to be used to purchase American weapons systems. So we give them money that they mostly use to enrich US arms manufacturers who donate to domestic political campaigns and call that foreign aid. This has been going on for decades. It's not a new thing but something so regular it doesn't even get mentioned most years.

[–] Majestic@lemmy.ml 1 points 2 months ago (1 children)

I mean combined with any kind of function, even a trivial kind. A salt derived from some machine state data (a random install id generated on install, a hash of computer name, etc) plus a rot13 or something would still be better than leaving it plaintext.

[–] Majestic@lemmy.ml 1 points 2 months ago* (last edited 2 months ago)

Politely agree to disagree and I'll elaborate. Thanks for your input.

LTH are all marked as such. MABL normal (non LTH) discs such as verbatim sells for less than half the cost of M-Discs have the same physical properties as M-Discs, the protective layers are the same, the recording methods are the same using the same materials. Therefore the longevity is the same or near the same without getting into M-Disc's ridiculous marketing claims of 1000 years (when NIST and others agree the poly-acrylic protective layer would degrade and decompose after a century or two at most even in ideal circumstances).

/r/Datahoarder has had this argument several times and the consensus so far seems to comes out to the fact that M-Discs were a DVD-era innovation that in the BD era offer no meaningful advantages in technologies.

I'd rather have two BD's from a reputable company like Verbatim (not fly by night plain white discount bulk BD's from who knows where) from separate batches bought 6 months apart stored properly than rely on one overly expensive M-Disc that isn't going to last any longer and probably isn't made to meaningfully tighter tolerances.

NIST only estimates the lifetime of M-Discs, real world abuse tests on BD's (non LTH, should have mentioned that to be honest) show good endurance that far exceeds DVDs. It comes down to however burning it right and storing it right. A pile of M-Disc left in a window in your uninsulated garage year after year and burned at 16x are not on the whole going to be in a better state in 20 years than a pile of BD-R's burned at 4x, stored in protective sleeves in a case in a temperature controlled, insulated environment. Add in having a back-up copy and the chances of total data failure on both primary and backup disc and you're looking at better survivability. NIST numbers generally assume things like storage in archival quality environments such as old salt mines which are a controlled environment, low humidity, neither excessively hot or cool and not subject to shifts in temperature. Most people can't store things in an environment like that and those who can usually have the finances for a better solution like multiple tape copies and/or continually updating and refreshing hashed/checksumed files and moving on a schedule to new better storage mediums (e.g. keeping files in a raid array in a plugged in NAS, checking for failures regularly, replacing disks and upgrading disks every 5-10 years one at a time).

I wouldn't trust any media not professionally stored in a purpose-built archival environment and with at least two copies to last more than 25 years without degradation or loss. Anyone trying to store stuff really long-term and cannot afford degradation or loss needs to have a plan to update their archival copies every 15 years or at least do an assessment that often and survey the options as well as the physical and ideally logical state of their chosen back-ups.

[–] Majestic@lemmy.ml 3 points 2 months ago

If the computers have any value it would be better to just buy a new quality modern ATX power supply of the right size for the case (take dimensions for fit and ensure it's at least as many watts as the old one though it can be more) and do a drop-in replacement. Just make sure the power supply comes with some molex adapters and the maker usually sells additional cables if it's a semi or fully modular design so you could buy more molex plugs if the 3-8 they give you aren't enough.

That said power supplies can of course be repaired by anyone with soldering skills and sufficient electrical engineering knowledge and experience. They shouldn't be repaired by amateurs because they can store enough power to kill or maim a person who doesn't know what they're doing. It would be cheaper though to just replace the power supplies unless having all original/period equipment in the machines is important.

[–] Majestic@lemmy.ml 7 points 2 months ago

Yes but the real risk there is likely from individuals trying to dox you who can notice the obvious pattern and put 2 and 2 together to link things and build a profile.

view more: ‹ prev next ›