Last year I wasted 1.3 bln, by accidentally starting the construction of a dyson sphere
- 8 Posts
- 180 Comments
jim3692to Technology@lemmy.world•Doctors are using unapproved AI software to record patient meetings, investigation revealsEnglish1512·6 days agoYour therapist can’t even have a phone in the room?
I would prefer my psychological issues to not be turned into marketing campaigns. If you still don’t understand what I am talking about, you should probably check the Privacy Policy of Google and Meta.
To save you some time: Google and Meta are monitoring the conversations using the device’s microphone, to better understand what products you may be interested in. You have noticed, that ads are often related to the topics that you discuss face to face.
jim3692to Technology@lemmy.world•Doctors are using unapproved AI software to record patient meetings, investigation revealsEnglish296·6 days agoI had visited an ophthalmologist who used Apple Notes to keep track of his patients. He had no idea about the privacy implications of his choices.
However, my most nerve racking experience was talking to my therapist, while their stock Android was right next to them. Even when I mentioned my privacy concerns, they didn’t bother to get rid of it.
I use private, because I am a tab hoarder
Sorry for your “| || || |_”
jim3692to Privacy@lemmy.ml•‘It’s terrifying’: WhatsApp AI helper mistakenly shares user’s number68·10 days agoIt was the last remaining exam before my deletion from university. I wish I could attend the lectures, but, due to work, it was impossible. Also, my degree is not fully related to my work field. I work as a software developer, and my degree is about electronics engineering. I just need a degree to get promoted.
jim3692to Privacy@lemmy.ml•‘It’s terrifying’: WhatsApp AI helper mistakenly shares user’s number95·12 days agoWhat models have you tried? I used local Llama 3.1 to help me with university math.
It seemed capable of solving differential equations and doing LaPlace transform. It did some mistakes during the calculations, like a math professor in a hurry.
What I found best, was getting a solution from Llama, and validating each step using WolframAlpha.
jim3692to Greece@fedia.io•Τι συνδρομές έχετε ενεργές; Ποια θα ήταν η τελευταία που θα διακόπτατε;5·12 days agoTuta Mail, Bitwarden, Mullvad VPN, Spotify Family
Θα ήθελα πάρα πολύ να αφήσω το Spotify, αλλά το Hyperpipe χρειάζεται αρκετή δουλειά.
Τα άλλα 3 ίσως τα έκλεινα και πήγαινα σε Proton, αλλά όχι στο άμεσο μέλλον.
jim3692to Mildly Infuriating@lemmy.world•A country run by terrorists is paying YouTube to show me propagandaEnglish11·13 days agoI don’t think they care about the budget. They probably care more about impressions and clicks. So, just use an adblocker, to lower their ad impressions.
Sure, in many cases the dev’s computer is powerful enough to handle that.
However:
- The more the dependencies, the more likely it is to pull-off a supply chain attack. Any of those thousands modules can be compromised and infect either the user or the developer.
- Not all computers are optimized for working with so many tiny files. Have you ever worked in a company that uses McAfee Antivirus? Even Defender can be a massive performance hit in some cases.
I had read about it on another thread, which was about using old smartphones as servers (they used Termux).
Those old lithium batteries, although sometimes seemingly healthy, can catch fire any time. Having them connected to the charger 24/7 is only making matters worse.
I wouldn’t trust the battery of old devices. I would probably buy a used UPS (without battery) and slap a new battery to it. This would cost more, but it would allow me to also connect other important devices to it - like the router and some lights.
I have a Wyse 5010. Be careful with your SSD plans. Mine had an mSATA SSD. Luckily, after removing the chassis of a SATA SSD, and only keeping the board, it could fit in there.
jim3692to Technology@lemmy.world•A 3-tonne, $1.5 billion satellite to watch Earth’s every move is set to launch this weekEnglish14·15 days agoDon’t such satellites have a major flaw, that they revolve? Considering that earth is spherical, those satellites can only monitor some half of the earth each moment, given their sensors have such high FOV.
I feel the importance of user privileges distinction, as I see it from a server perspective and organization managed devices. Some would argue the insignificance of this in the personal desktops.
However, I believe that the community structure of Linux is benefiting everyone. It is a general purpose kernel, that gets improvements from various different sectors. In the current space, where most servers run Linux and most desktops run Windows, desktops are not benefiting from filesystem or scheduling optimizations implemented for servers.
I had a look at Haiku some months ago. Its single user architecture is an interesting choice. I mean, you don’t need to worry about privilege escalation exploits, if you are always fully privileged /s
jim3692to Fediverse@lemmy.world•Bonfire & Guix, a love story -- fishinthecalculatorEnglish2·15 days agoIt’s the first time I see the concept of bootstrappability in the context of security.
Is it really worth the effort?
There are multiple ways to run a supply chain attack. With bootstrappability, one can be sure that the compiler is trusted, but what about the code that the compiler compiles? There was this recent attack to XZ utils, which shows that more attention is needed on the code being merged and compiled.
I think that this just creates a false sense of security.
Contrary to that, I had read about a BSD team (I think FreeBSD) that reviews all the code before each release. This way they have achieved ~5 RCE exploits throughout their entire history.
jim3692to Fediverse@lemmy.world•Bonfire & Guix, a love story -- fishinthecalculatorEnglish2·15 days agoI don’t have any experience with guix, so I will not express any opinions towards that.
However, regarding NixOS:
- Yes, as a person with experience in the Nix language, I can confirm it’s awful
- The documentation of NixOS is a known issue, and there are currently efforts to improve it
- Talking about the trustability of binaries, by doing a quick search, I read that Guix builds are reproducible. This is true for NixOS as well. All upstreamed packages must have their version and the hash of the code (or artifact), to allow verification
- The community of NixOS is opting to maintaining flakes, because:
- Some applications can simply not be built following the Nix guidelines. Examples are some electron apps (like Falkor) and apps that have weird toolchains (like bubblejail)
- The reviewing process takes way too long, and PRs for upstreaming are often ignored. This forces a lot of people to just PR a flake.nix to the application, or maintain their own overlays (overlays are like overriding the available packages, while flakes are more like distributing Nix code in general)
Unless you run a custom ROM, like LineageOS or GrapheneOS, you most probably have some Meta apps installed at system level.
This is Meta Services, as a system app which can only be disabled, on my work Samsung.