

I’ve eventually switched from NameCheap to Cloudfare, because they kept drastically raising my email domain price.
Cloudfare is one of the few (not sure if the only one) who has guaranteed wholesale prices (as in, the prices set by the tld owner), with nothing added on top. I moved my domain over, and I saved around 15$ a month.
The best thing to do is buy a domain in some other registrar, like NameCheap, because they will give you the domain for cheaper than wholesale (and then raise your price by a lot in the next few years, way above wholesale). So I just buy it cheap, and once the next renewal is higher than wholesale, I move it over to Cloudfare and keep it there.


This is a really good point.
This post is a great example of what will skipping a research and just trusting the first solution you find lead to.
When you are researching the thing yourself, you usually don’t find the solution immediately. And if you immediately have something that seems to work, you’re even less likely to give up on that idea.
However, even taking this into account (because the same can probably happen even if you do research the thing yourself - jumping to a first solution), I don’t understand how it’s possible that the post doesn’t make a single mention of any remote desktop protocols. I’m struggling to figure out how would you have to phrase your questions/promts/research so that VNC/RDP, you know - the tools made for exactly the problem they are trying to solve - does not comes up even once during your development.
Like, every single search I’ve tried about this problem has immediately led me to RDP/VNC. The only way how I can see the ignorance displayed in the post is that they ignored it on purpose - lacking any real knowledge about the problem they are trying to solve, they simply jumped to “we’ll have a 60 FPS HD stream!”, and their problem statement never was “how to do low-bandwith remote desktop/video sharing”, but “how to stream 60 FPS low-latency desktop”.
It’s mindboggling. I’d love to see the thought and development process that was behind this abomination.


Uh, I’m pretty damn sure I have seen an office with hundreds of people, all connected remotely to workstations, on enterprise network, without any of the problems they are talking about. I’ve worked remotely from a coffee shop Wifi without any lag or issues. What the hell are they going on about? Have they never heard about VNC or RDP?
But our WebSocket streaming layer sits on top of the Moonlight protocol
Oh. I mean, I’m sitting on my own Wifi, one wall between me with a laptop (it is 10 years old, though) and my computer running Sunshite/Moonlight stream, and I run into issues pretty often even on 30FPS stream. It’s made for super low-latency game streaming, that’s expected. It’s extremely wrong tool for the job.
We’re building Helix, an AI platform where autonomous coding agents…
Oh. So that’s why.
Lol.


It’s IMO pretty clear that the purpose of the rule is to rule out AI slop and games that cheapened on artists and replaced them by genAI., which I extremely agree with.
Expeditin is neither. It feels like an (succesful) PR stunt by a lesser known award show not many people knew about.


While there’s no doubt that they have technically break the rules, just the fact that they afaik patched the few textures before this controversy (as far as I know, it’s possible that it was a reaction to this?), this simply sounds like a (very succesful) PR attempt by Indie Game Awards.
There’s no doubt that Clair Obscire isn’t a AI slop that cheapened on artists or art with GenAI, whis is the spirit of the rules IGA has. If you don’t take the rules literaly, they deserve the award. And that’s IMO important.
I’ve never heard about IGA before this, so it worked to draw attention to them.
I’m very OK with having rules in place to reject work where you replaced artists with AI. But this is not the case.
Is there any OS that allows this config?
At least with Linux, if I encrypt my hard drive, I have to enter my encryption password on every login, for some even during boot.
Not sure about Windows. I wpuldn’t be surprised if you can have bitdefender on with auto login.


This holds true for any kind of secure communication you want to do.
Manually handling keys and encryption with GPG is the core of good opsec, and also a reason why 99% of “crime prevention” backdoors are probably not going to do much. But people are lazy, been a while since I saw a drug dealer hand out public GPG keys, ever since Telegram and the like got popular.


And a thermostat for AC is an agentic AI.
I was just looking where to donate to them. The chads aren’t even accepting donations.


Unless I’m mistaken, this mostly depends on software/os you install.
A RPI with OpenWRT will be secured in exactly the same way as a router with OpenWRT and a laptop with OpenWRT. (At least I think so, I vaguely remember hearing about some Intel CPU vulnerabilities, but I don’t think there’s anything remote).
Power draw will be the main problem, along with more limited range because of the strength of the WiFi card.


I’m kind of interested how will it go, especially further development and their issue handling.
It doesn’t do anything I need, though.


I’m used to just sitting to pee, exactly for this reason, but there’s a rare case where I give up and pee standing, i.e when I’m already dressed and it’s way easier, where I used to risk it and pee standing.
I stopped doing that even in those rare cases when we’ve gotten the blood/horror bathroom mat, something like this, but not branded and from what I presume is the original source (Aliexpress).
It’s horrifying when you see the mess you’re making, even if you really try not to.


Some of this may come as news to a lot of the machine learning community
Does it? I only have pretty basic knowledge in the ML field, from like two courses during my Masters in gamedev around 8 years ago, and I though that it’s a basic fact of most of the ML algorithms, that simply throwing more data at it won’t get it “smarter”, as in from the basic understanding of how ML works, it’s pretty apparent that you can’t get anything like an AGI with the current algorithms.
You’re basically just approximating a function (which is my understanding of what ML does) of what’s the next word based on previous senteces, your dataset. It kind of makes sense it would converge into absolute mediocrity (not even mediocity, because a lot of data in the datasets is very probably wrong), and not be able to come up with new things.
But, we’ve never really learned about transformers, since that tech wasn’t yet part of our syllabus, so I might be wrong/overly simplyfing things.


First time I’m seeing this, and I have to say I admire their dedication to the joke.
Zombo.com is a single-serving site created in 1999…
…
The site was initially a Flash animation, but as of 5 January 2021, it switched to HTML5 due to the discontinuation of Adobe Flash Player.


This is the time to bring out a mask and start vandalizing.
Might be difficult in the UK though, with so much camera’s around. I’ve always wondered how feasible would it be, assuming you get lucky and don’t get caught during the act, to make sure that you can’t be found by cameras alone.
A good mask, desposable clothes, hat to hide your hair, and make sure to change somewhere with multiple entrances into a larger area without cameras? In this hypothtical scenario, I guess the most difficult thing would be to have a place where to change without it being connectable to you, i.e not a tunnel where they can check people entering and leaving and look for who’s only leaving.
It would have to be a pretty large area that’s populated and traversed by a lot of people, has as much entrances and exits as possible but also has places where you can discreetly change. I’m guessing something like a park, or a forest. Maybe a train, assuming it doesn’t have cameras on board. If it’s long distance/lot of stops, enumerating people who get in and out would be extremely tedious, plus it does have a place to discretely change. Bonus points for having a burner phone with you the whole time, that you then leave on the train/throw out at a random stop.
A in-depth enough investigation could probably track you down, but the more entrances and exits/people traveling through, the higher chance an investigation into a minor vandalism would give up. But making it work for some more serious act, where a very in-depth investigation will take place, will probbly be almost impossible. But that’s not what I’m interrested in anyway.
I’m sure there are anarchist zines about this kind of thing, it looks like it might be usefull pretty soon.


I hope this will bacfire heavily and shuts down their tourist industry.
I’ve had a few people around me who were to US, or planned to go. All of them has lost all desire to do so. I can’t imagine why would anyone who doesn’t have to (i.e for work, and even then I’d really reconsider it) volunteraly go to US at this point, for a vacation of all things.


What the fuck. There were only few reasons why I wanted to maybe someday visit the US (Burning Man and Defcon), but fuck that. I’m glad I don’t have to travel there for work, and if I had to, I’d rather find a new job.
I hope employers in the EU will be reasonable and not send their people to this hell-hole, and that a lot of events will consider moving to Europe, especially things like Defcon. I can’t imagine how would any abroad attendee of Defcon be willing to go through this.
Each visitor would also be required to submit what CBP calls “High Value Data Elements”. According to the notice:
The high value data fields include:
a. Telephone numbers used in the last five years;
b. Email addresses used in the last ten years;
c. IP addresses and metadata from electronically submitted photos;
d. Family member names (parents, spouse, siblings, children);
e. Family number telephone numbers used in the last five years;
f. Family member dates of birth;
g. Family member places of birth;
h. Family member residencies;
i. Biometrics—face, fingerprint, DNA, and iris;
j. Business telephone numbers used in the last five years;
k. Business email addresses used in the last ten years.


If you aren’t already using it, https://vencord.dev/ is a good Discord client mod that lets you get rid of some of the annoying features.
Might be against ToS, but so far I don’t think people had any issues with it.
Another option (that I use when I don’t need voice) is having your own Matrix server with Discord bridge. With double puppeting it can bridge both servers and DMs, and post in your name (without needing a bot on the server).
Link, for most of the people in this thread surprised that Proton does what it’s pretty clear in saying they’ll do.
And people getting into trouble for using proton for stuff they are saying not to do.
https://proton.me/blog/protonmail-threat-model