Off-and-on trying out an account over at @tal@oleo.cafe due to scraping bots bogging down lemmy.today to the point of near-unusability.

  • 21 Posts
  • 1.26K Comments
Joined 3 years ago
cake
Cake day: October 4th, 2023

help-circle
  • First, Peltier elements are pretty inefficient. Second, I’m dubious about the design — a Peltier element moves heat from Point A to Point B, and the whole device appears to still sit beneath the shirt. I suppose that the hot side is the outer side, but what you’d ideally want is to have hot air blowing as far away from you as possible.

    I’m skeptical that it’s better to carry a battery-powered Peltier element than to carry something like an evaporative cooler. That’s more-energy-efficient, and you don’t have the problem of part of the device getting hot.













  • “The inability to access the content of encrypted communications constitutes a major obstacle for the work of the justice system and intelligence services,” the delegation wrote, framing end-to-end encryption as a problem to be solved rather than a protection to be preserved.

    Senator Cédric Perrin, who chairs the foreign affairs committee and sits on the intelligence delegation, has been pushing this fight for over a year. During debate on a narcotrafic bill, he secured an amendment that would have forced messaging platforms to “implement the necessary technical measures in order to allow intelligence services to access the intelligible content of communications and data passing through them.”

    I mean, I can send a GPG-encrypted message over a messaging platform and you can recover it if you want even if that platform’s native encryption is backdoored, but you’re still just looking at an end-to-end encrypted message.

    $ gpg -q --quick-gen-key tal@lemmy.today
    About to create a key for:
        "tal@lemmy.today"
    
    Continue? (Y/n) y
    

    Meanwhile, elsewhere in the world:

    $ gpg -q --quick-gen-key doctor.doom@headquarters.latveria
    About to create a key for:
        "doctor.doom@headquarters.latveria"
    
    Continue? (Y/n) y
    
    $ gpg -a --export doctor.doom@headquarters.latveria >doctor-doom.public-key.asc
    

    Back at tal’s computer:

    $ gpg --import <doctor-doom.public-key.asc
    $ echo "Hey, Doctor Doom!  The time is right to initiate our secret plan!" >message.txt
    $ gpg -a -r doctor.doom@headquarters.latveria -u tal@lemmy.today -e message.txt
    $ cat message.txt.asc
    -----BEGIN PGP MESSAGE-----
    
    hF4DjahcIPqAf9cSAQdA/itkkQNubd3l6V1Rs1c00Z4zDquk9PrK1Z65VzNogzsw
    8ypbEn0B145fyyfyeAc8r72J51qJbcTXVGQkb9JWXoLMh/irZZkYrUbuaBXephsm
    0oQBqv6JgWc8kpeFKSihu69EXG/kEcHpOyCBb2nGOerHM1VzERdTdcfkgEQQYfYF
    sPXVfRxGgJbGtkoyRGDGZCEnOpGDsQSCX8I8KkUfPALAqhBSmYbAa5lg0jWNiAQL
    J4rrXGQiVCPC5Dr45KIEswddFI1oGhqZo16SgEGILcTiY4gN6yI=
    =4RyB
    -----END PGP MESSAGE-----
    

    tal sends the message to Doctor Doom over the backdoored messaging system. French intelligence watches closely. They break the platform-native encryption, but all they can see is the above text.

    On Dr. Doom’s computer:

    $ gpg -d message.txt.asc 
    gpg: encrypted with cv25519 key, ID 8DA85C20FA807FD7, created 2026-05-10
          "doctor.doom@headquarters.latveria"
    Hey, Doctor Doom!  The time is right to initiate our secret plan!
    $
    



  • You could try reducing the fan speed. That might be okay, if the hardware doesn’t actually need the cooling. If the BIOS has fan curves, go fiddle with that. If it doesn’t, dedicated fan controllers do exist.

    If the server is a standard ATX motherboard and if your rack has vertical space, you can also probably get a new ATX case of whatever sort you want, preferably taller, and get something with larger, slower fans and transplant the hardware. A lot of rack servers are vertically-cramped to let a datacenter put as many in a rack as possible, so you get stuff like 1U machines with those dinky 30mm fans. In general, the larger the fan, the less noise per airflow.

    searches

    https://www.amazon.com/RackChoice-Mini-ITX-Rackmount-Chassis-Standard/dp/B0D296DVD8

    I’ve never used that, but it’s a 3U and has three 120mm fans.

    If you don’t care about cost, there are also sound-isolated racks. These have some sort of sound-blocking material like plywood on the outside and sound-absorbing foam on the inside. I have been interested in these in the past, because I would like one, but everything I’ve seen has been absolutely obscenely-priced, probably because datacenters don’t care about noise, and few people are running racks in homes or offices. I doubt that the people that sell them get much volume.

    EDIT: Example sound-isolated rack:

    https://tripplite.eaton.com/smartrack-quiet-server-rack-18u-sound-suppression~SRQ18U


  • I’m pretty sure that most developers that use web UIs do so for portability.

    There are non-Web-based cross-platform GUI toolkits, like Java’s Swing.

    As to why cross-platform desktop toolkits haven’t really caught on…I’d say that it’s because there are things that you can’t really abstract all that well. There are ways that a well-written MacOS app should function, ways that a well-written Windows app should function, ways that a well-written GTK app should function, and so forth.

    EDIT:

    I dread writing any native GUI that I got desperate enough to try writing a TUI but that’s unbelievably worse!

    Honestly, the same is true of TUIs, too. Like, MS-DOS/Windows TUI conventions and Unix TUI conventions aren’t really the same. Like, in a typical Unix TUI program, I expect “q” probably quits. At text prompts, I expect that I probably have readline support and likely the vi/emacs key support there. It probably defaults to white-on-black. In an MS-DOS TUI program, Escape probably exits, and I’m probably using white-on-blue. I’m probably using Code Page 437 box-drawing characters.

    EDIT2: ncdu on Unix:

    WordPerfect for DOS:


  • I don’t think I’d say “inevitable”. Possible, maybe.

    https://en.wikipedia.org/wiki/Splinternet

    The splinternet (also referred to as cyber-balkanization or internet balkanization) is a characterization of the Internet as splintering and dividing due to various factors, such as technology, commerce, politics, nationalism, religion, and divergent national interests. “Powerful forces are threatening to balkanise it”, wrote the Economist weekly in 2010, arguing it could soon splinter along geographic and commercial boundaries.[1] The Chinese government erected the “Great Firewall” for political reasons, and Russia has enacted the Sovereign Internet Law that allows it to partition itself from the rest of the Internet.[2][3] Other nations, such as the US and Australia, have discussed plans to create a similar firewall to block child pornography or weapon-making instructions.[1]

    Clyde Wayne Crews, a researcher at the Cato Institute, first used the term in 2001 to describe his concept of “parallel Internets that would be run as distinct, private, and autonomous universes.”[4] The concept itself dates back at least to pair of articles in the journal Science and at the International Conference on Information Systems by Marshall van Alstyne and Erik Brynjolfsson in 1996 and 1997.[5][6] They argued that it the Internet and related technologies “have the potential to fragment interaction and divide groups by leading people to spend more time on special interests and by screening out less preferred contact.” They dubbed this effect “cyberbalkanization” and developed a set of formal measures.[7]

    Crews used the term in a positive sense, but more recent writers, like Scott Malcomson, a fellow in New America’s International Security program, use the term pejoratively to describe a growing threat to the internet’s status as a globe-spanning network of networks.[8]



  • One other note: One of the first conversations on here I had was when Ada, the lemmy.blahaj.zone admin, was talking to some gay guy in some Middle Eastern country where content related to homosexuality were banned. The lemmy.blahaj.zone instance was blocked at his country’s network, but he could view the text content from any other home instance (since any accessible home instance on the Threadiverse itself intrinsically basically acts as a proxy for the content on other instances). I remember pointing out that he could tunnel via SSH. His problem was that he couldn’t view images, since the images were hosted on the lemmy.blahaj.zone server, but these days, some lemmy home instances (including my home instance, lemmy.today) automatically locally proxy images posted elsewhere to hide the IP address of their users, so he wouldn’t even have that problem now.