☆ Yσɠƚԋσʂ ☆

  • 1.37K Posts
  • 1.21K Comments
Joined 6 years ago
cake
Cake day: January 18th, 2020

help-circle


  • It’s not an apples to apples comparison because the architecture is so different. Notice his observation in the article:

    I am very impressed with how smooth and problem-free Asahi Linux is. It is incredibly responsive and feels even smoother than my Arch Linux desktop with a 16 core AMD Ryzen 7945HX and 64GB of RAM.

    M1 architecture has a huge advantage being a SoC and having shared memory between the CPU and the GPU which avoids the need for a bus. I’m still using M1 macbook with 8gb of RAM that I got to keep at one of my jobs a few years ago, and it’s incredibly snappy. I’ve tried x86 laptops with way better specs on paper, and they don’t come anywhere close in practice.





















  • People are a product of the system they live under. We can look at the collapse of USSR as a concrete example here. All the same people who used to be productive members of society under the Soviet system became oligarchs once niches for exploitation opened up after the transition to capitalism. It’s a systemic problem, not an individual one. That’s what she’s saying when she says you hate the material conditions.










  • Metadata tracking should be very concerning to anyone who cares about privacy because it inherently builds a social graph. The server operators, or anyone who gets that data, can see a map of who is talking to whom. The content is secure, but the connections are not.

    Being able to map out a network of relations is incredibly valuable. An intelligence agency can take the map of connections and overlay it with all the other data they vacuum up from other sources, such as location data, purchase histories, social media activity. If you become a “person of interest” for any reason, they instantly have your entire social circle mapped out.

    Worse, the act of seeking out encrypted communication is itself a red flag. It’s a perfect filter: “Show me everyone paranoid enough to use crypto.” You’re basically raising your hand. So, in a twisted way, tools for private conversations that share their metadata with third parties, are perfect machines for mapping associations and identifying targets such as political dissidents.