Ah, that’s a nice one!
tmpod
- 3 Posts
- 56 Comments
tmpod@lemmy.ptto Technology@lemmy.world•We need to stop pretending AI is intelligentEnglish2·11 days agohttps://en.wikipedia.org/wiki/Compose_key
It’s a key that makes the next 2 or more keystrokes be dead key inserts that combineinto some character otherwise impossible to type.
In my case, my keyboard had a ≣ Menu key which I never used, so I remapped it to Compose.
tmpod@lemmy.ptto Technology@lemmy.world•We need to stop pretending AI is intelligentEnglish11·11 days agoYou’re correct, but that’s like saying along the lines of manufacturing a car is just bolting and soldering a bunch of stuff. It’s technically true to some degree, but it’s very disingenuous to make such a statement without being ironic. If you’re making these claims, you’re either incompetent or acting in bad faith.
I think there is a lot wrong with LLMs and how the public at large uses them, and even more so with how companies are developing and promoting them. But to spread misinformation and polute an already overcrowded space with junk is irresponsible at best.
tmpod@lemmy.ptto Technology@lemmy.world•We need to stop pretending AI is intelligentEnglish3·11 days agoI’ve been getting into the habit of also using em/en dashes on the computer through the Compose key. Very convenient for typing arrows, inequality and other math signs, etc. I don’t use it for ellipsis because they’re not visually clearer nor shorter to type.
tmpod@lemmy.ptto Technology@lemmy.world•We need to stop pretending AI is intelligentEnglish14·11 days agoThat is not really true. Yes, there are jump instructions being executed when you run interference on a model, but they are in no way related to the model itself. There’s no translation of weights to jumps in transformers and the underlying attention mechanisms.
I suggest reading https://en.m.wikipedia.org/wiki/Transformer_(deep_learning_architecture)
tmpod@lemmy.ptMto Privacy@lemmy.ml•Sign the petition to get proton to accept Monero for payment.1·11 days agoGood point regarding ecommerce shops, was not aware they were sold there!
This. And to add to what other commenters have said, by using Bitwarden and paying for their Premium plan (very cheap, just $10/year), even if you don’t use all their features, you’re supporting a good project. It’s critical infrastructure, I think the price is more than fair.
Either way, you should always make periodic backups from any cloud service you use, encrypted of course.
tmpod@lemmy.ptMto Privacy@lemmy.ml•Sign the petition to get proton to accept Monero for payment.1·11 days agoThis would be really neat, however it’s not trivial to sell those everywhere. If you’re lucky to live in a country or even city where they can get those to, you’re golden. If you don’t, you’re screwed.
Unfortunately, as much as I love the idea and tech behind Monero, actually accepting it is not practical at all, as the coin is used a lot for criminal stuff and is thus very strictly followed by many agencies. We don’t know if they can break it, but even they don’t, businesses can get a rough treatment just for accepting Monero. It’s perfectly understandable if they’d rather not do it.
tmpod@lemmy.ptMto Privacy@lemmy.ml•Found some Firefox forks but can't decide which one to use1·1 month agoMullvad Browser isn’t bullet proof, it will not prevent fingerprinting entirely, though it makes it less reliable, especially if it isn’t sophisticated.
tmpod@lemmy.ptMto Privacy@lemmy.ml•Oniux: Kernel-level Tor network isolation for any Linux app3·1 month agoFinally! I had tried using the clunky torsocks not long ago and wondered why there was no namespace based solution yet. Glad to see this getting released, it will help many people. Tor ❤️
tmpod@lemmy.ptMto Privacy@lemmy.ml•I made a chart to help choose a password manager. Please mind the clunkiness, I made it on mobileEnglish7·1 month agoThis is quite misleading and frankly low effort. Besides the readability issues, the chart makes a clear distinction between Proton Pass and Bitwarden when it comes to privacy, citing their privacy policy.
As it happens, however, Proton’s server code is closed, unaudited[1] and not distributed, and the apps (web, Android and iOS) do not support setting different homeservers. This effectively means you cannot self-host your password manager and must be “locked” to Proton for what I consider to be one of the most fundamental and important pieces of technology a person can use.
Bitwarden, however, has opened their official C# server, their internal Rust SDK and the apps themselves too. Furthermore, they have several guides on how to self-host your own personal server, and have implemented settings in their apps to change the homeserver. There’s even an unofficial server, vaultwarden that is even better tailored for small, personal deployments.
All this to say: the fact they may collect some usage data on their website is very insignificant for their offering, in my opinion. The real value is in providing a secure vault that only the user can manage. If you need better privacy and/or anonymity, you should use tools specialized for that anyway, instead of blindly trusting a third-party’s Privacy Policy, no matter who they are. But then again, it’s the old game of threat models.
Ultimately, Bitwarden inspires more confidence than Proton, by giving those you can and want the ability to truly own their secrets.
As far as I’m aware, there’s only this audit by Cure53, in which they performed a white-box pen test on the API, with only its documentation provided, no code whatsoever. These audits are important from a cybersecurity point of view, but security is not the same as privacy and should not be taken as such. ↩︎
Adding onto what’s already on the thread, you can try look at the newer Element Call, which is an implementation of Matrix’s native calls.
I’ve been using it a bit recently, since Jitsi seems to have stopped working reliably for me (to be frank, I’ve not put much effort into debugging it yet). It works well, but it’s still early stage, lacking some features Jitsi has. If that one works for you, I recommend you stick to it.
tmpod@lemmy.ptMto Privacy@lemmy.ml•Is there such a thing as a privacy driven credit card?2·10 months agoYeah withdraw cash from an ATM and use it. The system sucks, but it’s not trivial to change for a myriad of reasons.
tmpod@lemmy.ptMto Privacy@lemmy.ml•Is there such a thing as a privacy driven credit card?3·10 months agoThere’s no real way to do it. Unless you know someone who can trade you XMR<->cash and you somehow convince your employer to (break laws and) pay you in those forms, you can’t avoid it. At some point, you’ll have to get money on a real bank account, which requires real information to open.
tmpod@lemmy.ptMto Privacy@lemmy.ml•Is there such a thing as a privacy driven credit card?English2·10 months agoAs far as I know, modern cards don’t just send your CC info to terminals, they do some form of a cryptographic handshake (probably a pubkey signature or similar) which gets confirmed by your bank. I believe Caveman was talking more about online shopping, where you have to enter your card number, expiration date, CVC and often your name too.
tmpod@lemmy.ptMto Privacy@lemmy.ml•Is there such a thing as a privacy driven credit card?English31·10 months agoThat’s why I love virtual card systems like MB NET. You just generate a random virtual card for every purchase (or a recurring one for each subscription vendor, for example) and move on. Your bank still knows what you’re doing, of course, but vendors can’t correlate anything. Preventing your bank from knowing where you’re spending your money is much harder, for very practical reasons: fraud detection. The only real way is to use a secure crypto coin like Monero, but very few places accept it and you still have to deal with volatility.
Ah right, Molly. Have yet to tried it, but looks interesting.
I think I’m too afraid of moving my main stuff to Molly, lest I lose something :P But the UnifiedPush and multiple mobile clients is enticing.
This is a good suggestion. Docker is more mature and has more resources, so it’s better to learn the ins and outs of containers. After getting comfortable with it, you can move to Podman and have a much better time tackling its peculiarities regarding permissions and rootless.
I used Docker for years and only recently decided to give Podman a try, porting my Lemmy instance to it.
Yeah that’s a bummer. Signal has multi device support but only for desktop and iPad (yeah, not Android tablets), but you always need to have a master phone device.
It’s been an issue for so long, but this is Signal, they do whatever the f they want.
Yes! Oh my, I’m silly; that was precisely my point and I managed to mess it up 🙃
Thank you for the correction!