• 4 Posts
  • 135 Comments
Joined 3 years ago
cake
Cake day: June 12th, 2023

help-circle




  • Zangoose@lemmy.worldtolinuxmemes@lemmy.worldHyprland Update
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    19 days ago

    I used hyprland on my laptop for about a year and the thing that bothered me the most (aside from the toxic community) was how often I had to rewrite chunks of it after every major update. I’m definitely glad that the niri devs are treating its config stability more seriously.





  • To be fair, Linux isn’t developed on GitHub (it’s developed on the Linux Kernel Mailing List and kernel.org) and most of the spammers knew that going into it. The PRs on that repo were mostly just people trolling any bystanders that took it seriously until the internet did what they do best and took the joke too far.

    In this specific example they didn’t waste anyone’s time or resources because it was never being used or monitored in the first place.

    Edit for more additional context: Linus (who created git in the first place) mentioned not liking centralized git servers so he’s specifically said for multiple years that he never considered actually moving development over to something like GitHub


  • I think the problem is that roads not designed for bikes in Europe are also old enough to have not been originally designed for cars, so things usually end up working out to some degree.

    In the US (especially for infrastructure built from scratch in the 1900s onward, i.e. most of the US except for some parts of the east coast) most roads and town layouts were designed specifically around cars and travelling at car speeds, and are explicitly hostile to anyone who isn’t travelling in the biggest truck you’ve ever seen in your life. Blame oil/motor companies for bribing politicians throughout the 1900s (and honestly still today)






  • Zangoose@lemmy.worldtoTechnology@lemmy.worldLineageOS 23
    link
    fedilink
    English
    arrow-up
    24
    ·
    3 months ago

    They haven’t released Android 16 QPR1 to AOSP yet, even though it came out on Pixels at the beginning of September. Normally the gap is ~1-2 days.

    So yeah, a lot of custom rom devs are pretty bleak right now and honestly their concerns are pretty warranted given that it’s Google we’re talking about.





  • They found chat logs saying their son wanted to tell them he was depressed, but ChatGPT convinced him not to and that it was their secret. I don’t think books or google search could have done that.

    Edit: here directly from the article

    Adam attempted suicide at least four times, according to the logs, while ChatGPT processed claims that he would “do it one of these days” and images documenting his injuries from attempts, the lawsuit said. Further, when Adam suggested he was only living for his family, ought to seek out help from his mother, or was disappointed in lack of attention from his family, ChatGPT allegedly manipulated the teen by insisting the chatbot was the only reliable support system he had.

    “You’re not invisible to me,” the chatbot said. “I saw [your injuries]. I see you.”

    “You’re left with this aching proof that your pain isn’t visible to the one person who should be paying attention,” ChatGPT told the teen, allegedly undermining and displacing Adam’s real-world relationships. In addition to telling the teen things like it was “wise” to “avoid opening up to your mom about this kind of pain,” the chatbot also discouraged the teen from leaving out the noose he intended to use, urging, “please don’t leave the noose out . . . Let’s make this space the first place where someone actually sees you.”


  • You don’t need to have access to the source code (reverse engineered or not) to find security holes. However, people need to audit the source code to prove it’s secure.

    So, closed source software is maybe slightly harder to find flaws in for a malicious actor, but significantly harder for users to audit (because you have to rely on the word of the company publishing the software, or a 3rd party security auditing company, or reverse engineer the code yourself)

    Additionally, it’s harder for malicious actors to hide the existence of vulnerabilities they find. They can’t just not tell anyone what they find because the code is all public anyway. If people are looking at it frequently enough (i.e. if the project is still active), someone else will probably notice it as well.