Posts
-
I have made one (1) OH-post with a funny CW combination@mwk it was an excellent post and thread, a genuine "this could only happen on fedi" moment -
It feels suboptimal that each fedi service requires a different account.@neil one account for everything is exactly how activitypub is *supposed* to work.
Then everyone ignored the client to server API and did their own things -
I cannot believe this completely unsupported fan-made utility from 1997 is failing to work on modern windows@foone I don't know of any RWB documentation
But RWX: https://wiki.activeworlds.com/index.php?title=Renderware -
Good morning Fediverse.@jenniferplusplus @trwnh @helge well even if this one did getting a m.s account should be scraper action #1 -
would it be possible to have the dynamic linker handle struct field offsets as relocations so you could keep things abi-stable without using opaque pointers and function calls?@easrng generally we try not to have relocations in code these days -
Good morning Fediverse.@jenniferplusplus @trwnh @helge if you follow a mastodon.social user it'll appear in m.s' /api/v1/instances/ where the scrapers will find it -
would it be possible to have the dynamic linker handle struct field offsets as relocations so you could keep things abi-stable without using opaque pointers and function calls?@easrng oh hey it's basically the Objective-C non fragile ABI -
Good morning Fediverse. -
she rlwinm on my immediate til i branch unconditionally [incredibly loud instruction-TLB miss] -
Sharkey-touching mutuals, weird question for y'all: do you know of any reason that a new Sharkey instance would federate with *key and Akkoma instances without issue, but fail for every Mastodon instance?@puppygirlhornypost2 @SymTrkl @becomethewaifu @julia @natty (and WireGuard could have been a simple handshake protocol which then shoves key material into the kernel over the Linux
xfrm
interface and the result would have been equally secure, more functional, much faster, and already offloaded on a surprising amout of networking hardware) -
Sharkey-touching mutuals, weird question for y'all: do you know of any reason that a new Sharkey instance would federate with *key and Akkoma instances without issue, but fail for every Mastodon instance?@puppygirlhornypost2 @natty @SymTrkl @becomethewaifu @julia there exist other, significantly higher performance options with less stupid foodguns like “we ignore all ICMP packets received from the other end” VPN options
Like IPsec, which has its own problems but not these stupid assinine ones.
-
Sharkey-touching mutuals, weird question for y'all: do you know of any reason that a new Sharkey instance would federate with *key and Akkoma instances without issue, but fail for every Mastodon instance?@becomethewaifu @puppygirlhornypost2 @natty @SymTrkl @julia Wireguard: It’s just not that good, actually.
-
Weekend project: WebAuthn support for typage, to symmetrically encrypt age files with passkeys and FIDO2 tokens, using the prf extension.@filippo The PRF extension saddens me so much because its so close yet so far. If it handed over the PRF secret at enrollment time it would be perfect for so many things. Alas
But it does work for local entirely local encryption tasks like this.
-
I never really paid attention to how AWS4 authorization signatures worked before, but realising they’re basically a limited subset of Macaroons is very neat.@unlobito even then its very neat that if things let me do so I could just mint daily credentials to limit risk.
-
I never really paid attention to how AWS4 authorization signatures worked before, but realising they’re basically a limited subset of Macaroons is very neat.I never really paid attention to how AWS4 authorization signatures worked before, but realising they’re basically a limited subset of Macaroons is very neat.
Knowing how the construction works I’m also now very disappointed that basically no software I use lets me pass in “today’s secret key for the S3 service in us-east1” instead of the valid for all time access key secret.
-
Love too see viral posts go past on my timeline that don’t even pass trivial scrutiny:Anyway prior to the existence of Credit Reference Agencies the primary way eligibility for debt (e.g. mortgages) was decided was “your bank manager’s opinion of you (supported by various facts he has on you)” and humans are a lot more inherently racist, sexist and classist than modern credit scoring algorithms (where people spend an awful a lot of time worrying “is this factor I have encoded into my algorithm accidentally race or gender?”)
-
Love too see viral posts go past on my timeline that don’t even pass trivial scrutiny:Love too see viral posts go past on my timeline that don’t even pass trivial scrutiny:
From the opening paragraphs of the Equifax Wikipedia page:
Equifax was founded as the Retail Credit Company by Cator and Guy Woolford in Atlanta, Georgia, as Retail Credit Company in 1899. By 1920, the company had offices throughout the United States and Canada. By the 1960s, Retail Credit Company was one of the nation’s largest credit bureaus, holding files on millions of American and Canadian citizens
(Maybe the “credit score” is newer? But the credit score is an abstraction to give you an insight on what your credit file says, nothing more)
Overdraft fees meanwhile are basically as old as the cheque.
RE: https://mastodon.social/@MEActNOW/113789371626213991 -
wow, TrueNAS SCALE moving from jails to docker/k8s is such a hot mess.@gsuberland eh I much prefer the “run an ingress and give things hostnames” approach to assigning each service an IP even if it has an additional moving part
But also what you want is something they could easily offer on k8s with some careful CNI config.
-
wow, TrueNAS SCALE moving from jails to docker/k8s is such a hot mess.@gsuberland Given they’re running k8s I’d expect them to just run an ingress e.g. Traefik and create ingress rules so you can have nice hostnames >_>
-
wow, TrueNAS SCALE moving from jails to docker/k8s is such a hot mess.@gsuberland heck k8s is an incredibly flexible flexible system with many options but one thing you can rely on is that every Pod will have a unique IPv4 or IPv6 address (potentially both)