[-] [email protected] 16 points 18 hours ago

If your computer is compromised to the point someone can read the key, read words 2-5 again.

This is FUD. Even if Signal encrypted the local data, at the point someone can run a process on your system, there's nothing to stop the attacker from adding a modified version of the Signal app, updating your path, shortcuts, etc to point to the malicious version, and waiting for you to supply the pin/password. They can siphon the data off then.

Anyone with actual need for concern should probably only be using their phone anyway, because it cuts your attack surface by half (more than half if you have multiple computers), and you can expect to be in possession/control of your phone at all times, vs a computer that is often left unattended.

[-] [email protected] 6 points 2 days ago

it doesn't unravel the underlying complexity of what it does... these alternative syntaxes tend to make some easy cases easy, but they have no idea what to do with more complicated cases

This can be said of any higher-level language, or API. There is always a cost to abstraction. Binary -> Assembly -> C -> Python. As you go up that chain, many things get easier, but some things become impossible. You always have the option to drop down, though, and these regex tools are no different. Software development, sysops, devops, etc are full of compromises like this.

15
submitted 2 weeks ago by [email protected] to c/[email protected]

cross-posted from: https://lemmy.ml/post/17020181

Introducing a new RISC-V Mainboard from DeepComputing

8
submitted 2 weeks ago by [email protected] to c/[email protected]
[-] [email protected] 29 points 3 weeks ago

This is not entirely correct. Messages are stored on their servers temporarily (last I saw, for up to 30 days), so that even if your device is offline for a while, you still get all your messages.

In theory, you could have messages waiting in your queue for device A, when you add device B, but device B will still not get the messages, even though the encrypted message is still on their servers.

This is because messages are encrypted per device, rather than per user. So if you have a friend who uses a phone and computer, and you also use a phone and computer, the client sending the message encrypts it three times, and sends each encrypted copy to the server. Each client then pulls its copy, and decrypts it. If a device does not exist when the message is encrypted and sent, it is never encrypted for that device, so that new device cannot pull the message down and decrypt it.

For more details: https://signal.org/docs/specifications/sesame/

14
submitted 3 weeks ago by [email protected] to c/[email protected]

A good video to share with those who refuse to leave their bubble.

[-] [email protected] 29 points 1 month ago

This kind of reminds me of Crispin Glover, from Back to the Future. He tried to negotiate a higher pay for the second movie, so the producers hired a different actor to play the role, but deliberately made the actor up to look like Glover. In response, Glover sued the producers and won. It set a critical precedent for Hollywood, about using someone's likeness without consent.

The article mentions they reached out to her two days before the launch - if she had said 'OK,' there's no way they could have even recorded what they needed from her, let alone trained the model in time for the presentation. So they must have had a Scarlett Johansson voice ready to go. Other than training the model on movies (really not ideal for a high quality voice model), how would they have gotten the recordings they needed?

If they hired a "random" voice actress, they might not run into issues. But if at any point they had a job listing, a discussion with a talent manager, or anything else where they mentioned wanting a "Scarlett Johansson sound-alike," they might have dug themselves a nice hole here.

Specifically regarding your question about hiring a voice actor that sounds like someone else - this is commonly done to replace people for cartoons. I don't think it's an issue if you are playing a character. But if you deliberately impersonate a person, there might be some trouble.

[-] [email protected] 39 points 2 months ago

Not to justify the actions of the shooter, but ringing the doorbell before breaking in is definitely a thing. It's a means of checking if the house is occupied - if you're just trying to steal things, an unoccupied house is ideal, and if someone answers when you ring, it's easy enough to make up an excuse and walk away.

A much better solution than a gun, though, is a security door (similar to a screen door, but more kick proof).

[-] [email protected] 26 points 3 months ago

For what it's worth, I just bought a TCL 55S450F (55 inch 4K HDR FireTV) specifically because it does not ever need an internet connection to function (expressly stated in the manual). It is currently on Amazon for $268 (they have other sizes at other prices). It's a great TV, considering the price. The only real drawback for me is the remote is Bluetooth, rather than infrared (less compatible with universal remotes).

Note that for full dumb TV effect, you'll want to go into the settings and tell it to resume the last input, rather than going to the home screen when you turn it on (without connecting it to the Internet, the home screen is basically just a big banner telling you it's not connected, and when you dismiss that, it just allows you to access inputs and manage settings).

[-] [email protected] 31 points 5 months ago* (last edited 5 months ago)

I currently have a System76 laptop, and sincerely regret my purchase. When I purchased it, the Framework was not out yet - I wanted to support a company that supports right-to-repair, and figured since they controlled the hardware, firmware, and software (Pop!_OS), it would be a good, stable experience. It has not been, and support has generally been poor. I know other people have had better experiences than I have, but personally, I won't be buying from them again.

I haven't personally used Purism, but former co-workers spoke really poorly of them. They were trying to buy a big batch for work, and said the build quality was awful. Additionally: https://youtu.be/wKegmu0V75s

20
submitted 5 months ago by [email protected] to c/[email protected]

cross-posted from: https://lemmy.ml/post/11175824

Tips for getting contract work

I'm looking for part-time and/or short term contract work, but having a hard time because all the major job sites have either no ability to filter, or the posters just select every option so their post shows up in every search.

Does anyone have any tips on how to find this kind of work? Is it best to source it on my own, or are there good agencies to work with?

I'm looking for any kind of developer roll (I've done backend and full stack), and am open to mentoring/tutoring as well.

39
submitted 5 months ago by [email protected] to c/[email protected]

I'm looking for part-time and/or short term contract work, but having a hard time because all the major job sites have either no ability to filter, or the posters just select every option so their post shows up in every search.

Does anyone have any tips on how to find this kind of work? Is it best to source it on my own, or are there good agencies to work with?

I'm looking for any kind of developer roll (I've done backend and full stack), and am open to mentoring/tutoring as well.

6
First RISC-V mini laptops emerge (www.notebookcheck.net)
submitted 6 months ago by [email protected] to c/[email protected]
[-] [email protected] 19 points 8 months ago

It looks like a few people are recommending this, so just a quick note in case people are unaware:

If you want to avoid being tracked, this is not a good solution. Searxng is a meta search engine, meaning it is effectively a proxy: you search on Searxng, it searches multiple sites and sends all the results back to you. If you use a public instance, you may be protected from the actual search engine*, because many people will use the same instance, and your queries will be mixed in with all of them. If you self host, however, all the searches will be your own - there is then no difference between using Searxng and just going to the site yourself.

*The caveat with using the public instances is while you may be protected from the upstream engine, you have to trust the admins - nothing stops them from tracking you themselves (or passing your data on).

Despite the claims in their docs, I would not consider this a privacy tool. If you are just looking for a good search engine, this may work, and it gives you flexibility and power to tune it yourself. But it's probably not going to do anything good for your privacy, above and beyond what you can get from other meta search engines like Startpage and DuckDuckGo, or other "private" search engines like Brave.

[-] [email protected] 27 points 8 months ago

You manage the sources yourself, so if you don't want to search certain platforms, just don't add them.

[-] [email protected] 18 points 9 months ago

I have no personal experience with this company, but I've followed them for a few years. I was initially very interested in their laptops, but was also very excited when the phone was announced. In the years since the phone was announced, I've heard and read many negative things about build quality and software on their laptops, and I've seen the shipment of the phones get repeatedly delayed. More recently, https://youtu.be/wKegmu0V75s showed up in my feed. I would recommend anyone considering purchasing from them watch that video, and do a little research into their security/openess claims, as well as customer satisfaction.

Again, I don't have the personal experience to say they are bad in anyway, but I don't want to see anyone get scammed, so I would recommend healthy skepticism and due diligence before making a purchase.

[-] [email protected] 19 points 10 months ago

Since most phones (if not all), use an encrypted filesystem. With such, no service can't start if the device isn't initially unlocked after reboot, including Find my device.

Android developers can specify that their apps need to run before the pin is entered, via direct boot mode. This is how alarms still work, even if your phone takes an upgrade overnight, and restarts automatically as part of that process.

I can't say whether Google's Find My Device currently does this, but there is no technical reason it can't.

2
submitted 10 months ago by [email protected] to c/[email protected]

The countryside is beautiful, and the best way to experience it is via motorbike. I was nervous because I'd never ridden one, nor had I been in a place where I had to drive on the left, but Pai is a great place to practice both of those things. Some noob tips:

  • One person to a scooter. It's much, much harder to drive with two or more people. If you're new to scooters, don't risk it.
  • Get a mount for your phone, so you can use GPS. They didn't have them at the rental shops when I was there, so bring your own.
  • Bring eye protection. In general, it's not necessary, but if it starts raining, you'll really appreciate having it.
  • The rental place will ask if you know how to ride. If you say "no," they won't rent to you. If you don't want to lie, watch a video online beforehand - then at least you'll have the knowledge, if not the skill.
  • Be careful! As you walk around town, you'll see lots of people with scratched up arms and legs, and probably even a few people with braces/casts. Don't be one of them. It's really not that difficult to ride, you just need to be smart and cautious.

And finally a pro-tip for getting to Pai: Take a motion sickness pill before the ride up. I don't get sea-sick, I don't get sick on rides, and I haven't thrown up in over a decade. It doesn't matter how strong your stomach is, you'll feel the ride. Any pharmacy will have the pills, and they are very cheap.

12
submitted 11 months ago* (last edited 11 months ago) by [email protected] to c/[email protected]

I think this community is more LLM focused than computer vision, but I'm hoping it's ok to post this here.

I struggled my way through getting tensorflow setup, and getting a model trained - it took about 10 hours over a few days, cross referencing different articles and videos, fighting to get protobufs compiled, and images/annotations converted to TFRecords. I finally got a basic model, but it was a nightmare, and I'm not sure I could figure it out again if I needed to.

Then I stumbled on this guy's yolov8 object detection video. It was so easy. I had a trained model in less than an hour. I would highly recommend.

Also worth noting - the ultralytics folks have been very helpful on their discord server.

I'm not affiliated with the guy making the videos or the ultralytics team, I just wanted to plug them since they've been very helpful to me.

If you want you dip your feet in, and you have any basic questions, feel free to ask them here. I'll answer any that i can.

Edit:

A quick note: In the video he uses an online tool for labeling - it looks like it can be installed locally, but it looks like a fair bit of work. I use label-studio which can be easily installed with pip.

[-] [email protected] 16 points 11 months ago

See https://youtu.be/GCVJsz7EODA and https://youtu.be/V82lHNsSPww

There are a few problems, but I believe the biggest issue is that .zip and .mov are valid and common file extensions, and it's common for people to write something like 'example dot zip' or 'attachment dot mov' in emails, tweets, etc. Things like email clients have features where they automatically convert text that looks like a web address into clickable links. So now, retroactively, all those emails etc suddenly have a link, where they used to just have text, and the domains that are equivalent to those previously benign file names are being purchased by nefarious actors to exploit people unaware of the issue.

view more: next ›

JoeyJoeJoeJr

joined 1 year ago