• 1 Post
  • 115 Comments
Joined 1 year ago
cake
Cake day: January 13th, 2025

help-circle

  • Nah they’ll be able to get out, likely for free if they don’t mind a bit of detainment first. What they should be doing is finding a new place to work or seeing if their current employers will move them to an office in another country. And big companies should be expanding their offices in other countries to make up for the loss of workers, or moving their offices back to places where American tech workers are willing to live rather than moving to conservative states and then pretending there aren’t educated workers for them to hire in the US.


  • The system that scours search results doesn’t store the images, but they are stored. Maybe or maybe not by Google, but someone is collecting them and keeping them in order to feed whatever “AI” or hashing algorithm comes next.

    And it’s actually not the “whole point” in a technical sense. It’s mentioned because they want to make it sound less harmful. You’d never compare actual images directly. That would take a ton of storage space and time to compare a large set of files byte for byte. You always use hashes. If it was easier or cheaper to use the images directly, they would, just like the “AI” agents that do this in other systems need the actual images not hashes.


  • Problem is that this means the images have to be kept around in order to compare them. So, often these caches of child porn and other non-consensual images which often are poorly secured are targets of hacking and thus end up allowing the images to spread more rather than less. And the people sharing these things don’t usually use the services that do this kind of scanning. So in general, it has more negative than positive effect. Instead, education to prevent abuse and support for the abused would be a better use of the money spent ln these things. But more difficult to profit from that and it doesn’t support a surveillance state.






  • Do you mean this config option?

    [server] 
    hosts = 0.0.0.0:5232, [::]:5232
    

    That is binding the service to a network interface and port. For example your computer probably has a loopback interface and an Ethernet interface and WiFi interface. And you can bind to an IPv4 and or IPv6 address on those interfaces. Which ones do you want radicale to listen to traffic from and on what port? The example above listens on all interfaced both IPv4 and IPv6 and uses port 5323 on all. Of course that port must not be in use on any interface. Generally using this notation is insecure, but fine for testing. Put the real IP addresses when you’re ready.



  • irotsoma@lemmy.blahaj.zonetoNeurodivergence@beehaw.orgDaily
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 months ago

    On the plus side, recognizing it is a disability and not just a character flaw like laziness HSS made s huge impact on my life. Recognizing the issue as something to be worked around and planned for rather than something to be pushed through has made life way better. Still don’t get as much done as I should, but planning downtime and flexibility into my schedule has made it at least a little less stressful.



  • ICE agents just like all law enforcement agencies, are public servants employed by taxpayers. Good luck finding any other legitimate job you can hide your identity from your employer. If you choose to serve the public, you choose to be in the public eye and should be identifiable. I could care less if they wear a mask or not, but they should be required to have some other identifiable marking if not, like a badge number, or hell, even something to identify that they are agents and not just random kidnappers would be an improvement.

    As for being harassed for doing their job, if they’re doing the job in a reasonable way, they wouldn’t be harassed. Sure they wouldn’t be able to hit the quotas they’re given, but having quotas for finding criminals is a backwards concept in general and means they have to create criminals when there aren’t enough that are easy to catch. It shouldn’t be easy. It should be thorough, especially if no life is in danger from the “criminals”.


  • A little over half have them. But several other states do have anti-union laws that are similar to that part of the right to work laws. So that’s not all that different across states anymore even though that’s what the laws were originally supposed to be for.

    The other smaller part of the laws that’s actually usually more impactful these days especially for bigger cities, is that local governments can’t make laws to limit firings and without unions to make agreements around what kind of things people can be fired for, it effectively allows businesses to fire people “with cause” (i.e. they can’t get unemployment) for things that wouldn’t be fireable offenses in many other places. This causes large cities to end up with having to support a lot more unemployed people when big companies use these kinds of tactics to fire a lot of people.

    For example, often “insubordination” doesn’t require that the thing you were told to do and didn’t do was in your employment contract. Like a salaried employee who’s contractually obligated to work a minimum of 35-40 hours refusing to work an 18hr day when they’ve already worked 18hr days all week is generally easier to fire someone for “insubordination” for than in some other states that treat employment contracts as actual contracts.


  • “Right to Work” refers to the concept that companies don’t need a valid reason to fire someone without notice or severance benefits.

    It’s marketed as employees not needing a reason to quit or change jobs, but that’s not really true anyway considering most of the states allow binding non-compete agreements and your health insurance is tied to your employment and usually impossible to get at similar cost outside of the employer group market due to “stop loss” policies and other risk sharing plans.

    And there aren’t many laws anyway that prevent employees from leaving a job without a reason in non-binary"right to work" states, so the only real advantage is to companies.


  • Yeah, the definitions are actually more about alignment with the US political parties rather than left or right. And since both parties are demonstrably right of center, just to different degrees, the bias meter should only be used to determine which political party’s sponsors likely biased the article.

    For example, an article saying climate change is not human caused and presenting debunked evidence will be ranked mostly center and second mostly right. But an article calling for incentives to reduce use of fossils fuels will be ranked mostly left. That’s mostly center if anything. An article calling for the government to explicitly force companies to stop using fossil fuels would be mostly left and center. One further advocating for the government to take over energy companies that don’t comply and make energy production public would be mostly left. Just presenting scientific evidence and refusing to give a voice to debunked “alternative facts” is not a leftist position, it’s a centrist one at best and should be the baseline.



  • NFS is really good inside a LAN, just use 4.x (preferably 4.2) which is quite a bit better than 2.x/3.x. It makes file sharing super easy, does good caching and efficient sync. I use it for almost all of my Docker and Kubernetes clusters to allow files to be hosted on a NAS and sync the files among the cluster. NFS is great at keeping servers on a LAN or tight WAN in sync in near real time.

    What it isn’t is a backup system or a periodic sync application and it’s often when people try to use it that way that they get frustrated. It isn’t going to be as efficient in the cloud if the servers are widely spaced across the internet. Sync things to a central location like a NAS with NFS and then backups or syncs across wider WANs and the internet should be done with other tech that is better with periodic, larger, slower transactions for applications that can tolerate being out of sync for short periods.

    The only real problem I often see in the real world is Windows and Samba (sometimes referred to as CIFS) shares trying to sync the same files as NFS shares because Windows doesn’t support NFS out of the box and so file locking doesn’t work properly. Samba/CIFS has some advantages like user authentication tied to active directory out of the box as well as working out of the box on Windows (although older windows doesn’t support versions of Samba that are secure), so if I need to give a user access to log into a share from within a LAN (or over VPN) from any device to manually pull files, I use that instead. But for my own machines I just set up NFS clients to sync.

    One caveat is if you’re using this for workstations or other devices that frequently reboot and/or need to be used offline from the LAN. Either don’t mount the shares on boot, or take the time to set it up properly. By default I see a lot of people get frustrated that it takes a long time to boot because the mount is set as a prerequisite for completing the boot with the way some guides tell you to set it up. It’s not an NFS issue; it’s more of a grub and systemd (or most equivalents) being a pain to configure properly and boot systems making the default assumption that a mount that’s configured on boot is necessary for the boot to complete.


  • But, but, it’s a corporation doing all that not the government, so the constitution doesn’t apply, right? /s

    And there are laws already to protect your privacy. Sure the punishment for breaking the law is exponentially lower than the profit they make by violating it and there’s no punishment beyond the financial one and no punishment to the people doing it, but you’re protected, right? /s /s /s