• 3 Posts
  • 65 Comments
Joined 23 days ago
cake
Cake day: November 10th, 2025

help-circle
  • DEX is actually pretty good when used with a keyboard and external monitor. I also dont love thr Samsung walled garden, but I end up buying their products because I use my phones for several years at a time before replacing them so top end hardware specs are a priority and especially cameras.

    I would go Sony but the data band support in the US is incomplete, and I can’t get caught out by poor cell service while traveling.

    I am considering going Pixel next but Graphene hasn’t been announced for Pixel 10 yet so I’m a bit on the fence, I guess I could buy an older model and give it a try wifi only for a bit to see how I like it.


  • A lot of the issue with foldable is the non-standard aspect ratio. This gets to a standard tablet aspect ratio, so should run out of the box with most apps without additional modification.

    Also DEX support on-device means it can run fully windowed applications and use mouse and keyboard natively, which is a big boost in functionality for productivity applications.



  • If I’m reading(skimming) the documentation right, it seems like anyone who can pass the challenge can download the full node and see the full record of interactions. IPFS is not a perfect privacy network, so user accounts can in theory be traced back.

    So basically as with Fedi instances it is fully on the Node host to set who can get in based on the challenge, and what is hosted there is their liability. Only difference is Plebbit allows any user to spin up a new instance/community node ad-hoc and they aren’t responsible for maintaining infrastructure beyond what is required seed the nodes they host.

    Is that right? I’m not sure but hopefully someone better in the know will correct me if not.


  • One of the biggest and most underrated things you can do now to prepare for a job search os have your current coworkers and managers endorse the skills you listed above on your LinkeIn profile. This is powerful both because it validates your resume (for real people and AI reviewing it), and gives recruiters a way to find you. With your skill set you should have plenty of people coming to you asking if you are interested in work without even pursuing applications yourself.

    What kind of CAD software are you proficient with? What type of designs have you mostly focused on?






  • I’m ok with both, but prefer co-ops because the members get direct voting on large decisions by default, rather than a proxy vote via an appointed government worker who answers to the municipal government.

    That said, there is no reason these can’t be one and the same, the local government could fund the establishment of a regional co-op and maintain audit and some other limited authority over it.

    I also support long-distance fiber infrastructure being built and maintained by worker’s co-ops that would then get paid for service by the regional ISPs. Worker members would be highly motivated to maintain good uptime, and hiring/training members who live local to the fiber lines in remote regions would be possible with the incentive of worker ownership. Once built it is a long term maintenance and security business with steady return, perfect for a worker’s co-op that could be financed with private capital at decent ROI.




  • Prohibition leads to the propagation of means of evasion. By attempting to ban teenagers from popular means of communications they will incentivize mass adoption of “illicit means” of communications, and create another generation both familiar and comfortable with “illegal online activity” like the Napster generation. Just like Napster, this will also accidentally push youth into online platforms and channels where they are more likely to encounter content not suitable for minors and malware.

    The only “truly effective” form that this type of internet control can take is requiring a digital ID verification to establish a connection to the network at the ISP, and that is a nightmare setup we should be prepared to fight tooth and nail.


  • I have suggested a couple of times now that ActivityPub should implement an encryption layer for user authentication of requests and pings. It already has a system for instances vauching for each other. The situation is that users of “walled garden” instances in ActivityPub lack means of interfacing with public facing instances that doesnt leave the network open for scraping. I believe a pivot towards default registered users only content service built on encrypted handshakes, with the ability for servers to opt-in to serving content to unregistered users would make the whole network much more robust and less dependent on third party contingencies like CloudFlare.

    Then again, maybe I should just be looking for a different network, I’m sure there are services in the blockchain/cryptosphere that take that approach, I just would rather participate in a network built on commons rather than financialization at it’s core. Where is the protocol doing both hardened network and distributed volunteer instances?






  • Yes, the idea of the physical ID card they discuss makes a lot of sense, however that has the problem of associating your device with your ID.

    When it gets to cloud hosting the personal data and an intermediary validation service that’s where I get even more skeptical.

    I have a vague idea about a system that uses a time and topology based encryption where a person’s private information is encrypted and can generate a public key pair that will only match within a set time frame so that the data is held on government servers fully encrypted and when the user issues a “consent” that consent enables validation of a check-sum when both the user and the website provide the public keys without directly querying the government database. So basically the website is issued a public key by the server that works for all citizens that are above an age limit, and the users are sent private keys from their government data store whenever new data is encrypted. If the user’s age is above the limit, the user’s key will validate the age check, and because the key changes rapidly over time it cant be used to correlate the individual across multiple validation checks.

    Users can host a version of the data store locally, that can be validated as matching the government store using the query “is there a match to the shape of this encrypted data” rather than querying a specific citizen info store (this is blockchain tech, but can be centralized). This could be used to fight against identity theft, which is certain to be a crime that spikes with any digital ID system. Thats not the most clear but I think you’ll get the gist, no intermediaries necessary.

    All this said, in the US there are private services that validate physical ID cards using the codes on the back or a scan of a photo of the ID, so clearly the information has already been made available to private industry from the government through some channel. So that might be even worse than proposed systems in other nations already, I dont know.


  • A pretty good system, the crucial implementation being a robust consent management system for data access, and Metadata tracking to make sure the account identifier isn’t being used behind the scenes as a de-facto tracker by the public sector.

    To me the risk of Digital ID is two fold, one it gives the government a centralized means of tracking individual behavior and thereby crushing dissent (from a Social Credit System, to straight up Russian style gulagging the opposition). On the flip side it gives private sector actors a central immutable identifiers to associate behavior with that can’t be erased by deleting or abandoning an account.

    Age Verification is the point where these two concerns are merging into one. Abolishing online anonymity is tantamount to universal surveillance by both the state and private actors, setting up a system of automated persecution tyrants have dreamed of for ages but hasn’t been possible until today with Machine Learning making mass data processing automation both viable and feasible.

    Fascist population control and the “final solution” weren’t possible in the way they were implemented until IBM sold the Germans early tabulating machines / computers. ML is the next phase of that same arc of development.

    Use of Digital ID to log internet activity is what makes individual data streams continuous, contiguous, and compileable by default.

    The consequences are clear, the question is what we can do to prevent it from happening.