

The only thing I would use such a thing for is installing an ad blocker for the real world.


The only thing I would use such a thing for is installing an ad blocker for the real world.


Well, telling time is one more feature than most jewelry has, and that’s what mechanical watches really are. That’s not even very expensive as far as watches go.
I sure wouldn’t buy one myself, but I won’t judge anyone for their taste in fashion accessories. In this case I will absolutely judge them, but for entirely different reasons.


Robots commuting to the moon.
Robots.
Commuting.
To the moon.
This is the most extreme case of affluenza I’ve ever seen. Let’s pray that it’s terminal.


Representation…in AI image generation?
The idea that this is something anyone should want is hard to wrap my head around.
If I could opt out of being deepfake-able, I would.


It’s a very dumb way to say that population decline is predicted.
The birth rate really has dropped below replacement levels in the US. Immigration might not fill that gap. With how actively hostile the current administration is to immigrants, that seems likely.


This always sparks debate, and I can see why.
There are a million reasons you might need to stop. That’s why highways are designed with specific speed limits, so you have enough time to see hazards and come to a full stop if necessary. If you’re not prepared to stop unexpectedly, then you are a menace to society.
But it’s also dangerous to stop. That’s why most places have laws against stopping (or even going too far below the speed limit) unnecessarily. It’s a hazard.
Neither is an excuse for the other.


If you can’t afford backups, you can’t afford storage. Anyone competent would factor that in from the early planning stages of a PB-scale storage system.
Going into production without backups? For YEARS? It’s so mind-bogglingly incompetent that I wonder if the whole thing was a long-term conspiracy to destroy evidence or something.
Alien meaning “external”.
Electrical interference can come from all kinds of places, near and far. I guess technically you might get interference from other planets but I don’t think that’s what they meant. :) Solar flares are a possibility, though.


Thanks for posting the solution!
If you happen to be using a BTRFS or XFS file system, you might want to try duperemove. It will help you reclaim usable disk space without deleting any files, by using those filesystems’ built-in support for data deduplication and copy-on-write. In other words, it will make duplicate files point to the same data on disk, but still work as individual files. Files will appear and function exactly the same, and editing one copy will not change another (unlike with hard links, for example). That way it won’t interfere with cases like Flatpak or Python virtual environments where you really need multiple copies of the same files.


Yeah, I’d rather come at it from the opposite direction. “Everyone censors, so this exactly the kind of shit your government is going to try to force on you in the future.” Everyone should care about this, if only out of self-interest.
China’s writing the playbook. Other countries will follow it sooner than you might think. This is everybody’s problem.


That’s more or less how it works, but that’s still an additional call. If Google is not tying it directly into segment download requests, then it could potentially be blocked without disrupting playback.
I have no insight into the details of the inner workings. If I download a video with yt-dlp, does it increase the view count? If not, then it’s a broken system, yeah?


Generally speaking, xz provides higher compression.
None of these are well optimized for images. Depending on your image format, you might be better off leaving those files alone or converting them to a more modern format like JPEG-XL. Supposedly JPEG-XL can further compress JPEG files with no additional loss of quality, and it also has an efficient lossless mode.
Do any of them have the ability to recover from a bit flip or at the very least detect with certainty whether the data is corrupted or not when extracting?
As far as I know, no common compression algorithms feature built-in error correction, nor does tar. This is something you can do with external tools, instead.
For validation, you can save a hash of the compressed output. md5 is a bad hashing algorithm but it’s still generally fine (and widely used) for this purpose. SHA256 is much more robust if you are worried about dedicated malicious forgery, and not just random corruption.
Usually, you’d just put hash files alongside your archive files with appropriate names, so you can manually check them later. Note that this will not provide you with information about which parts of the archive are corrupt, only that it is corrupt.
For error correction, consider par2. Same idea: you give it a file, and it creates a secondary file that can be used alongside the original for error correction later.
I also want the files to be extractable with just the Linux/Unix standard binutils
That is a key advantage of this method. Adding a hash file or par file does not change the basic archive, so you don’t need any special tools to work with it.
You should also consider your file system and media. Some file systems offer built-in error correction. And some media types are less susceptible to corruption than others, either due to physical durability or to baked-in error correction.


I was about to say this.
If they can’t give me a callback number that is publicly listed on their web site, then they’re most likely a scammer.
With Google, however, this is a scarier proposition than with most companies. If someone from my phone company, or my bank, or my insurance company called me, I could very easily call the actual company and talk to a human to confirm. I have no idea how I could ever talk to a human at Google. I’m not sure they even have a public phone line.


Unfortunately, you still need a level of trust with Proton. Even aside from trusting that they will not bend to pressure to terminate your service, you’re also trusting them with your network of contacts, because metadata (including the sender, recipient, and subject line) are not end-to-end encrypted in Proton.


Just wear disposable faces.
You humans wear the same face your entire life and then get upset when people recognize it?! Get over yourself! Aside from the obvious privacy issue, let’s be real: it’s also gross.


Good to hear. For context, I made the switch late last year, so my experience may be outdated.


I use Koreader on Android (available on F-Droid or Google Play).
It works. Configuring fonts is a bit confusing — every time I start a new book that uses custom fonts, I need to remind myself how to override it so it uses my prefs. But aside from that, it does what I need. Displaying text is not rocket science, after all.
I used to like Librera, but I had to ditch it because its memory usage was out of control with very large files. Some of my epubs are hundreds of megabytes (insane, yes, but that’s reality) and Librera would lag for several seconds with every page turn. Android would kill it if I ever switched apps because it used so much memory. I had a great experience with it with “normal” ebooks though. It was just the big 'uns that caused issues.


That can’t be good. But I guess it was inevitable. It never seemed like Arc had a sustainable business model.
It was obvious from the get-go that their ChatGPT integration was a money pit that would eventually need to be monetized, and…I just don’t see end users paying money for it. They’ve been giving it away for free hoping to get people hooked, I guess, but I know what the ChatGPT API costs and it’s never going to be viable. If they built a local-only backend then maybe. I mean, at least then they wouldn’t have costs that scale with usage.
For Atlassian, though? Maybe. Their enterprise customers are already paying out the nose. Usage-based pricing is a much easier sell. And they’re entrenched deeply enough to enshittify successfully.
Does it do that even if you set it to “use device MAC” for the wi-fi network you’re on?
The exact location might depend on brand/OS, but in stock Android it’s in Settings > Network & Internet > Internet > gear icon next to active wi-fi network > Privacy.