KiranWells

joined 1 year ago
[–] KiranWells@pawb.social 6 points 10 months ago (1 children)

Not all ad blockers remove elements from web pages, and if they acted that predictably you could detect the ad blocker by detecting whether an expected element is hidden.

I have not looked through an ad blocker's code, but I don't believe it is that simple.

[–] KiranWells@pawb.social 53 points 10 months ago (10 children)

This already exists - @soatok@furry.engineer's blog already has a popup about not having an adblocker, although it is easy to dismiss. It's probably a bad idea to block content based on not having one, as detecting ad blockers is a losing battle (as YouTube is learning).

[–] KiranWells@pawb.social 0 points 1 year ago

Exactly; the idea is familiarity, not efficiency. To be fair, this argument doesn't make sense for all situations, so it is possible I misunderstood what the original post was talking about specifically.

[–] KiranWells@pawb.social -3 points 1 year ago (3 children)

I think the behavior could actually make sense with real physics, as the vehicle might be designed to mimic what the driver expects rather than real physics. For example, my car often shuts off the engine when I am not accelerating because it is a hybrid. So, if I don't press the gas pedal, it wouldn't really make sense for it to move. However, it is designed to artificially engage the engine when none of the pedals are pressed to more closely mimic the behavior of non-hybrid cars.

If most pilots are used to the behavior if a vehicle in atmosphere, a space ship might be designed to mimic that behavior (through weak reverse thrusters or something else) to make it easier for pilots to get used to.

[–] KiranWells@pawb.social 21 points 1 year ago (1 children)

Definitely seems like an AI generated article. I can't imagine a human actually writing "the sound of legends being printed."

[–] KiranWells@pawb.social 1 points 1 year ago

Just listing some things that I needed to do for working remotely on a personal device: have an antivirus installed, make sure Windows firewall is enabled, enable automatic updates, screensaver or lockscreen configured for 15 minutes of inactivity, and use a strong password (and a good password manager).

[–] KiranWells@pawb.social 1 points 1 year ago

However, you can configure GRUB to use an encrypted boot partition, and even have detached encryption headers. It does take a bit more work, and you should make sure you know what you are doing. (e.g. losing a detached header basically means your data is all lost)

https://wiki.archlinux.org/title/Dm-crypt/Encrypting_an_entire_system#Encrypted_boot_partition_(GRUB)

[–] KiranWells@pawb.social 2 points 1 year ago

Just installed, and now I'm wondering why I've never found this before. Its great - open source, well-designed, and pretty full-featured

[–] KiranWells@pawb.social 1 points 1 year ago

As far as I have heard, if someone is making social posts about a fursuit, it is almost certainly just a normal costume.

[–] KiranWells@pawb.social 2 points 1 year ago

Regarding exit nodes, I have heard that Veilid does not distinguish normal nodes from exit nodes, meaning any node can be an exit node. However, I did not see this in their presentation, and the system seems to be more focused on peer-to-peer communication within the network than private accessing of outside web sources.

[–] KiranWells@pawb.social -2 points 1 year ago

Regarding exit nodes, I have heard that Veilid does not distinguish normal nodes from exit nodes, meaning any node can be an exit node. However, I did not see this in their presentation, and the system seems to be more focused on peer-to-peer communication within the network than private accessing of outside web sources.

[–] KiranWells@pawb.social 3 points 1 year ago (3 children)

I think Lokinet and Veilid are two different solutions to the same problem. Lokinet is intentionally based on the block chain to prevent attacks, while Veilid is intentionally non-blockchain based. Additionally, Lokinet seems to be more similar to Tor in its makeup and purpose, but I can't find any information on how the encryption functions to compare to Veilid's.

view more: β€Ή prev next β€Ί