- 14 Posts
- 364 Comments
it’s actually fits 3%… PER MONTH
april '24 to august '25 is 16 months
1.0316 = 1.605
$49.24 * 1.6 = $78.78
sus@programming.devto
Technology@lemmy.world•Mozilla under fire for Firefox AI "bloat" that blows up CPU and drains batteryEnglish
4·9 months agoI remember tab groups showing up one day by themselves maybe a week ago, and then I quickly clicked about two buttons and now they’re totally gone and I almost forgot they were a thing. But likely if I had summarily clicked 2 different buttons it might have been turned on without me realizing it, and that would cause the model to be downloaded and the CPU cycles to be spent (at least if I kept the tab groups on)
sus@programming.devto
V Programming Language@programming.dev•The V Programming LanguageEnglish
3·9 months agoThey seem to believe Vlang is a cult, and don’t like promoting it because of that.
Now I’m pretty sure Vlang is not literally a cult, though it does have a history of controversy where it claims to be ready-to-use and with lots of features, but actually half the features are not implemented and the rest are extremely buggy (at least in 2022), and if you bring that up with the V community they really don’t like that.
It is partially self-hosted though, which is cool I guess
sus@programming.devto
Privacy@programming.dev•EXPOSING The Billion Dollar SECRET VPN Companies Are Hiding
8·9 months agoVideo has general VPN background info:
A VPN is ultimately just someone else’s computer that routes traffic through it, and there is nothing stopping you from starting your own VPN company, promising you’re not logging anything, and then logging everything you can. You are almost certainly never going to be punished in any way for lying to your customers as long as you put in a minimal amount of effort.
Some VPN companies like to make ridiculous claims like “the vpn will prevent you from getting hacked” which is not true
For 95-99% of internet users (at least in western countries) a VPN doesn’t really help with privacy at all since your browser is most likely still easily fingerprintable. UBlock origin or similar things help but are not even close enough to stop all fingerprinting, you need something like tor browser with javascript disabled to actually get your browser privacy to the level where a VPN is relevant. (Though it does have other benefits like circumventing some geoblocking, making unencrypted websites slightly safer, etc)
You ought to manually configure DNS, possibly even try to self-host
touched upon in the video but not directly explained, almost all VPN companies just rent from cloud services instead of hosting it themselves so even if they didn’t personally log anything, all the network traffic is likely actually still being logged by amazon etc
governments and police can just get court orders to get all the data from VPNs, or even force them to start logging if they didn’t already, though this is probably not a problem for you if you’re not considered an exceptionally interesting person
generally trusted VPNs are mullvad, IVPN, ProtonVPN, the only one I’ll personally point out is mullvad who have cohosted servers which should bypass the cloud related issues, though you had to manually select a non-cloud server last time I checked
As for more or less unique info specific to this video, it claims that VPNs lying about not collecting user data is indeed very common and done by ad companies that buy out VPN companies etc, and government spying agencies also operating VPN companies as honeypots
Finland never recovered from the 2008 financial crisis, and covid + the end of trade with russia has damaged the economy badly and made public debt balloon heavily. Right now unemployment is about 10%, the 2nd highest in the EU, and the far-right coalition goverment that won the last election is trying to privatize healthcare and disempower unions.
The education system has been getting worse for about the past 15-20 years due to misguided reform attempts (and of course endless budget cuts)
Finland’s birth rate dropped below replacement levels about 50 years ago and has been in freefall for about the last 10 years, and now the population pyramid is starting to be in really bad shape, which means the economic situation is likely just going to get worse and worse.
The retirement savings system is designed like a (partial) ponzi scheme due to aforementioned population dynamics, and participation is mandatory so it is effectively a hidden tax on all workers. Due to old people having the majority of the votes, it’s the one thing that is immune from budget cuts, which forces the government to sell publicly owned infrastructure and dismantle public services in a futile effort to compensate.
sus@programming.devtoMicroblog Memes@lemmy.world•you ignore it until you can't anymoreEnglish
6·9 months agoWe’re going to have nuclear fusion before we have asteroid mining. And I’m not saying that fusion is anywhere close.
wrestle a gorilla and win, obviously
sus@programming.devto
Programmer Humor@programming.dev•Coincidentally, FFM peg is also something you can find on the hub
6·9 months agoWell eh, the binary seems to be about 130MB while the ffmpeg source repository is only 80MB (and the version with separate .so files (all part of the project as far as I can see) is even larger)
Volksverthetzung is about specific protected classes, which don’t include non-religious ideologies (and l’m not sure if “not american” is a specific enough identity either)
sus@programming.devto
Political Memes@lemmy.world•Well, we have the fucking camps opening. Luckily, plenty of terminally online leftists are ready to tell us how noble and moral not voting was!
162·10 months agoThat is what went over the line for you? what?
sus@programming.devto
Programmer Humor@programming.dev•Something something history is a flat circle
4·10 months agobuffer overflows are critical for memory safety since they can cause silent data corruption (bad) and remote code execution (very bad). Compared to those a “clean” unhandled runtime error is far preferable in most cases.
We can avoid expensive branches (gasp) by using some bitwise arithmetic to achieve the so-called “absolute value”, an advanced hacker technique I learnt at Blizzard. Also unlike c, c# is not enlightened enough to understand that my code is perfect so it complains about “not all code paths returning a value”.
private bool IsEven(int number) { number *= 1 - 2*(int)(((uint)number & 2147483648) >> 31); if (number > 1) return IsEven(number - 2); if (number == 0) return true; if (number == 1) return false; throw new Exception(); }
After working at blizzard for 51 years, I finally found an elegant solution by using the power of recursion
private bool IsEven(int number){ if (number > 1) return IsEven(number - 2); if (number == 0) return true; if (number == 1) return false; }
Up and until the rule applies to so many countries that the sites just make the requirement universal, this will do nothing to stop bots as the bots will all just operate from countries that are not under age restriction laws. Even after that it’s likely the bot operators will just use fake IDs and similar, as it’s unlikely website operators would setup reliable verification of identity for every single country they want to serve.
Boybortion, now recognized by Wiktionary the free dictionary
though this pic is in winter, and there could well be a bunch of trees just to the right off-camera
(also the cars and the satellite dish give away that this is what a commieblock looks 50 years after being built)
funny how well this fits for both meanings
this would actually be achieved by a team of 20 thousand oompa loompas with small shovels and 500 million tons of cocaine
these are probably trolls. At one point quora had a “partner program” where people would get paid to post questions, but only if the questions got enough engagement. The question generators realized that coming up with interesting questions was kind of hard, so they just started pouring out ragebait.
If it’s too obvious people may realize it’s a troll, so the ideal way to do it is phrase it in a vague way that leaves a lot to the imagination (here for example people can easily make the assumption that you’re an idiotic and boneheaded parent)














The simplest fix is a delay between an update being pushed and the update being deployed everywhere. Several orgs are scanning all popular dependencies for supply chain attacks and they usually catch them quickly, just not quickly enough when there is no delay.