• 48 Posts
  • 517 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle

  • j4k3@lemmy.worldtoAsklemmy@lemmy.mlWhy western people seldom use "please"?
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    19 hours ago

    This is very nuanced and could be difficult to understand, but the word please can have a negative context between people that are related, like with family, or when codependent such as housemates or coworkers. The word please can have a negative emphasis like nagging. As an example, one might say:

    • Please take out the trash.
    • Take out the trash! Please!
    • PLEASE! TAKE, OUT, THE TRASH!

    These are common forms of natural speech where the word please does not have the same meaning exactly. In the latter two examples, the word please is like a subtle way of saying, 'just do what I ask without further arguing.

    The language and formalities greatly depend on where you live, the local culture, and the population density in that region. In rural parts of the USA, formalities are common, but often are very hallow in deeper meaning. For instance, in the Deep Southeastern USA, like Alabama, there is a common phrase ‘bless your heart.’ This phrase actually means, “I disagree and think that you are a fool,” but the meaning is like an unspoken truth and an inside joke at the same time. If you confront the phrase directly, the person will tell you they only meant the phrase positively, and they will make you look and feel like a fool for assuming it was said negatively. If you fail to realize the true meaning of the phrase, everyone that does know the meaning will see you as a fool. If you recognize the true nature of the statement, you are forced to rephrase your argument or agree to disagree.

    The word please is most common in these rural cultures along with words like sir and ma’am. This language culture has a strong association with the conservative Right, religious extremism, deep prejudice, and toxic stupidity in the USA. That subculture association seems to impact the use of such linguistic formalities elsewhere in the country.

    The word please still has a basic meaning of kindness among strangers or coworkers, but its formal use as a normative standard has a strong association with the worst of our subcultures in the USA. The second I hear someone talking like that, I immediately distrust them like seeing a person walk into a bank wearing a trenchcoat and a ski mask.




  • j4k3@lemmy.worldtoAsklemmy@lemmy.mlWould you rather...
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    3 days ago

    Bill Gates: My mommy was on the board at IBM and bought me a monopoly. I took that lesson to heart for the rest of my life and always pursued back door deals and monopolies.

    Richard Stallman: I told you how you would find yourself without public commons in a neo feudal dystopia that would destroy the very fabric of democracy because it was the obvious outcome. I gave you fucktards an alternative but you clowns were far too stupid to listen and threw away freedom and democracy. Now you have the worst leader in the history of the country by every metric known, and a traitor that attempted a coup just like Hitler, saying the same things as Hitler, running on a ballet for leader one again, while you do not have freedom of information because of the digital coup I tried to prevent and warn you about. You mock what you lack the depth to understand and in so doing you are the joke.






  • I seriously doubt the two are separate like that any more. They are likely completely intertwined at this point. There are hints all around in the technology that indicate we are completely compromised. Moves like integrated phone batteries and the MINIX ME system running under all operating systems on x86, or the proprietary modems; everything subtly points to a surveillance state. We are absolutely hell bent on proving bin Laden correct in his calculations to destroy democracy long term with a neo digital feudal dark age of regression.


  • Oversimplified, lights fade over time; the ones you use more often fade faster.

    The primary solution, if I understand it correctly, is jiggling. The image is altered slightly over time to change what pixels are illuminated and how so that one set is not left in the same configuration for too long. Like the ones beside each other are used in tandem and altered slightly to create the same effect. You’re seeing an illusion made of quickly flashing red/green/blue/white(maybe) anyways, so it is just a more complicated type of control.




  • j4k3@lemmy.worldtoAsklemmy@lemmy.mlBest universities for women?
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    edit-2
    6 days ago

    I’d be looking more at interests and leaders in those interests if possible. Red States don’t do much leading in anything relevant. It sucks to be looking at what one’s life interests might be like at such a young age.

    Personally, I’d be looking at who is closest to TSMC, Intel, Samsung, etc., and focus on getting into schools and programs that lead to semiconductor fabs. There is a lot of money and investment in that space.




  • Dry with pickled onions and some chicken.

    I absolutely hate salads, but that is what I ate 5 days a week when I worked for a chain of bike shops. It’s how I lost my last bit of weight to get under 7% back when I was racing. Going from 350lbs to 220lbs wasn’t super hard while just commuting to work, and training/racing casually. Going from 220lbs to under 190lbs was super hard for me. Eating something I could barely tolerate meant I only ate what I absolutely needed because I was freaking starving… So, to me, while I hate salads, if I’m eating one, it is for a specific reason, and if I’m objective about that reason, I’m going to fit my opinion to what best meets those goals. Therefore, my favorite salad is the one I can only barely tolerate and will eat, but only as much as I absolutely must. Like seriously, I brought my lunch into my office and would eat a few bites over the course of hours. That too is a major aspect of real weight loss. How much you eat at any given point in time is very important.



  • Linux is not really comparable like this because the distribution matters along with the bootloader configuration.

    If you have an immutable distro with SELinux configured and your own UEFI keys or a shim with secure boot, you’ll have a very different set of vulnerabilities from someone running Mint with secure boot turned off.

    For a short time Microsoft marketed an upgrade path the a full Unix like operating system for Windows. It was widely known that some of the Windows shell differences from Unix were just arbitrary aliases for the Unix commands.

    If you ever get the chance, try using an old Android device you do not use, enable the developer options for the ADB bridge and try hacking around, if you have an interest in understanding how Linux security works in practice when it is done right. The Linux side of Android is an interesting case study if you understand the premises of Android. It is a Linux system that is secure for people with absolutely no understanding of Linux or networking. This is enabled by allowing the app developer to become something like a full Linux user on the Android device. All of the Linux kernel binaries that could modify the kernel in any way are removed and there is no administrative account present. When the hardware manufacturer logs out for the last time, all the administrative and modifying binaries are deleted. This secures the remaining files that are all marked as read only. Android also has a very robust SELinux implementation in place. Every location present has a defined security context. So there are places where you can create temp files and store data, but the things that can be added and manipulated are very limited in their access to other parts of the system. If you mess around with this the way these tools work will become much more tangible.

    By comparison, most distros ship with a very open and unconfigured security context. The SELinux configuration is still extremely permissive in distros with SELinix integrated, like Fedora. This is nothing like Android’s setup. The primary reason for a lot of the ROM community on Android and how they have root access is because of exploiting CVE vulnerabilities in the kernel that were found after the kernel was shipped. Android works with orphan kernels that only the manufacturer can update because they retain the source code for the kernel modules that they add at the last minute. This is the depreciation mechanism used by the hardware manufacturer to steal ownership with Android devices.

    If you understand how exploiting CVE’s works on a simple abstract level, and why it is necessary in order to bypass the immutable system (read only file system without tools to modify Linux kernel binaries), and how SELinux adds further restrictions based on the context of who is accessing the directory or command/executable, you should better understand the complexity of the question you’re asking. The app developer on Android is like your equal on the device. They can do what you can do, and that is why you are so restricted too. Your measures of control on Android are very limited and just in the app environment spaces.

    Once I learned the basics of this system, it has become the way I view all software systems intended to enable ignorant consumers. Tremendous power to alter systems is included in these platforms, platforms like Windows.

    Those that are trying to make the Windows games work on Linux are likely completely focused on functionality. When people talk about things like sandboxing, they are almost always talking about library dependencies and not any kind of security context. It is likely that any malware that targets Windows binaries will not work on Linux directly, but something that targets Linux specifically is another matter entirely; it is security through obscurity, which means no security at all. Unless you’ve taken active measures to limit the PID/GID/security context of the process that is running the software, it has all the same permissions of the user that called it. It can delete, view, and write anywhere that you can with the user/group/sc that launched it.


  • Looking for a CS/CoD level experience. Steam might be okay, but I haven’t tried it and am skeptical of anything marketing oriented. I really don’t want to see ads or hype of any kind. I’d much rather ask around and go in search of my options when I feel compelled. In other words, I’m aware of my susceptibility to suggestive marketing and am not okay with others manipulating me through that mechanism so I avoid it all together. I will not enter the space at all unless those terms can be met.

    I was just skimming a fedora mag post on gaming and it mentions that Steam packages Proton but there are community maintained versions with more advanced features than are possible on the Steam Deck; the most popular being Proton Glorious Eggroll.

    Xonotic was one I played some. It has a different hectic vibe that is not really in that CS/CoD space I liked though. I like to feel like I have a measure of control and not in a situation where reckless speed has an advantage.