• 20 Posts
  • 123 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle
  • People don’t seem to understand Raspberry Pi’s at all. It is a market manipulation scheme that can not be beat commercially because it is not run like a capitalist enterprise. It is a scheme to prevent bottom up competition from beating Broadcom’s proprietary monopoly of low quality junk. The chips Rπ are selling are off of a trailing edge node with, and are a failed product line of TV tuners. The ARM core of the chip is only 1/4th of the actual die. The chips are made in a fab that only produces them when there is no other paid work. This entire supply chain is barely above cost. The reason Rπ is a foundation and a dot org is because the entire endeavor is a tax write off for Broadcom. The reason it is centered out of the UK is so that it distances public awareness of the scheme. Broadcom has no public documentation of the vast majority of their hardware. Between Qualcomm, that uses the same proprietary business model, and Broadcom, these are the two primary reasons behind why you no longer own your devices in a perpetual cycle of artificial deprecation. This entire scheme is designed to avoid scalability from the bottom up by companies like Rockchip. If this still doesn’t connect in your mind, think of Japanese cars in the USA and abroad. They build high quality low end cars and created value at the bottom first. With time they scaled that value and overtook all segments of the market. They even split up their companies to avoid the perception of their real dominance using Honda = Acura, Toyota = Lexus, and Nissan = Infinity, because the majority of the public is too stupid to see and understand such simple obfuscation measures in practice.


  • Try not to think like this. Over the last 10 years, between reddit in the past, and here now, I’ve had to use these places as my only external form of human social contact because of disability issues. I’ve noticed certain patterns emerge with the seasons. These places are largely dominated by certain regions of the world. When those regions go through seasons where the majority of people are doing things elsewhere, the comment and interaction quality decline noticeably. I’ve learned to not take it personally and I turn to other outlets to spend more of my time. This is when I do most of my gaming and reading. I’ve finished all of the primary Dune series and most of Asimov’s main series from Robots through Galactic and Foundation. Most recently, someone suggested the FOSS game Cataclysm Darker Days Ahead. While the theme is absolutely counterproductive for me, the game’s complexity and particularly the documentation of the source code and mods is absolutely fascinating to me. I’ve been exploring JSON tools when it comes to stuff with AI, and the game is like a guided masters class in functional use and tools that use JSON.

    Many people seem to think I’m an asshole or a “bad person” but most simply can’t understand my needs and interests. I never knew what disability was really like and its challenges prior to the day I got hit by a car. I probably had a stupid attitude and said stupid things that made people feel bad in my exact position now. I can’t blame others for their ignorance when condemning them is condemning myself.

    Personalities and functional thought are far more varied in humans than most of us realize in practice. I’ve explored this a whole lot over the last year with AI where it can simulate other contrasting perspectives in very complex ways while answering some really complex questions with relevant sources to back them up. This kind of personality analysis is a major aspect of what LLM’s are designed to understand. The more I’ve explored this topic, the more I have come to realize the binary approach to anything like a good and bad label for a human is completely inadequate. The cause and effect have no simple connections. Most of a person’s “bad” behavior is likely related to cognitive dissonance. If you look up what that really means, it is due to some level of conflict in a person’s life that they are unable to address or have limited/emerging self awareness. If you are noticing such behavior that could be related to cognitive dissonance, work to address the probable causes of underlying conflict in your life if you’d like to address the issue.

    My personal primary conflict is social isolation. That is what I am here to address. I don’t use corporate social media because I’m an outlier of their marketing and exploitation designs where they are unable to accommodate my needs. The inconsistencies of this place are not healthy for me, and it can have a very real impact on my life, but over time I’ve tried to pick up on the patterns and withdraw when I need to do so. Anything that shakes up or makes me question the underlying stability of a place like this is the most deeply disturbing to me. I’m also aware that there is a substantial misdirection campaign that happens with all major elections now. Anyone posting or commenting on such subjects are highly suspect to me. I look at their account activities and ignore or block them if they do not show a wide spectrum of activity and complexity. One day it will become public knowledge that conservative asshats have no morality whatsoever, never have, and are paying thousands of people to post, comment, and write bots to maintain their criminal activities and control. Their presence is completely disproportionate to the population and interests the government represents. When those subhuman jackasses could no longer enslave people outright, they simply shift their focus to redefine slavery to put everyone in their chains. Anyone commenting some shitty nonsense with an account that has little history or a lot of history with no depth is some unethical criminal being paid to do so, is not worth my time or thought, and is absolutely the reason I was right in the first place. Look up the Plutonic definition of sophism and keep in mind that there are some people with a love for their own sadism. These places online are full of people that can be fucked with and there are many that love to take advantage of those that are here for their real human needs. Do not hesitate to disregard anyone that evokes a negative emotion to a well intended comment.



  • I’ve done a lot of experiments with toner transfer and etching my own boards. The highest accuracy with the smallest clearance I can achieve is with old inkjet photo paper in my old HP laser printer. I have tried several different photo papers. They all act a little differently, but they all take up far more toner powder from the drum roller. I’m not sure why. It can be a pain to get the paper backing off of some of them, but when it comes to etching, it approaches photoresist levels using the typical overhead transparencies.

    Just an idea to throw out there. This looks great already.


  • Linux is not really comparable like this because the distribution matters along with the bootloader configuration.

    If you have an immutable distro with SELinux configured and your own UEFI keys or a shim with secure boot, you’ll have a very different set of vulnerabilities from someone running Mint with secure boot turned off.

    For a short time Microsoft marketed an upgrade path the a full Unix like operating system for Windows. It was widely known that some of the Windows shell differences from Unix were just arbitrary aliases for the Unix commands.

    If you ever get the chance, try using an old Android device you do not use, enable the developer options for the ADB bridge and try hacking around, if you have an interest in understanding how Linux security works in practice when it is done right. The Linux side of Android is an interesting case study if you understand the premises of Android. It is a Linux system that is secure for people with absolutely no understanding of Linux or networking. This is enabled by allowing the app developer to become something like a full Linux user on the Android device. All of the Linux kernel binaries that could modify the kernel in any way are removed and there is no administrative account present. When the hardware manufacturer logs out for the last time, all the administrative and modifying binaries are deleted. This secures the remaining files that are all marked as read only. Android also has a very robust SELinux implementation in place. Every location present has a defined security context. So there are places where you can create temp files and store data, but the things that can be added and manipulated are very limited in their access to other parts of the system. If you mess around with this the way these tools work will become much more tangible.

    By comparison, most distros ship with a very open and unconfigured security context. The SELinux configuration is still extremely permissive in distros with SELinix integrated, like Fedora. This is nothing like Android’s setup. The primary reason for a lot of the ROM community on Android and how they have root access is because of exploiting CVE vulnerabilities in the kernel that were found after the kernel was shipped. Android works with orphan kernels that only the manufacturer can update because they retain the source code for the kernel modules that they add at the last minute. This is the depreciation mechanism used by the hardware manufacturer to steal ownership with Android devices.

    If you understand how exploiting CVE’s works on a simple abstract level, and why it is necessary in order to bypass the immutable system (read only file system without tools to modify Linux kernel binaries), and how SELinux adds further restrictions based on the context of who is accessing the directory or command/executable, you should better understand the complexity of the question you’re asking. The app developer on Android is like your equal on the device. They can do what you can do, and that is why you are so restricted too. Your measures of control on Android are very limited and just in the app environment spaces.

    Once I learned the basics of this system, it has become the way I view all software systems intended to enable ignorant consumers. Tremendous power to alter systems is included in these platforms, platforms like Windows.

    Those that are trying to make the Windows games work on Linux are likely completely focused on functionality. When people talk about things like sandboxing, they are almost always talking about library dependencies and not any kind of security context. It is likely that any malware that targets Windows binaries will not work on Linux directly, but something that targets Linux specifically is another matter entirely; it is security through obscurity, which means no security at all. Unless you’ve taken active measures to limit the PID/GID/security context of the process that is running the software, it has all the same permissions of the user that called it. It can delete, view, and write anywhere that you can with the user/group/sc that launched it.





  • That is not all, just all that was relevant here. I block both inward and outward because I like to reverse engineer and hack around with stuff where I know my script kiddie nonsense will not accidentally nmap scan the internet. I also like to have the logs on a network so that I know exactly what connections any given device is making. I find it silly that people are alarmed at a person simply locking the front door of their home when they do not mind checking to see who is going in and out. It only takes a couple of years and there are very few extra addresses that need to be added. Anyone only accesses a few hundred addresses anyways. Ad block is just the lazy version of a whitelist and is a compromise for what best fits most people. I never see things like captchas and I prefer to know what websites break and why. It informs me about their systems and structure. There are many times I learn that they are not something I am interested in connecting to in the first place. I can modify my whitelist easily from my logs and it is not bothersome to me at all. I find it interesting how many people seem to take issue with a person willing to remain aware of the world that surrounds them. I find such detail interesting, educational, and useful. You must have a vested interest in some aspect of the micro services internet if you find such behavior off putting. How do you think Ad Block lists are created. It is based on the dropped connection logs of someone like myself. I suppose they were just paranoid too. I have several reasons why it is beneficial for me. I’m not really worried about others as much as I am just being responsible. If a curious desire for awareness of the the details that surround me is somehow offensive or off putting I apologize. I find it is a catalyst for learning and contextualizing information in several areas of personal interest and plugs some holes in my ignorance.


  • Looking for a CS/CoD level experience. Steam might be okay, but I haven’t tried it and am skeptical of anything marketing oriented. I really don’t want to see ads or hype of any kind. I’d much rather ask around and go in search of my options when I feel compelled. In other words, I’m aware of my susceptibility to suggestive marketing and am not okay with others manipulating me through that mechanism so I avoid it all together. I will not enter the space at all unless those terms can be met.

    I was just skimming a fedora mag post on gaming and it mentions that Steam packages Proton but there are community maintained versions with more advanced features than are possible on the Steam Deck; the most popular being Proton Glorious Eggroll.

    Xonotic was one I played some. It has a different hectic vibe that is not really in that CS/CoD space I liked though. I like to feel like I have a measure of control and not in a situation where reckless speed has an advantage.










  • https://lemmy.world/post/36032

    I don’t think you guys meet my requirements. I don’t use proprietary software, and use a whitelist firewall with addresses I know and trust. While I can spin up a secondary network or even a Windows machine, I do not care to do so at all, and certainly not regularly. My primary reason for the whitelist is because of my terrible code quality, dislike of data mining from corporate America, and distrust of PDF datasheets for vintage electronics hobby projects from 3rd party sources. I don’t connect to anything like discord because of their random IP addresses without human readable names, weird ports, and undocumented protocol. I don’t use google at all because I fundamentally disagree with their business model, and have black listed all of their servers.



  • Invisibly; by trying to post in it and encourage others to do so. There is not much management to do with such a small community. The majority of regular users watch the All feed, so subscriptions are really just a way to bookmark the community to post in it or find it more easily. For smaller or new communities, expect it to be more like your personal blog as it is unlikely to be something others will post in regularly. The majority of communities that are hourly-active were made prior to the rexodus of June 2023, or within a few weeks thereafter.

    Unless you’re in a very controversial space, actively micromanaging a community is likely an issue with the mod not the community IMO. The admins take care of the majority of wack-a-mole nonsense here.


  • How are finishes so durable and thin?

    My assumption of a lack of post processes is because I come from a background of automotive refinishing and repair, where I’ve owned a shop and painted for many years along with getting into custom art graphics and airbrushing. The only finishes I know of that provide a similar durability are two part urethanes. Those are far too thick by comparison. When cutting into plastics that have been moulded, the finish shows no signs of mechanical layering or bonding like a post process finish in most cases. Often a cleanly broken or cut part shows a similar type of penetrating surface alteration I associate with a polishing operation, where the surface transitions in color and grain structure with in millimeter or few (in cases where the break is clean and does not appear to be influenced by stress alterations like ABS where it whitens under tension).

    How does chromate conversion work with a prep regime and what kind of wet paint can offer similar durability to a 2k urethane when it is impossibly thin? Like I know the limitations of urethane well when it comes to corners and pointy bits where it will thin from surface tension. There is not a chance in hell that the buttons on the side of my phone could be painted with such a finish with an even conformal coating and remain durable for years of constant abrasion. Is there a name for this class and type of finish? Where are they sourced? What is the scale of the industry? Is there a way to access the process and products at a small scale?