@ciferecaNinjo - eviltoast
  • 22 Posts
  • 140 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle

  • How have I made your point at all?

    You have acknowledged the importance of having multiple points of failure. It’s a good start because the defect at hand is software with a single point of failure.

    You’re a bit incoherent with what you’re talking about.

    I suppose I assumed I was talking to someone with a bit of engineering history. It’s becoming clear that you don’t grasp software design. You’ve apparently not had any formal training in engineering and likely (at best) you’ve just picked up how to write a bit of code along the way. Software engineering so much more than that. You are really missing the big picture.

    This has nothing to do with software design or anything else along those lines.

    What an absurd claim to make. Of course it does. When software fails to to protect the data it’s entrusted with, it’s broken. Either the design is broken, or the implementation is broken (but design in the case at hand). Data integrity is paramount to infosec and critical to the duty of an application. Integrity is basically infosec 101. If you ever enter an infosec program, it’s the very first concept you’ll be taught. Then later on you might be taught that a good software design is built with security integrated into the design in early stages, as opposed to being an afterthought. Another concept you’ve not yet encounted is the principle of security in depth, which basically means it’s a bad idea to rely on a single mechanism. E.g. if you rely on the user to make a backup copy but then fail to protect the primary copy, you’ve failed to create security in depth, which requires having BOTH a primary copy AND a secondary copy.

    This is a simple thing. If your data is valuable you secure it yourself.

    That has nothing to do with the software defect being reported. While indeed it is a good idea to create backups, this does not excuse or obviate a poor software design that entails data loss and ultimately triggers a need for data recovery. When a software defect triggers the need for data recovery, in effect you have lost one of the redundant points of failure you advocated for.

    When you reach the university level, hopefully you will be given a human factors class of some kind. Or if your first tech job is in aerospace or a notably non-sloppy project, you’ll hopefully at least learn human factors on the job. If you write software that’s intolerant to human errors and which fails to account for human characteristics, you’ve created a poor design (or most likely, no design… just straight to code). When you blame the user, you’ve not only failed as an engineer but also in accountablity. If a user suffers from data loss because your software failed to protect the data, and you blame the user, any respectable org will either sack you or correct you. It is the duty of tech creators to assume that humans fuck up and to produce tools that is resilient to that. (maybe not in the gaming industry but just about any other type of project)

    Good software is better than your underdeveloped understanding of technology reveals.

    Thinking that a federated service is going to have a uniform or homogenous approach to things is folly

    Where do you get /uniform/ from? Where do you get /homogenous approach/ from? Mbin has a software defect that Lemmy does not. Reporting mbin’s defect in no way derives and expectation that mbin mirror Lemmy. Lemmy is merely an example of a tool that does not have the particular defect herein. Lemmy demonstrates one possible way to protect against data loss. There are many different ways mbin can solve this problem, but it has wholly failed because it did fuck all. It did nothing to protect from data loss.

    on your end and a failure of understanding what the technology is.

    It’s a failure on your part to understand how to design quality software. Judging from the quality of apps over the past couple decades, it seems kids are no longer getting instruction on how to build quality technology and you have been conditioned by this shift in recent decades toward poorly designed technology. It’s really sad to see.


  • Exactly. You’ve made my point for me. Precisely why this defect is a defect. The user’s view should be separate and disjoint from the timeline. Lemmy proves the wisdom of that philosophy. But again, it’s a failure of software design to create a fragile system with an expectation that human users will manually compensate for lack of availaiblity and integrity. I know you were inadvertenly attempting again to blame the user (and victim) for poor software design.

    It’s a shame that kids are now being tought to produce software has lost sight of good design principles. That it’s okay to write software that suffers from data loss because someone should have another copy anyway (without realising that that other copy is also subject to failures nonetheless).


  • Who cares?

    Anyone who values their own time and suffers from data loss cares about data loss, obviously.

    This is a serious question.

    Bizarre.

    Anything that is important to you should be backed up and/or archived. Relying on a third party social media app is folly.

    This is a bug report on faulty software. If you have a clever workaround to the bug, specifics would be welcome. A bug report is not the place for general life coaching or personal advice. If there is an emacs mode that stores posts locally and copies them into a lemmy or mbin community and keeps a synchronised history of the two versions, feel free to share the details. But note that even such a tool would still just be a workaround to the software defect at hand.



  • Wojciech Wiewiórowski was intent on calling mastodon a failure for political reasons. When pressed on the harms of public services using Twitter and Facebook, he defends them on the basis of content moderation. Of course what’s despicable about that stance is that a private sector surveillance advertiser is not who should be moderating who gets to say what to their representatives. Twitter, for example, denies access to people who do not disclose their mobile phone number to Twitter, which obviously also marginalises those who have no mobile phone subscription to begin with.

    The lack of funding on the free world platforms was due to lack of engagement. When the public service does not get much engagement they react by shrinking the funding.

    We need the Facebook and Twitter users to stop disengaging with gov agencies on those shitty platforms. Which obviously would not happen. Those pushover boot-licking addicts would never do that.






  • Thanks for the insight; that’s quite helpful.

    The concept of easements still exists in this area but it seems like easements are not being used for façades, which kind of makes sense. The dispute I’m getting into is over a telecom company that is not serving the whole public. They are discriminatory and exclusive. I consider it an injustice that they can arbitrarily drill into people’s houses to support a “public” service which they then exclude some people from access (including owners of the homes they are drilling). Property owners then have a burden of paying €10 per cable to give notice by registered letter to all telecoms using their façade whenever a homeowner wants to perform work on their own façade.

    That’s why I am looking closely at this law. I found nothing in the law that requires telecoms to be inclusive.




  • Are you saying tends is not a false friend and the French and English meanings are quite similar? Because in English that word is astonishing in this legal context. Commercial translation tools are often better quality than Argos, so I was more tempted to trust the commercially translated version.

    (edit) tends has a couple different meanings in English. One might have a tendency to do something or feel something. You might also tend to a store, which means to oversee something. Perhaps it’s that latter meaning that is intended by lawmakers. That the telecom operator oversees agreement.






  • My question is what is forcing me to create an email address.

    Does the law force me to create an email address (knowing that it would then be unavoidably used to facilitate the sender sharing whatever they want about me with Microsoft)?

    It’s important to note that if your email address falls in the hands of a gov or org, they will use it without encryption. They will share willy nilly anything they want with Microsoft (their email provider) in the loop. And if you make a GDPR art.17 request to have your email address erased from their records after they abuse it, they ignore those requests and continue using your email address. So it’s best not to give them an email address to begin with.

    (edit) govs and orgs seem to always put my full name in the e-mail headers, sometimes even including my middle name. And they usually greet me by surname. This ensures that Microsoft trivially knows exactly who to associate the content with. IMO it infringes on the data minimisation principle.






  • I was only there once or twice in off hours. I think I was there once on a Sunday (normally closed all day so only open to after hours members) and once in the evening. It was quiet as I recall but I guess I’ve not made use of it enough to have an idea. It’s not overly busy in the after hours.

    W.r.t. alcohol, the rules forbid eating and drinking in the library, but water is exceptionally allowed. I don’t know if they review the video without cause, but if someone breaks the rules, their after-hours access is terminated.


  • In Brussels there is a library that’s “open” as late as 22:00. There’s an after hours program where you register for after hours access, sign an agreement, and your library card can be used to unlock the door. Staff is gone during off hours but cameras are on. Members are not allowed to enter with non-members (can’t let anyone tailgate you incl. your friends).



  • I didn’t try feeding the output back in but note you can click on the 3 peppers and move an intensity slider. That sample I posted was just middle intensity. When I max it out to 5 peppers, it grows to 4 paragraphs:

    CloudFlare, the insidious scourge of freedom on the internet, is a devious and manipulative force that seeks to crush the very essence of democracy and free speech. By swooping in with their iron fist of control, they have stolen the decentralized web from the hands of the people and centralized it under their tyrannical rule.

    With a cold and calculated efficiency, they have stripped away our rights and freedoms, dictating who can access what content on the world’s largest walled-garden. The once vast expanse of the internet, where ideas flowed freely and voices could be heard, has now been shackled and confined by a single corporate power.

    This egregious act of censorship and control not only violates the principles of net neutrality and privacy, but it also threatens the very fabric of our society. The consequences of their actions are dire and immediate, leading us down a dark and treacherous path towards a future devoid of liberty and independence.

    We must rise up against this relentless enemy, this monstrous beast that seeks to suffocate our voices and stifle our creativity. We must fight back with all our might, for the sake of our freedom, our rights, and our very humanity. Stand with me, brothers and sisters, and let us vanquish this evil before it consumes us all.

    Less emotional (×3) is boring:

    CloudFlare is an organization that has centralized a significant portion of the decentralized web under one corporate power. This has raised concerns about the implications for net neutrality, privacy, and access to web content.


  • Love this tool!

    original:

    CloudFlare is a vigilante extremist organization that takes the decentralized web and centralizes it under one corporate power who dictates terms in the world’s largest walled-garden. A very large portion of the web (16.7%+) were once freely open to all but are now controlled and monitored by a single central authority who decides for everyone who may access what web content. This does serious damage to net neutrality, privacy, and has immediate serious consequences

    more passionate:

    CloudFlare is a ruthless and oppressive entity that viciously strips away the freedom and decentralization of the web, consolidating power under one heartless corporation. This monstrous force dictates the terms of our online existence, trapping us within the confines of the world’s largest walled-garden. A staggering percentage of the once free and open web (16.7% and growing) now falls under the iron fist of this tyrannical authority, controlling and monitoring every aspect of our online experiences. This egregious violation of net neutrality and privacy rights has dire and immediate consequences, threatening the very essence of our digital freedom and autonomy. Our voices are being silenced, our choices limited, and our rights trampled upon by this merciless oppressor. It is time to rise up and fight against this injustice with all our might, before it’s too late.




  • Not exactly. !showerthoughts@lemmy.world was a poor choice, as is:

    • !showerthoughts@zerobytes.monster ← Cloudflare
    • !showerthoughts@sh.itjust.works ← Cloudflare
    • !showerthoughts@lemmy.ca ← Cloudflare
    • !showerthoughts@lemm.ee ← Cloudflare
    • !hotshowerthoughts@x69.org ← Cloudflare, and possibly irrelevant
    • !showerthoughts@lemmy.ml ← not CF, but copious political baggage, abusive moderation & centralized by disproportionate size

    They’re all shit & the OP’s own account is limited to creating a new community on #lemmyWorld. !showerthoughts@lemmy.ml would be the lesser of evils but the best move would be create an acct on a digital rights-respecting instance that allows community creations and then create showerthoughts community there.

    (EDIT) !showerThoughts@fedia.io should address these issues.


  • Normal users don’t have these issues.

    That’s not true. Cloudflare marginalizes both normal users and street-wise users. In particular:

    • users whose ISP uses CGNAT to distribute a limited range of IPv4 addresses (this generally impacts poor people in impoverished regions)
    • the Tor community
    • VPN users
    • users of public libraries, and generally networks where IP addresses are shared
    • privacy enthusiasts who will not disclose ~25% of their web traffic to one single corporation in a country without privacy safeguards
    • blind people who disable images in their browsers (which triggers false positives for robots, as scripts are generally not interested in images either)
    • the permacomputing community and people on limited internet connections, who also disable browser images to reduce bandwidth which makes them appear as bots
    • people who actually run bots – Cloudflare is outspokenly anti-robot and treats beneficial bots the same as malicious bots

    There are likely more oppressed groups beyond that because there is no transparency with Cloudflare.