forgive my naivety, how does such a community avoid promoting ageism?
how bout baserow.io or nocodb cloud? Haven’t used them but I think they’re open source. But they don’t have mobile apps AFAIK for editing.
while the following is not really my threat model, wouldn’t a person who’s being targeted, say a journalist/activist, have a higher chance of their device being compromised (possibly even physically)? If so, would Session still be a valid option for them?
I wish for a new genie that grants wishes successfully but never tries or succeeds in cursing my wishes.
I’m curious about how to verify that these bots respect the rules. I don’t doubt that they do, since it might be a PR nightmare for these big tech companies if they don’t, but I don’t know how to verify them. Asking because I’m also doing this for my website.
By the way, LLMs are usually also trained by common crawl, (not sure to what extent), but I’m not sure whether you want to block common crawl.
Another thing to consider is whether your website is indexed and crawled by web archive, and whether web archive has some policy on AI bot crawlers and scrapers.
this is an interesting story but for those who prefer to read, here the article linked in the video description:
https://thefourth.media/apartments/
I also ran this through smmry to summarize. Below is the result:
The Apartments With No Entrance A shady land sale has left the residents of Sea Park Apartments locked in a decades-long land dispute, with no control over their own homes.
These apartments are “Enclosed” in more ways than one: The original developer of the apartments sold the apartment’s carpark and common areas - which surround the apartment blocks - to an individual, leaving residents in the unusual position of having their homes completely encircled by someone else’s private land.
Built in the 70s and completed in the early 80s, Sea Park Apartments is one of the earliest apartments in Petaling Jaya, if not the earliest, constructed at a time when most residential developments in the area still involved landed properties.
This meant residents had no way to access their homes without first trespassing on private property, and no control over the common facilities sited on that private land.
The individual who purchased the disputed lands is Yap Say Tee, who once managed a hotel owned by the developer, and was earlier approached by the developer to manage the car park at Sea Park Apartments.
With the developer’s sale of these lands to Yap, the rules of the game changed: The developer is no longer the registered owner of the disputed lands nor responsible for addressing the remonstrations of the residents, which reached a peak in 2013.
With the facilities on private land, access road on private land, the property value will go down, and residents will have no agency.
such a rad pic!
As much as I despise snap, this instance bring some questions into how other popular cross-linux platform app stores like flathub and nix-channels/packages provide guardrails against malwares.
I’m aware flathub has a “verified” checks for packages from the same maintainers/developers, but I’m unsure about nix-channels. Even then, flathub packages are not reviewed by anyone, are they?
Great explanation. Two question, what’s the likelihood of an SSO page being spoofed? This seems like an all-eggs-in-one-basket sitch, so what are the potential threats to this?
In the web version, there should be a button (eg see https://lemmy.world/post/1067695). On mobile apps, my guess is it depends. I usually do it manually, the old copy-and-paste, and also provide the link to the original post.
no clue, I’d love to know too.
Maybe crosspost or create a post on Mastodon and tag them (signal, protonvpn, protonmail, tutanota, …)
Wow they chose to semi-hijack a common acronym for explainable AI (XAI), for a new company that’s likely unethical. Why do companies do this, hijacking existing words with benevolent meanings then eventually dirty them?
Does defining in a “loop” work in C? Like
#define main A
#define A B
#define B C
…
#define Z main
Not related to warp, but just out of curiosity, which protocols have you tried? In one or two univs I visited, I had to switch to TCP instead UDP for it to work. Not sure why.
Airlines increasingly use facial recognition systems for when travelers board aircraft. Generally, a passenger looks into a camera, the system compares their face to images on file, and confirms if the passenger is who they claim to be.
I’m very confused by this. What is the justification for taking another picture? Usually government ID/passport already has a picture on it.
Unless they are pushing for full automatic ID confirmation (which is a very bad idea), the people at the boarding gate could just confirm with their eyes, no?
In addition, I could see this especially concerning for international students, foreigners and visa workers. The mentality is not to disturb the system and it is highly likely that they will submit without a fight. Those without a law background like in the article are less willing to stand there and argue.
I fear this will further create conformity for those around before take off. No one wants to be the little bugger that makes a scene or holds off the line. Plus, this will further foster such submissive mentality for international travelers (eg their friends, their family) to expect and submit to these intrusive practices without question or the possibility to repeal. Slowly this adds onto the 75% target, and then it will keep growing, to 97%, then to 100% …
do you know how this compares with other file transfer/sync like syncthing?
off topic about the site: does anyone have weird scrolling with it? It kept jumping to different pages for me.
anw, the tool looks really cool. Been looking for something that supports different mobile options like this.
Not OP. But I’m personally curious about the question regarding how decisions are made, but with more focus from the perspective of user experience. As in, how do they decide which features to focus on?
While I’m a fan of Proton, sometimes they seem to be doing too many things simultaneously, which is good but I worry them spreading themselves thin.
How do they do user experience research, especially with many people in the privacy community usually turning telemetry off? What do they rely on to make decisions about features and user experience? Do surveys work for them? Who make the decisions afterwards?
can you clarify on the 7?