

Maybe people will be satisfied when they can put their TV under a microscope to determine the actor’s sperm count…
Maybe people will be satisfied when they can put their TV under a microscope to determine the actor’s sperm count…
It’s been observed that the porn industry is often one of the first adapters of new media tech before they become commonplace, but I’m not sure some things need to be shown in that high a resolution.
Maybe, but immortality also tends to come with things like extraordinary capabilities for self repair and by extension disease resistance, so maybe they get some sort of error correcting code in their DNA replication to go with it.
Like any other account you occasionally need to update software and settings for. Then again I’m guessing you meant someone running an instance with more than just themselves using it.
Hard to say, things like Nextcloud, Immich, Emby, and Mealie probably get the most exercise, but being a tech person some of the more interesting are things like Security Onion and some of the infrastructure tools.
Yeah, though with things like the fediverse, generations that where born into the tech world (internet only really started to be a thing around high school for me, but my kids have never used dial up) and small cheap systems like raspberry pi I expect it’ll get much easier and hopefully more common.
Self host ALL the things. I know where all my pics and docs reside right here in my house.
I deleted one I didn’t even remember having. Something I created back when I first got a smart phone and as much as I recall think I used it for the primary phone login account and had my separate emails just in the client.
Only got reminded of it when they sent an email to my main address saying it had been inactive for years and was going to be deleted anyhow, so went through this process where they unlocked it after a month of waiting to see what was in there before shutting it down. Was pretty much blank from the start so it doesn’t really matter if they actually deleted it or not.
How my main email got set as a recovery is another question, probably just many years back brain not being so good at keeping online identities siloed.
How does one get so self important as to think that someone owes you a megaphone to the point you demand $50M for not letting you spout your drivel?
I’ve never knowingly engaged with a proper chat bot beyond the ‘virtual help desk’ things some sites use. By proper I mean some sizable system beyond what can be typically run at home.
Home ran ones are bizarre though, so far whatever I try they get stuck on go-to phrases and tend to return to specific formats of response over and over. Very much not passing the turing test.
DVD? walks my pet dinosaur out of the room
Really though, Labyrinth is the one that comes to mind.
That’s pretty well what I started with 20 years or so ago, had them in some little box with some funny Nvidia CPU. That go upped to a pair of 3 TB that have somewhere around 10 years uptime on them if I recall by now, and kind of spiraled from there. Rsync on a schedule is nice for that.
Just part of a lab built over the years. Primary storage is a Dell R730XD filled mostly with 12 TB drives all set up in a ZFS array comprised of mirror vdevs, so redundant by default plus the built in ZFS snapshots for the rare need for a rollback on a dataset.
It only recently got that big because I had a mixed set of drives going back years and finally decided to work on getting them all to the same size and picked 12 as a good cost/volume balance, can find them at used server parts shops for a bit over $100 each.
Major risk is I don’t have a good auto alert for smart monitor issues, so just make sure to occasionally manually copy the vital stuff like photos to an external drive.
How do you stream it if nobody downloads it to seed things? The whole premise of seed ratios isn’t just a bragging score, it’s aiding the communal health.
Besides, I have around 60 TB of space here, that’ll hold several versions of damn near every Linux distro out there for a while, it’d be a shame to waste it.
Despite being comprised of similar letters Lemmy and LLM are not interchangeable…
Right, I just use the term sometimes to say hiding things, even if it’s hidden via encrypting it.
Will have to delve into the papers for simplex later here, but in the end there needs to be some type of known identity to pin a communication to, otherwise you’ve already breached the confidentiality point of the security triad by not authenticating the recipient.
I would say no criminal uses public services to do their business, but then there was the whole Signal thing at the DOD…
It depends on how many layers of obfuscation you are looking to deal with. There always needs to be some publicly shared token to initiate a connection, even if that’s only the public key of a asymmetric key pair to a 3rd party auth system.
There are ways to do it, but part of the difficulty is there are so many ways to do it that coming to an agreed method is like herding cats.
Which means encrypted messaging without a backdoor would be illegal if this passes! That’s a slippery slope!
Metadata is not content, so no E2E would not be illegal. Metadata is things like who sent messages to who at what time, duration, volume of data, other externally parsable metrics like that.
Shocking, just incredible, unbelievable even…