for creating invidious links

  • 163 Posts
Joined 1Y ago
Cake day: May 17, 2020

Simple Pomodoro Timer Bash Script

Nice litte command line pomodoro script … …

This does not answer your exact question, which would involve looking at how an average user comes to acquire a web browser in the first place, but rather why someone would choose to use Chrome over say, Firefox. A comment just came across a HN comments section [1]:

  • Switched a couple of years ago from Firefox because of better dev tools.

  • GPU acceleration doesn’t work properly with Firefox/Linux (Dell G5 SE, Ryzen 4800H). Some sites I use daily, such as Google Maps, are painfully slow/laggy on Firefox.

  • There’s something about the Firefox’s scrolling behaviour that I find really annoying.

  • It works well across all platforms (Firefox on Android wasn’t great last time I checked).

  • It’s the most tested browser. Many websites don’t bother to testing with Firefox.

  • Chrome has the richest extension ecosystem.

  • Some of the alternatives, such as Brave are not as trustworthy. Security is a bigger concern than privacy for me. Google has one of the best security track records.

  • I’m heavily invested in the Google ecosystem, and I use dozens of their products. There’s always a switching cost involved. Just changing the browser has a negligable effect on privacy if I’m constantly using the other Google services.

  • Personally had overall an overwhelmingly positive experience over the last 15+ years I’ve been in the Google ecosystem. Google hasn’t done anything to betray my trust so far.


I am all for denoucing greed and think the rich should be taxed a lot more than they are and they must be given less options to avoid taxes, but that post is just a little “silly”.

I somewhat know what you mean, it reminds me a bit of a post saying something like “today my 5 year-old asked me why the founder of amazon makes more in an hour than I make in a year”;

however, in terms of silly, taking a philosophical position against greed and how many tax loopholes legislators should give the rich is a bit more silly than someone who takes the initiative to do some back of napkin math and proactively post it to an audience of millions in attempt to stir some action.

If someone is serious about changing tax laws, one thing they could do is contact their representatives. If they live in the US, they can be found here:

If they are in the EU, they could start here:

Other places with representation probably have information posted online as well.

On another hand, trying to change legislation by contacting representatives may be so ineffectual it’s as silly as proclaiming the laws should be different …

Seriously though, I would rather see more substantial content then somewhat sensational numbers thrown around on retweet bait on social media, but I’m not really in a position to judge since I’m not doing anything else about it.

Finally, if you can’t find anyone you know in the invitation tree and didn’t author something posted to the site, consider joining the community in the chat room.

It’s a difficult question in this day and age where balance of fire power between people and government is so mismatched. It might almost be more relevant to think in terms of cyber capabilities.

This passage from Georgetown professor and historian Carroll Quigley always comes to mind when people talk about the American 2nd amendment being a safeguard against totalitarianism. I don’t know the answer.

On the military level in Western Civilization in the twentieth century the chief development has been a steady increase in the complexity and the cost of weapons. When weapons are cheap to get and so easy to use that almost anvone can use them after a short period of training, armies are generally made up of large masses of amateur soldiers. Such weapons we call “amateur weapons,” and such armies we might call “mass armies of citizen-soldiers.” The Age of Pericles in Classical Greece and the nineteenth century in Western Civilization were periods of amateur weapons and citizen-soldiers. But the nineteenth century was preceded (as was the Age of Pericles also) by a period in which weapons were expensive and required long training in their use. Such weapons we call “specialist” weapons.

Periods of specialist weapons are generally periods of small armies of professional soldiers (usually mercenaries). In a period of specialist weapons the minority who have such weapons can usually force the majority who lack them to obey; thus a period of specialist weapons tends to give rise to a period of minority rule and authoritarian government. But a period of amateur weapons is a period in which all men are roughly equal in military power, a majority- can compel a minority to yield, and majority rule or even democratic government tends to rise.

In the link it breaks it down by device and FF does a bit better on desktop. Mobile is such a beast now.

As of April 2021: …

This came up recently with regard to who they are testing it on:

Google have announced that they will not make their FLoC (Federated Learning of Cohorts) targeting solution available for origin testing in Europe, mooting plans to trial the technology in the region this month. The decision comes amidst concerns that the method, which forms part of the tech giant’s post-cookie Privacy Sandbox, violates GDPR and the ePrivacy Directive.

The move was announced at a meeting of the Improving Web Advertising Business Group (IWABG) at the World Wide Web Consortium yesterday (23rd March), where Google engineer Michael Kleber admitted that FLoC may be incongruent with EU privacy legislation. A lack of clarity over who will be responsible for controlling and processing data to create the cohorts, as well as the potential use of FLoC IDs and a current uncertainty over whether internet users can feasibly give explicit consent for how their information is used under the technology could put the cookie-replacement on the wrong side of Europe’s key data laws.

Kleber’s statement was later backed-up by a tweet from Chrome product manager Marshall Vale, which said that the search leader will begin a “FLoC origin trial for users in the US and select other countries, and we expect to make FLoC available for testing worldwide at a later date.” Vale was keen to emphasise that FLoC will make it to Europe eventually, writing in a follow-up tweet that Google “are 100% committed to the Privacy Sandbox in Europe.” (

It’s too bad Google didn’t comment. It could be a complicated policy that in part would involve preventing attackers from identifying minority targets via invasive GA categorisation algos. They are facing this challenge right now with w3c privacy reviews of FLoC.

Substitute attackers for advertisers in the following:

For this investigation, we sought to learn whether advertisers could use Google Ads to find social justice videos on which to advertise.

White-hat hacking event shows yet again why there’s no such thing as foolproof security against modern attacks…

SMAT (Social Media Analysis Toolkit)

Found this browsing through Mozilla experiments (e.g. News and Disinformation Study) … interesting tool for analyzing social media trends…

Not a concrete answer, but for me and several others in this distro hopping lemmy thread, a gateway drug into adopting linux was running a VM on a traditional OS. Perhaps identify groups which promote VM trials would be one approach.

Another gateway seems to be use of linux recovery disks where users boot into linux to recover data on a broken installation.

Taken at face value, many might support this news as the anonymous source cites extremist acts as cause for extracurricular monitoring …

In the article, it mentions:

Nobody bit – but as SCO Group had extracted a $50m war chest from investors, there was everything to be gained by carrying on anyway.

This 2016 article calls out Microsoft as a SCO string puller:

SCO’s Linux lawsuit made no sense. Over time it became clear that Microsoft was using SCO as a sock puppet against Linux. Unfortunately for both, it soon became abundantly clear that SCO didn’t have a real case against Linux and its allies. (

with the claim pointing all the way back to 2003: Cyber Cynic: The Microsoft-SCO Connection:

At the end of the present article it asks:

Last time, the fear wasn’t that SCO Group had a strong case, it was that with something so odd and messy in court, anything could happen. This time, the only question is who on Earth is pumping their money into such an uninviting machine?

If its not Microsoft with their newfound love of linux, who would it be?

According to a Check Point Research analysis released on Wednesday the malware masqueraded as an app called “FlixOnline” which advertised via WhatsApp messages promising “2 Months of Netflix Premium Free Anywhere in the World for 60 days.” But once installed the malware sets about stealing data a…

In this example, retailers with a variety of circumstances and degrees of legitimacy are trying to register subdomains as separate entities to skirt limits on data sent by the higher level domain. …

my only addition is if you happen to have a hidpi screen, check out if your choice does well with fractional scaling. My experience a couple years ago was that Mate for example didn’t do so well but that may have changed.

Some of us were really naive and believed these companies were trying to change the world and we were part of an experiment which would deliver on these promises. We wanted to supply our data for the cause.

Basically we accepted the drink pusher because we were at the bar dreaming digital dreams. For some of us, like the author, it was nearly too late when seats on the board were auctioned to Wall St (I think of Ruth Porat joining Google as a watershed moment) and VC and private equity started making offers too good to resist. The culture may have always had a dotcom (and earlier yet) quick fortune mindset, but the scale of advertising harassment was hard to imagine for what she calls tech super users. Maybe future generations will look back in astonishment at what we tolerated…

Interesting tool that fetches all urls from a domain … I was able to find some references to old dead links on my own domains amongst other things … …

getallurls (gau)

Nice. I should have checked the date, it came via RSS.

Good, if somewhat idealistic, overview of ActivityPub capabilities across the fediverse…

The no spam rule hopefully covers most of the egregious reposts seen on other sites. It’s difficult to formulate a rule that captures the spirit of “I know a bad repost when I see it”, so something relatively permissive seems reasonable to account the nobody saw it case.

That sounded reasonable enough to do my own research

In 2014, Google pitted one of its machine learning algorithms against humans in solving the most distorted text CAPTCHAs: the computer got the test right 99.8 percent of the time, while the humans got a mere 33 percent.

I’m not convinced, but maybe they double check their work this way?

Does the full movie say what is green?

Where does the idea that they use captcha for training come from? How does it already know the answers if it is asking you to provide them? Maybe it is some complicated probability thing that I don’t understand…

These S-Poles are expected to improve urban landscapes and enhance the safety, welfare and convenience for our Seoul citizens. They will also serve as charging stations for drones and electric vehicles, bringing the city one step closer to becoming a smart city.”…

An idea to decentralise a bit is appealing. Not sure about formalising instance as topic ideas or adding additional plumbing for community exploration (a recommended instance list on other instances might be a good step towards some better feature?)

Another thing which might help is creating a third tier to the deny/allow list which allows solo or small instances to post on other instances without necessarily allowing all their content in. Like Deny/Allow/Participate. This would also expose these instances by dint of usernames without building out additional features at this moment. There could be unintended consequences but the current model is not encouraging small instances that don’t want to have to have a vote from the central committee to participate.

Nice ideas, good to see them being put out there.

Did this get on any of the big sites? I would be curious how it handles thousands of simultaneous connections.

App Store Now Rejecting Apps Using Third-Party SDKs That Collect User Data Without Consent

As the launch of this new option approaches, Apple has begun to reject apps using third-party SDKs that collect user data without consent. Developers can implement some SDKs that help them track users by a method called “device fingerprinting,” which uses multiple attributes such as the device mod…

Google Is Testing Its Controversial New Ad Targeting Tech in Millions

Hopefully nobody here is still using chrome on personal machines, but good to know …

Having run my iphone (with every possible option turned off) through a proxy and seeing the amount of apple specific tracking that still goes on it is mind boggling. Hard to believe google is doing 20x. All the f-droid etc users have more reason to rejoice. …

The m&a march goes on … …

What is a good email provider for a custom domain?

What I have found so far: …

Using FOIA logs to develop news stories

Since most agencies keep a log of requests received FOIA minded reporters can find interesting story ideas by asking for and digging through the history of what other people are looking to obtain. Some FOIA logs are posted on the websites of agencies that proactively release these records…

Yawn in the presence of your pooch and they’re likely to yawn right back at you, a new study shows. …