t3rmit3
@t3rmit3@beehaw.org
- Comment on The cognitive dark forest 1 day ago:
Damages for what? They’re not making money if it’s free. It’s fine if it’s copied, the only time there would be damages is if they’d lost money.
Contributing in the open is the principle.
- Comment on Endgame for the Open Web 2 days ago:
Yeah, the protocols that corporations and governments rely on were (mostly) not their own creations, and they cannot feasibly change the underlying TCP/IP stack itself, which has quite a lot of ‘grey space’ baked into it in terms of controlling traffic. Even China, whose government could much more realistically create another alternative model with a totally different protocols (a la DTNs) and mandate domestic equipment use them (enabling them to block the current suite of protocols), just haven’t even bothered attempting that route because of how huge a lift it would be.
The biggest danger is probably national boundary isolation, which countries have moved further and further towards. This is not actually all that rare, and countries have a lot more ability to control cross-border network traffic than people probably realize (most people probably envision something akin to The Great Firewall, but that is explicitly about still facilitating north/south traffic at-scale).
Totally discrete ‘mini internets’ via e.g. mesh networks or directional wireless P2P bridges is totally doable, but generally not a way to avoid government scrutiny as it’s very easy to detect. If we ever get to a point where you’re not subscribing to an ISP for internet, but to ‘Disney Network’, with just their services (and add-on bundles for other services!), it’ll be in conjunction with regulatory capture to help them ‘protect’ against pirate (as in, un-controlled by government, not as in copyrights) networks.
- Comment on The cognitive dark forest 3 days ago:
You are creating your cool streaming platform in your bedroom. Nobody is stopping you, but if you succeed, if you get the signal out, if you are being noticed, the large platform with loads of cash can incorporate your specific innovations simply by throwing compute and capital at the problem. They can generate a variation of your innovation every few days, eventually they will be able to absorb your uniqueness. It’s just cash, and they have more of it than you.
So the safest bet again is to stay silent, or at least under the radar. Best bet is to not disrupt - succeed at all … ?
Except that ‘success’ in this interpretation seems to assume money, which the big company will beat you at obtaining. Success can just be about a FOSS version of a tool being out there for anyone who wants it, and no company is going to pay the AI costs to build tools they immediate MIT-license (and even if they do, there are then TWO new pieces of FOSS software!), so they may be able to beat you in creating a commodified product, but they aren’t and won’t and arguably intrinsically can’t beat you in bettering someone’s life by having a tool they didn’t before, for free.
We will again build and innovate in private, hide, not share knowledge, mistakes, ideas.
This is a sad reaction to capitalism capitalism-ing. You can’t beat the profit machine by trying to make your profit in the cracks it can’t see, you beat it by giving the thing it wants to profit off of away for free.
The vibrant public ecosystem that created all the innovation and moved it around the world will decline - the forums, the blogs, the “here’s how I built this” will move to local, private spaces.
I highly doubt this. I’ve seen no such shift in any tech space around me. If anything, I actually noticed that every Con I regularly attend has mentioned in their RFP emails that they are being flooded with proposed talks, so people should submit early before they fill up. If private spaces are also growing, that’s great!
I know this is ostensibly an article about Technology, but it’s also an article about Resistance, and frankly I think a lot of people run to models of competitive resistance instead of exploring disarming or evasive resistance. You can’t beat Capitalism at commodifying something, but you can prevent Capitalism from commodifying something by removing the characteristics (like cost and scarcity and control) that make something a commodity.
Code is one of the few things that can actually be freely and un-limitedly distributed and re-distributed, which makes it uniquely resistant to commodification, but only if the person making the code is not themself trying to commodify it.
There’s a reason that Linux has only gained ground over time.
- Comment on ‘The era of invincibility is over’: the week big tech was brought to heel 6 days ago:
I don’t think that’s what the parents or kids want, but I do think that’ll be what happens, yes.
- Comment on Metaverse inventor Neal Stephenson says VR goggles are dead 6 days ago:
It’s funny because literally in Snow Crash there are guys who wear giant head-mounted camera/ antenna/ hacking rigs, that the MC says are weirdos for doing it. The Metaverse in Snow Crash is a ‘full dive’ thing you basically plug into like the Matrix, not a headset. How they went and reversed those roles, and tried to market tiny screens strapped to your head as a Metaverse, is beyond me.
The absolute hubristic ignorance of tech bros, man…
- Comment on Number of AI chatbots ignoring human instructions increasing, study says 1 week ago:
LLMs don’t ‘scheme’, ‘plot’, or ‘deceive’, they just string together words based on complex weighted graphs.
The fact that a so-called “AI Safety Institute” has to attempt to (actually) deceive people by falsely attributing intent or thought or awareness to LLMs is hilarious. As usual, it’s not the computers that are bad, it’s the people.
- Comment on From Zip To Nought: The Rise And Fall Of Iomega 1 week ago:
IMO the Zip disks, Jaz disks, and MiniDiscs were the last really satisfying physical media formats (UMD was also really cool, but somehow even more niche given it was PSP-specific).
There was something about them that just made you feel like a secret agent using them. Like a prop out of a James Bond movie where the villain keeps their plans.
CDs and DVDs had nothing on them.
- Comment on Age checks creep into Linux as systemd gets a DOB field 1 week ago:
The Democratic Party as an apparatus is made up in large part by a bunch of neoliberal fascist-appeasers. Progressive are still a (growing) minority in the party. Leftists are nearly non-existent in it.
- Comment on OpenClaw Emperors 1 week ago:
Very cool way to conceptually structure agents.
- Comment on Windows 11 is finally getting a movable taskbar 1 week ago:
The shitty vibe-coded desktop environment/ window manager I made over the past month has a movable taskbar.
- Comment on Valve compares its loot boxes to Labubus in lawsuit defense 2 weeks ago:
Gambling systems always play into human psychology, and are always not in your favor.
So is poker not gambling? Mahjong? When it’s 4 people playing together (not at a casino, for instance), how can it always be you who has worse odds? That’s of course rhetorical; you actual have equal odds, barring cheating or simple skill differences.
And once you make “playing a game that you are likely to lose” as the litmus test for what is gambling, why would you play any competitive games? Half of a competitive bracket has to lose more than they won, by definition.
You are conflating gambling as it happens within controlled, predatory, capitalist institutions, with Gambling as a concept. Gambling is not immoral or harmful intrinsically, but gambling institutions that intentionally exploit addiction to gambling, are. Institutions that intentionally exploit addiction to alcohol or cigarettes or hoarding or whatever, also are. But it doesn’t make alcohol as a chemical compound itself, immoral.
- Comment on here's a challenge in the tech sphere: implementing nudges toward healthy phone usage. 2 weeks ago:
It does, but being Google they pulled the more granular controls like screen time settings into a dedicated app: Google Family Link
- Comment on here's a challenge in the tech sphere: implementing nudges toward healthy phone usage. 2 weeks ago:
Parental controls usually only require a password to unlock or bypass, so if you’re worried you’ll just unlock it yourself you may want to ask a trusted friend/ family/ partner to set the password for you.
- Comment on Valve compares its loot boxes to Labubus in lawsuit defense 3 weeks ago:
How so?
- Comment on Valve compares its loot boxes to Labubus in lawsuit defense 3 weeks ago:
I mean gambling in general, not just loot boxes or TCGs.
- Comment on Valve compares its loot boxes to Labubus in lawsuit defense 3 weeks ago:
Frankly, I don’t mind. I don’t love being accused of posting in bad faith and berated just because you forgot what you originally posted. Cheers.
- Comment on Valve compares its loot boxes to Labubus in lawsuit defense 3 weeks ago:
Yep. There are too many people who don’t understand addiction, and think that gambling is the root cause problem, rather than one of many systems that preys on addiction disorders.
The reality of addiction is that it will always find something to fulfill it without treatment, and banning or regulating every trend of collectibles that pops up is not an actual solution. Banning or regulating specific structures that intentionally prey on addiction is important.
Too many people mistake their objection to gambling that was inherited from the protestant moral objections, with actually being about solving predation on addiction.
- Comment on Android: sideloading blocked and open source updates withheld to twice a year 3 weeks ago:
MVV app is super convenient, but I could still use the kiosks without too much added delay. MVVswipe is like 30 seconds to “check out” a ticket, MVV kiosk machine is like 90 seconds. The biggest inconvenience is having to find a kiosk outside of a train station.
- Comment on Android: sideloading blocked and open source updates withheld to twice a year 3 weeks ago:
Holy hell it’s been a while since I heard that name… I remember putting Cyanogen on my PSP back in the day.
- Comment on ‘Devastating blow’: Atlassian lays off 1,600 workers ahead of AI push 3 weeks ago:
*laughing as Atlassian dies*
“I guess I was the…”
*puts on sunglasses*
“jeer-a all along.”
- Comment on ‘Devastating blow’: Atlassian lays off 1,600 workers ahead of AI push 3 weeks ago:
Somehow a multibillion dollar company can’t compete with an ancient quad core server shoved in a coat closet when it comes to page load times.
To be fair, it’s nearly impossible for remote sites to beat on-prem page load times, given the added per-component transit times over the internet.
- Comment on 14,000 routers are infected by malware that's highly resistant to takedowns 3 weeks ago:
That’s not what this commenter was doing, though.
So what do you think there were doing, exactly?
Let’s break their comment down, and then you can point out the part that is “extremist”.
14,000 sounds like a big number, until you realise that there’s many millions of routers.
This is 100% accurate, especially in the age of Mirai-like IoT botnets. 14k is pretty small nowadays. Variants of Mirai (e.g. Midori and Aisuru) had 300,000+ devices.
Asus is not known for backbone routing
Correct, this is a pretty low-danger botnet due to being low-power consumer devices, even if it’s difficult to clean.
so while this might be happening, you have to ask yourself, is this the biggest threat across the internet,
Less fair, because it is still news, and Ars is a tech news site.
or is this article intended to serve another interest?
The part I assume you take issue with, but it’s also a completely fair question (and is in fact precisely “telling people to question the purpose and bias of news”). The article made the deliberate choice to name-drop BitTorrent and IPFS, despite them not being related other than them also using DHTs. I understand the writer may not have been intending to draw a “malware <-> bittorrent” association in the readers’ minds… or they may have. It’s sort of like saying, “the killer drove an Audi, much like Nico Hulkenberg”. That’s why you have to critically question news.
what’s the point of this? To me it seems like an argument over the semantics of a word which I honestly couldn’t care less about
The point is that you immediately jumped to calling them an “extremist” for what seems a pretty innocuous (if not particularly useful) comment. We generally assume good-faith around here, and calling people “extremist” for questioning an Ars article doesn’t seem like that to me.
- Comment on 14,000 routers are infected by malware that's highly resistant to takedowns 3 weeks ago:
But in the society we live in, that position is pretty extreme.
By what metric? And “Extreme” and “Extremist” are two different words, with different meanings and connotations.
Extreme simply means the far end of a spectrum. Extremist means
having or involving beliefs that most people think are unreasonable and unacceptable
At no point did I ever say that it’s a bad thing to hold that position
Without offering any metric by which to assert that, you most certainly did convey the commonly understood negative connotation by calling it extremist.
- Comment on 14,000 routers are infected by malware that's highly resistant to takedowns 3 weeks ago:
So to be clear, asking whether an article has ulterior motives qualifies as an “extremist” question, in your eyes?
Because that seems a pretty extreme limitation on acceptable critical and contextual interrogation of news, to me.
- Comment on 14,000 routers are infected by malware that's highly resistant to takedowns 3 weeks ago:
That’s a misreading of what it means. The botnet averages 14,000 routers + IoT devices a day, not new devices per day. Every day, devices cycle in and out of these botnets, so their count is always in flux.
- Comment on 14,000 routers are infected by malware that's highly resistant to takedowns 3 weeks ago:
I don’t think anything Onno said is “extremist”, I just think it’s so vague that what they think might be happening is indecipherable. Makes it more likely to be rage/engagement bait, imo.
But it’s not extreme to think that perhaps, given the current anti-anonymity push among governments worldwide, and the fact this uses DHTs and P2P routing, governments might love to tarnish those things in peoples’ minds in order to more readily accept banning of bittorrent, onion routing, TOR, etc, which can help bypass a lot of the dangerous government net restrictions and surveillance being put in place.
Do you think that government intrusion into media, or the existence of online influence campaigns, are “extremist” conspiracies rather than proven realities?
- Comment on Exclusive: AI Error Likely Led to Iran Girl's School Bombing 3 weeks ago:
That would be a crazy turnabout given their public banning by Trump from being used by the USFG (mil included).
- Comment on What is a game that hits a similar itch for you as Divine Divinity? 3 weeks ago:
- Comment on VPNs Can’t Make You Anonymous Online. Don’t Be Fooled by Anyone Who Says They Can 4 weeks ago:
You can’t be sure, but you can use providers and exit nodes that are based in places hostile to whoever you are trying to protect against.
Also, functional anonymity can exist by different entities having different pieces of data that together would de-anonymize you, but who are unlikely to ever intersect. A good example of this is DMCA requests: if a copyright holder sees a US IP address on a residential Comcast IP, they’re going to file a court case and get a subpoena for the subscriber info. If they see a Hong Kong IP from a co-lo datacenter who would need to cooperate to tell them who owned that IP at that time, they’re not going to even bother because they don’t know how to even start filing a court case in China, and if your VPN has too much data it won’t even matter because no one will even have contacted them.
It all depends on your threat model.
- Comment on VPNs Can’t Make You Anonymous Online. Don’t Be Fooled by Anyone Who Says They Can 4 weeks ago:
There are people who get VPNs because they hear that they prevent your ISP from snooping on you when configured correctly, and just hear “no one can see what I do”, because that’s what snooping is, right?
When I worked at a university IT dept, we’d often get content block hits for adult websites from inside the internal protected network, via the university VPN, because a professor or staff member thought a VPN would route their traffic ‘past’ us.