cypherpunks
@cypherpunks@lemmy.ml
- Comment on Photographers Push Back on Facebook's 'Made with AI' Labels Triggered by Adobe Metadata. Do you agree “‘AI was used in this image’ is completely different than ‘Made with AI’”? 1 week ago:
brent rambo thumbs up kid gif animation meme
rare meta w
- Comment on The world we live in. I'm sure we will see someone bragging on the dark web 5 weeks ago:
- Comment on u all will learn the life cycle of frogs. 5 weeks ago:
np, you’re actually early
- Comment on Can I lick it? 2 months ago:
- Comment on bath time 2 months ago:
And sorry but I have no idea what you’re trying to say in your paragraph.
Let me try rephrasing it: Why do you think a manufacturer of a non-conformant product (who wants to be perceived as conformant) would intentionally use a nonstandard version of the mark, instead of the standard one? Note that the standard mark is not a certification or proof of conformance of any kind; it is merely a way for the manufacturer to affirm that they are conformant. It is illegal to sell non-conformant products in the European Economic Area regardless of if they carry the standard CE mark or not.
Regardless of why we’re literally looking at one in the OP. Which is, as if I need to repeat this, a literal suicide device.
Did you think we’re looking at an actual non-conformant product, and that it used a non-standard CE mark to deceive consumers? I thought it was pretty clear we were looking at a satirical fake product, and I assume the non-standard version of the CE mark was used unintentionally. If it was intentional, it was certainly not to deceive consumers but perhaps could have been an overcautious artist worried about trademark infringement.
FWIW i looked it up and the image in the post is an artwork titled “electric bath duck for suicidal tendency” created in 2001 by Nicolas Gaudron while he was at the Royal College of Art in London.
It was a brief meme in 2007, being featured on wired.com via ohgizmo.com via ubergizmo.com via gearfuse.com via haha.nu (this was back when there was more of a culture of attributing sources of things on the web). In 2011 it appeared on whokilledbambi.co.uk, and in 2016 it made it to /r/rubberducks.
- Comment on bath time 2 months ago:
I’m inclined to believe that it’s not just “not respecting the proportions” but rather manufacturers putting a fake logo to create the appearance of safety. From your link:
“The Commission was also aware of fraudulent misuse of the mark on products that did not comply with the standards, but that this is a separate issue.”
Why would you be inclined to believe that manufacturers of non-conformant products would be intentionally using an incorrect version of the logo instead of the correct one, which they could use just as easily?
And why haven’t you edited your comment to remove that image making the false claim that a CE mark with incorrect proportions is called a “China Export Symbol”?
- Comment on bath time 2 months ago:
The “China Export Symbol” resembling the CE marking is actually a racist urban legend
- Comment on Cheesing it up 2 months ago:
- Comment on Ask ChatGPT to pick a number between 1 and 100 2 months ago:
- Comment on Nepal tells Everest tourists to take their shit with them 3 months ago:
there is enough garbage there now that they could just make the tourist permit require everyone to bring down more than they take up with them
- Submitted 3 months ago to [deleted] | 32 comments
- Comment on [OC] Painting of my Water Bottle 3 months ago:
what was the prompt you used?
- Submitted 3 months ago to [deleted] | 9 comments
- Submitted 3 months ago to [deleted] | 18 comments
- Comment on Spider cats 3 months ago:
- Comment on Spider cats 3 months ago:
The spiders tell themselves that they’re keeping the tiny frogs around because they’re killing pests and also kind of cute but, really, there is a brain parasite in the frogs’ feces - tiny amounts of which are all over the floor of the spiders’ burrows - which makes the spider believe this.
- Submitted 4 months ago to [deleted] | 0 comments
- Comment on Doing the important work 4 months ago:
a properly constructed burrito is wrapped in aluminum foil and can be eaten, even while walking, without making a mess.
edible tape sounds like something with useful applications, but i am sad for the people who believe burritos require this.
- Comment on Please clap 5 months ago:
this meme using the verb found instead of reached is mildlyinfuriating
- Comment on 5 months ago:
the bizarrely shoehorned-in fictional culture of having a “number one” (literally only Picard used that nickname for Riker back in the day)
Number One was “the first character Gene wrote into the script” of The Cage (the pilot episode of the original series), according to Majel Barrett Roddenberry.
There are also many other characters called Number One in Star Trek and elsewhere.
According to some sources, calling the second-in-command/executive/first officer “number one” might have historically been a thing in the British Navy, but i don’t see a reliable source for that after a minute of searching so I’m not sure.
- Comment on Can't block admin? 5 months ago:
Works fine on Sync :,)
It sounds like Sync is either blocking users client-side (which would be confusing, since server-side blocks do exist), or it is trying and failing to add a block server-side but suppressing the server’s error message.
either way, it sounds like a bug.
do you know where the project’s github is so someone can open an issue about it? /s (explanation here on mouseover)
- Comment on [deleted] 1 year ago:
As with the Vice article it is based on, this video correctly observes that netflow data can deanonymize VPNs, but neither of them actually say what it can do to Tor.
But this video suggests using bridges and/or other proxies to access Tor, and implies that will help... somehow.
If you think about it logically, though, someone with access to netflow data probably has a good shot at defeating Tor whether you're using a proxy or not. It doesn't require netflow visibility of any of the Tor relays you're using - all that is needed is to be able to see the source and the destination and be able to correlate flows. Or, in the common case of attributing an image or video published somewhere, adversaries don't even need netflow data at the destination server, because the amount of data and the timestamp is already public - they just need netflow data of a population that includes the uploader.
In other words, Tor can be broken not only by a powerful "Global Passive Adversary" like the NSA, or a customer of Team Cymru's with data from vantage points all over the world - if your adversary is just your employer or university or someone at your local ISP, Tor can also be defeated in many cases, even if you use a proxy or VPN to access it.
Netflow data is collected by most corporate and university networks today.
Despite all of that, I'm still using Tor for many things because there isn't really a better alternative today. Tor prevents websites from knowing where I am and otherwise tracking my browsing, and unlike a VPN it doesn't require me to record my location with an entity I maintain a persistent relationship with. But it is important to realize that Tor is not a silver bullet. Videos like this often give the impression that Tor is much stronger than it is.
N.B. because I am using Tor right now, I see that the tor-recommending author of the linked video hosts their blog on a platform that appears to block Tor (or at least is blocking the several exits i just tried...).
- Submitted 1 year ago to errydinaffal@nrsk.no | 1 comment
- Submitted 2 years ago to privacy@lemmy.ml | 0 comments
- US Congress Proposes $500 Million of Additional Funding for Negative News Coverage of Chinaprospect.org ↗Submitted 2 years ago to china@lemmy.ml | 0 comments
- weirdo rapper Heather "Razzlekhan" Morgan and her husband Ilya "Dutch" Lichtenstein arrested for alleged conspiracy to launder $4.5 Billion USD worth of bitcoin stolen in bitfinex hack (linkdump)www.justice.gov ↗Submitted 2 years ago to technology@lemmy.ml | 0 comments
- Submitted 2 years ago to privacy@lemmy.ml | 0 comments
- Comment on What FOSS TTS should I use? 2 years ago:
My understanding is that Mozilla is continuing to build the CommonVoice dataset for training speech models, but they are no longer developing TTS or STT software themselves.
https://github.com/coqui-ai/TTS is the new home of what was Mozilla's TTS project. Coqui is a new company where some of the former mozilla speech team ended up. Coqui is continuing to develop both the TTS and STT code and models.
- https://tts.readthedocs.io/en/latest/
- https://stt.readthedocs.io/en/latest/
There are a number of other much older free software TTS options, but Coqui's (formerly Mozilla's) is by far the best one I've heard.
- Submitted 2 years ago to opensource@lemmy.ml | 0 comments
- Comment on Fixing the Linux Kernel Vulnerability CVE-2022-0185 2 years ago:
Does it fix anything for Linux users who don't use kubernetes? The vast majority of don't. The obvious way everyone should fix CVE-2022-0185 today is by upgrading their kernel. If your distro hasn't shipped an update with the fix yet, you should find a new distro.
I was hoping that this link would tell me about the process of writing the Linux kernel patch (which I of course upgraded to already) which fixed the bug.
Instead I found an advertisement for a kubernetes-related product. I have no idea if "AccuKnox" is any good, but I do know that at this point in time nobody should be "fixing" CVE-2022-0185 by installing it - the correct fix is to upgrade Linux.
Perhaps this product is a good idea for kubernetes users to mitigate the next unprivileged user namespace related vulnerability; I stopped reading when I realized it was all about kubernetes.
Another good mitigation for Linux users in general is to simply disable unprivileged user namespaces altogether :)