litchralee
@litchralee@sh.itjust.works
- Comment on why is the beginning on the left and the end on the right? 4 days ago:
Approximately 90% of people are right-handed. In European writing systems that use quills and pens, left-to-right makes more sense so that you can hold the pen in your right hand and drag it rightward, not into the ink you just laid down.
In East Asia, before writing on paper was a thing, they wrote using inscribed bone, but then eventually moved to vertical wood boards, bound together by string. Each character on the board would be ready from top-to-bottom, and then move to the next board. The most logical choice for a right handed person is to stack the wood pile on their left, and use their right hand to draw the next board to meet their gaze, then set it down on their right. For this reason, the historical writing system common to China, Japan, Korea, and Vietnam for centuries was read right-to-left. But the native Korean script is left-to-right, as is the modern Vietnamese script. And Chinese and Japanese in the 20th Century switched to left-to-right. And yet, Japanese books are still ordered “backwards” so that the title page is what Westerners would say is the back of the book, and manga panels are read from the right side toward the left.
It all boils down to right handedness, but it depends on whether your hand is moving, or the page is moving.
- Comment on What powers does the Secret Service have and exhibit to protect the POTUS? 1 week ago:
I’ve only heard bits and pieces of this from friends and strangers through some specific events so far
Can you tell us what bits you’ve heard, so that we don’t have to give redundant answers?
- Comment on Would we be seeing these emails involving Epstein if they were all using E2EE email service? 1 week ago:
The catch with everything that implements E2EE is that, at the end of the day, the humans at each end of the message have to decrypt the message to read it. And that process can leave trails, with the most sophisticated being variations of Van Eck phreaking (spying on a CRT monitor by detecting EM waves), and the least sophisticated being someone that glances over the person’s shoulder and sees the messages on their phone.
In the middle would be cache files left on a phone or from a web browser, and these are the most damning because they will just be laying there, unknown, waiting to be discovered. Whereas the techniques above are active attacks, which require good timing to get even one message.
The other avenue is if anyone in the conversation has screenshots of the convo, or if they’re old-school and actually print out each conversation into paper. Especially if they’re an informant or want to catalog some blackmail for later use.
In short, opsec is hard to do 100% of the time. And it’s the 1% of slip-ups that can give away the game.
- Comment on Are there any reputable cybersecurity experts that I could just email them to ask for free advice? 1 week ago:
The simple answer is probably no, because even where those experts aren’t driven solely by the pursuit of money – as in, they might actually want to improve the state of the art, protect people from harm, prevent the encroachment of the surveillance state, etc… – they are still only human. And that means they have only so much time on this blue earth. If they spend their time answering simple questions that could have been found on the first page of a web search, that’s taking time away from other pursuits in the field.
Necessarily then, don’t be surprised if some experts ask for a minimum consultation fee, as a way to weed out the trivial stuff. If nothing else, if their labor is to have any meaning at all when they do their work professionally, they must value it consistently as a non-zero quality. Do not demand that people value their labor at zero.
With that out of the way, if you do have a question that can’t be answered by searching existing literature or the web, then the next best is to ask in an informal forum, like here on Lemmy. Worst case is that no one else knows. But best case is that someone works in the field and is bored on their lunch break, so they’ll help point you into the right direction.
Above all, what you absolutely must not do is something like emailing a public mailing list for cryptography experts, gathered to examine the requirements of internet security, to look at your handmade data encryption scheme, which is so faulty that it is caused third-party embarrassment when read a decade later.
You were in fact lucky that they paid any attention at all to your proposal, and they’ve already given you many hundreds if not thousands of dollars worth of free consultancy between them
Don’t be the person that causes someone to be have to write this.
- Comment on If the government raided your house and found a bunch of .mkv files but you insist its all legally obtained, how do they ascertain if they are actually pirated or not? 1 week ago:
There are separate criminal and civil offenses when it comes to copyright infringement, assuming USA. Very generally, under criminal law, it is an offense to distribute copyrighted material without the right or license to do so. Note the word “distribute”, meaning that the crime relates to the act of copying and sharing the work, and usually does not include the receiving of such a work.
That is to say, it’s generally understood that mere possession of a copyrighted work is not sufficient to prove that it was in your possession for the purpose of later distribution. A criminal pprosecution would have to show that you did, in fact, infringe the copyright by distributing a copy to someone or somewhere else.
Separately, civil penalties can be sought by the copyright owner, against someone found either distributing their work, or possessing the work without a license. In this case, the copyright owner has to do the legwork to identify offenders, and then would file a civil lawsuit against them. The government is uninvolved with this, except to the extent that the court is a branch of the federal government. The penalty would be money damage, and while a judgement could be quite large – due to the insanity of minimum damages, courtesy of the DMCA – there is no prospect of jail time here.
So as an example, buying a bootleg DVD for $2 and keeping it in your house would not accrue criminal liability, although if police were searching your house – which they can only do with a warrant, or your consent – they could rip-off the copyright owner and you could late receive a civil lawsuit.
Likewise, downloading media using Megaupload, usually also doesn’t meet the “distribution” requirement in criminal law, but still opens the door to civil liability if the copyright owner discovers it. However, something like BitTorrent which uploads to other peers, that would meet the distribution requirement.
To that end, if officers searching your home – make sure to say that you don’t consent to any searches – find a running BitTorrent server and it’s actively sharing copyrighted media, that’s criminal and civil liability. But if they only find the media but can’t find evidence of actual uploading/distributing, and can’t get evidence from the ISP or anyone else, then the criminal case would be non-existent.
- Comment on Before social media/internet/cell phones/landlines/payphones; how would 2 friends living across the same city arrange in person meetings and stay in touch? 2 weeks ago:
If this is about that period of human history where we had long-distance transportation (ie railroads) but didn’t yet have mass communication infrastructure that isn’t the postal service – so 1830s to 1860s – then I think the answer is to just plan to meet the other person at a certain place every month.
To use modern parlance, put a recurring meeting on their calendar.
- Comment on Why there is no clock that displays time 4:20:69 ? 2 weeks ago:
It can be, although the example I’ve given where each counter is a discrete part is probably no longer the case. It’s likely that larger ICs which encompass all the requisite functionality can do the job, at lower cost than individual parts.
But those ICs probably can’t do 4:20:69, so I didn’t bother mentioning that.
- Comment on Why there is no clock that displays time 4:20:69 ? 2 weeks ago:
I should point out that for the hour counter, it’s only a 5 bit counter, since the max value for hours is 23, which fits into 5 bits.
So 566 is not quite the devil’s work, but certainly very close.
- Comment on Why there is no clock that displays time 4:20:69 ? 2 weeks ago:
(I’m going to take the question seriously)
Supposing that you’re asking about a digital clock as a standalone appliance – because doing the 69th second in software would be trivial, and doing it with an analog clock is nigh impossible – I believe it can be done.
A run-of-the-mill digital clock uses what’s known as a 7-segment display, one for each of the digits of the time. It’s called 7-segment (or 7-seg) because there are seven distinct lines that can be lit up or darkened, which will write out a number between 0 to 9.
In this way, six 7seg displays and some commas are sufficient to build a digital clock. However, we need to carefully consider whether the 7seg displays have all seven segments. In some commercial applications, where it’s known that some numbers will never appear, they will actually remove some segments, to save cost.
For example, in the typical American digital clock, the time is displayed in 12-hour time. This means the left digit of the hour will only ever be 0 or 1. So some cheap clocks will actually choose to build that digit using just 2 segments. When the hour is 10 or greater, those 2 segments can display the necessary!number 1. When the hour is less than 10, they just don’t light up that digit at all. This also makes the clock incapable of 24-hour time.
Fortunately though, to implement your idea of the 69th second, we don’t have this problem. Although it’s true that the left digit of the seconds only goes from 0 to 5 inclusive, the fact remains that those digits do actually require all 7 segments of a 7seg display. So we can display a number six without issue.
Now, as for how to modify the digital clock circuitry, that’s a bit harder but not impossible. The classic construction of a digital clock is as follows: the 60 Hz AC line frequency (or 50 Hz outside North America) is passed from the high-voltage circuitry to the low-voltage circuitry using an opto-isolator, which turns it into a square wave that oscillates 60 times per second.
Specifically, there are 120 transitions per second, with 60 of them being a low-to-high transition and the other 60 being a high-to-low transition. Let’s say we only care about the low-to-high. We now send that signal to a counter circuit, which is very similar to a mechanical odometer. For every transition of the oscillating signal, the counter advances by one. The counter counts in binary, and has six bits, because our goal is to count up to 60, to know when a full second has elapsed. We pair the counter with an AND circuit, which is checking for when the counter has the value 111100 (that’s 60 in decimal). If so, the AND will force the next value of the countet to 000000, and so this counter resets every 1 second.
This new signal is a 1 Hz signal, also known as 1PPS (pulse per second). We can now feed this into another similar counter that resets at 60, which gives us a signal when a minute (60 seconds) has elapsed. And from that counter, we can feed it into yet another counter, for when 1 hour (60 minutes) has passed. And yet again, we can feed that too into a counter for either 12 hours or 24 hours.
In this way, the final three counters are recording the time in seconds, minutes, and hours, which is the whole point of a clock appliance. But these counters are in binary; how do we turn on the 7seg display to show the numbers? This final aspect is handled using dedicated chips for the task, known as 7seg drivers. Although the simplest chips will drive only a single digit, there are variants that handle two adjacent digits, which we will use. Such a chip accepts a 7 bit binary value and has a lookup table to display the correct pair of digits on the 7seg displays. Suppose the input is 0101010 (42 in decimal), then the driver will illuminate four segments on the left (to make the number 4) and five segments on the right (to make the number 5). Note that our counter is 6 bits but the driver accepts 7 bits; this is tolerable because the left-most bit is usually forced to always be zero (more on this later).
So that’s how a simple digital clock works. Now we modify it for 69th second operation. The first issue is that our 6-bit counter for seconds will only go from 0-59 inclusive. We can fix this by replacing it with a 7 bit counter, and then modifying the AND circuit to keep advancing after 59, but only when the hour=04 and minute=20. This way, the clock works as normal for all times except 4:20. And when it’s actually 4:20, the seconds will advance through 59 and get to 60. And 61, 62, and so on.
But we must make sure to stop it after 69, so we need another AND circuit to detect when the counter reaches 69. And more importantly, we can’t just zero out the counter; we must force the next counter value to be 10, because otherwise the time is wrong.
It’s very easy to zero out a counter, but it takes a bit of extra circuitry to load a specific value into the counter. But it took can be done. And if we do that, we finally have counters suitable for 69th second operation. Because numbers 64 and higher require 7 bits to represent in binary, we can provide the 7th bit to the 7seg driver, and it will show the numbers correctly on the 7seg display without any further changes.
TL;DR: it can absolutely be done, with only some small amount of EE work
- Comment on How does capitalism differ from crony capitalism? 2 weeks ago:
as someone has to lead
At this particular moment, the people of Minnesota are self-organizing the resistance against the invasion of their state, with no unified leadership structure in place. So I wouldn’t say it’s always mandatory.
Long live l’etoile du nord.
- Comment on What are super-computers used for ? 2 weeks ago:
An indisputable use-case for supercomputers is the computation of next-day and next-week weather models. By definition, a next-day weather prediction is utterly useless if it takes longer than a day to compute. And is progressively more useful if it can be computed even an hour faster, since that’s more time to warn motorists to stay off the road, more time to plan evacuation routes, more time for farmers to adjust crop management, more time for everything. NOAA in the USA draws in sensor data from all of North America, and since weather is locally-affecting but globally-influenced, this still isn’t enough for a perfect weather model. Even today, there is more data that could be consumed by models, but cannot due to making the predictions take longer. The only solution there is to raise the bar yet again, expanding the supercomputers used.
Supercomputers are not super because they’re bigger. They are super because they can do gargantuan tasks within the required deadlines.
- Comment on 2026 savings distribution feedback 2 weeks ago:
I don’t think you’ve listed what you (and your partner’s?) financial timeline is. The number of years you have until needing to draw upon the nestegg is crucial for any discussion that involves retirement savings.
Also, I may want to also post to !personalfinance@lemmy.ml
- Comment on I have two questions 3 weeks ago:
In the spirit of c/nostupidquestion’s Rule 1, asking two unrelated questions does not seem like it would accrue high-quality answers to either. And I see you’ve already added another post focusing on the first question.
Since it doesn’t cost 50 cents to make an additional post, I would suggest giving each question its own post. It would keep the discussion more focused, and actual answers should result.
- Comment on Do you think all monopolies should be split into different companies, and then given to the workers who would collectivize them? 3 weeks ago:
Consider the following three types of monopolies:
There are monopolies where a single entity has entrenched their position by having the categorically superior product, so far ahead of any competition and while no barriers are erected to prevent competitors, there simply is no hope and they will all play second fiddle. This type of monopoly doesn’t really exist, except for a transient moment, for if there initially wasn’t a barrier, there soon will be: as market leader, the monopolist accumulates capital that at best is unavailable to the competitors (ie zero sum resources, like land or labor), and at worst stands in the way of free competition (eg brand recognition, legally -recognized intellectual property).
The second type is the steady-state scenario following the first, which is a monopoly that benefits from or actively enforces barriers against their competitors. Intellectual property (eg Disney) can be viewed as akin to the conventional means of production (land, labor, capital), so the monopolist that controls the usable land or can hire the best labor will cement their position as monopolist. In economic terms, we could say that the cost to overturn the monopolist is very high, and so perhaps it’s economically reasonable to be a second-tier manufacturer rather than going up against the giant. The key ingredient for the monopolist is having that structure in place, to keep everyone else at bay.
The third type is the oddball, for it’s what we might call a “natural” or “practical” monopoly. While land, labor, and capital are indeed limited, what happens when it’s actually so limited that there’s basically only one? It’s a bit hard to conceptualize having just one plot of land (maybe an island?) or having just one Dollar, but consider a single person who has such specialized knowledge that she is the only such person in the world. Do we say she is a monopolist because she can command whatever price she wants for her labor? Is she a monopolist because she does not share her knowledge-capital? What if she physically can’t, for the knowledge is actually experience, honed over a lifetime? If it took her a lifetime to develop, then she may already lack the remaining lifetime to teach someone else for their lifetime.
I use this example to segue to the more-customary example of a natural monopoly: the local electricity distribution system, not to be confused with the electric grid at-large, which also includes long-distance power lines. The distinction is as follows: the big, long power lines can compete with each other, taking different routes over terrain, under water, or sometimes even partially conducting through the earth itself. But consider that at a local level, on a residential street, there can practically only be a single distributor circuit for the neighborhood.
I cannot be served by Provider X’s wires while Co-Op Y’s wires serve my neighbor, and Corpo Z’s wires serve the school down the road. Going back to the convention means of production, we could say there is only one plot of land available to run these distributor circuits. So at most one entity can own and operate those wires.
Laying all that background, let’s look at your titular question. For monopoly types 1 and 2, it’s entirely feasible to divide and collectivize those monopolies. But it’s the natural monopolies that are problematic: if you divide them up (let’s say geographically) and then collectivize them, there will still only ever be one “owner” of the distribution lines. You cannot have Collective A own a few meters of wire, and then Collective B owns a few meters in between, all while Collective C is connected at the end of the street. The movement of electric power is amenable to such granular collectivization.
To that end, the practical result is the same no matter how you examine it: a natural monopoly is one which cannot feasibly be split up, even when there’s the will to do so. Generalizing quite a lot, capitalists would approach a natural monopoly with intent to exploit it for pure profit, while social democrats would seek to regulate natural monopolies (eg US State’s public utilities commissions), and democratic socialists would want to push for state ownership of all natural monopolies, while communists would seek to dissolution of the state and have the natural monopoly serve everyone “according to their need”.
- Comment on How do I feel comfortable/safe going outside by myself after being so used to have parent(s) be with me outside most of my life? 4 weeks ago:
I grew up in a suburban neighborhood that was built to only encourage driving and discouraged everything else, so my parents also took me most places during my teenage years. The cul-de-sacs made it particularly hard to walk to anything interesting, even though such destinations were actually fairly close by, as the crow flies.
What I would suggest is that if there aren’t many interesting destinations to start with, perhaps the walk itself can be of interest. Unless the walk to the mall is along a surface freeway with no soundwall – an actual occurrence in my hometown – you might start with an out-and-back trek to the mall, observing whatever architecture, people, or activities are visible. Think of it like people-watching, but less awkward because you’re just passing by, not stopping to stare.
As another commenter wrote, getting comfortable with something is a matter of doing it, first in a controlled manner and then gradually broadening your horizons.
But if this still isn’t a workable plan, then perhaps plan a day out to the 1-hour-away park, taking some time to explore what’s just outside that park. It’s not cheating to use a car to get to a more walkable area. The walk should be the adventure.
I wish you the best of luck!
- Comment on How do I feel comfortable/safe going outside by myself after being so used to have parent(s) be with me outside most of my life? 4 weeks ago:
Is there anything near your home that you can walk to, to start? A park, a convenience store, or even just a friend’s house? I would start with those destinations, and then work your way to farther journeys. My presumption is that there are at least sidewalks and crosswalks near you, as some parts of the USA are genuinely built in the most pedestrian-hostile way.
Those farther journeys need not be on foot, but you could take a bus, a bike, or anything else that’s available to you.
- Comment on I'm looking for the best free online storage site my files. That is heavily encrypted and respect people's privacy, what would you suggest? 5 weeks ago:
“how I found about Harry Potter’s sex with Gwen from Spiderman…and broke aes256 in the process”
Breaking open the S(ex) box lol
Also, in the spirit of the season, that would 100% be a presentation at CCC; 39c3 just concluded, after all.
- Comment on I'm looking for the best free online storage site my files. That is heavily encrypted and respect people's privacy, what would you suggest? 5 weeks ago:
Steganography is one possible way to store a message “hidden in plain sight”, and video does often make a seemingly innocuous manner to store a steganographic payload, but in that endeavor, the point is to have two messages: a video that raises no suspicions whatsoever, and a hidden text document with instructions for the secret agent.
Encoding only the hidden message as a video would: 1) make it really obvious that there’s an encoded message, and 2) would not be compatible with modern video compression, which would destroy the hidden message anyway, if encoded directly as black and white pixels.
When video compression is being used, the available bandwidth to store steganographic messages is much lower, due to having to be “coarse” enough to survive the compression scheme. And video compression is designed around how human vision works, so shades of color are the least likely to be faithfully reproduced – most people wouldn’t notice if a light green is portrayed slightly darker than it ought to be. The good news is that with today’s high resolution video streams, the raw video bandwidth is huge and so having even just one-thousandth of that available for encoding hidden data is probably sufficient.
That said, hidden messages != encrypted messages: anyone who notices that there may be a hidden message can try to analyze the suspicious video and retrieve the payload. Encoding, say, English text in a video would still leave patterns, because some English letters (and thus ASCII-encoded bit patterns) will show up more frequently. But fortunately, one can encrypt data and then hide it using steganography. Encrypted data tends to approximate random noise, making it much harder to notice when hidden within the naturally-noisy video data. But bandwidth will be cut some more due to encryption.
TL;DR: it’s very real to hide messages in plain sight, in places people wouldn’t even think of looking closely at. Have you thought about the Roman Empire today?
- Comment on if all communication electronics died on New Year's day, how long would it take for other time zones to notice 1 month ago:
As immediate as the power grid falls apart without constant frequency synchronization, so probably seconds. I do consider North America’s Western, Eastern, and Texas power grids as a communication system, because it does convey the precise 60 Hz AC line rate to every part of the continent.
- Comment on Where does the revenue gathered from taxes go and what is national debt? 1 month ago:
For the benefit of non-Google users, here is the unshortened URL for that Bank of England article: bankofengland.co.uk/…/money-creation-in-the-moder…
With that said, while this comment does correctly describe what the USA federal government does with tax revenues, it is mixing up the separate roles of the government (via the US Treasury) and the Federal Reserve.
The Federal Reserve is the central bank in the USA, and is equivalent to the Bank of England (despite the name, the BoE serves the entire UK). The Federal Reserve is often shortened to “the Fed” by finance people, which only adds to the confusion between the Fed and the federal government. The central bank is responsible for keeping the currency healthy, such as preventing runaway inflation and preventing banking destabilization.
Whereas the US Treasury is the equivalent to the UK’s HM Treasury, and is the government’s agent that can go to the Federal Reserve to get cash. The Treasury does this by giving the Federal Reserve some bonds, and in turn receives cash that can be spent for employee salaries, capital expenditures, or whatever else Congress has authorized. We have not created any new money yet; this is an equal exchange of bonds for dollars, no different than what you or I can do by going to treasurydirect.gov and buying USA bonds: we give them money, they give us a bond. Such government bonds are an obligation that the government must pay in the future.
The Federal Reserve is the entity that can creates dollars out of thin air, bevause they control the interest rate of the dollar. But outside of major financial crisis, they only permit the dollar to inflate around 2% per year. That’s 2% new money being created from nothing, and that money can be swapped with the Treasury, thus the Federal Reserve ends up holding a large quantity of federal government bonds.
Drawing the distinction between the Federal Reserve and the government is important, because their goals can sometimes be at odds: in the late 1970s, the Iranian oil crisis caused horrific inflation, approaching 20%. Such unsustainable inflation threatened to spiral out of control, but also disincentivized investment and business opportunities: why start a new risky venture when a savings account would pay 15% interest? Knowing that this would be the fate of the economy if left unchecked, the Federal Reserve began to sell off huge quantities of its government bonds, thus pulling cash out of the economy. This curbed inflatable, but also created a recession in 1982, because any new venture needs cash but the Feds sucked it all up. Meanwhile, the Reagan administration would not have been pleased about this, because no government likes a recession. In the end, the recession subsided, as did inflation and unemployment levels, thus the economy escaped a doom spiral with only minor bruising.
To be abundantly clear, the Federal Reserve did indeed cause a recession. But the worse alternative was a recession that also came with a collapsed US dollar, unemployment that would run so deep that whole industries lose the workers needed to restart post-recession, and the wholesale emptying of the Federal Reserve and Treasury’s coffers. In that alternate scenario, we would have fired all our guns and have lost anyway.
- Comment on Why aren't tall people also wider? 1 month ago:
From a biology perspective, it may not be totally advantageous to grow in all three dimensions at once. Certainly, as life forms become larger, they also require more energy to sustain, and also become harder to cool (at least for the warm blooded ones). Generally speaking, keeping cool is a matter of surface area (aka skin). But growing double in each of the three dimensions would be 4x more skin than before, but would be 8x more mass/muscle. That’s now harder to keep cool.
So growing needs to be done with intention: growing taller nets some survival benefits, such as having longer legs to run. Whereas growing wider or deeper doesn’t do very much.
But idk mang, I’m in a food coma from holiday dinner, just shooting from the hip lol
- Comment on Why do personal knowledge base applications like Obsidian have all these bells and whistles for querying and parsing metadata/frontmatter but nothing similar for the actual content of notes? 1 month ago:
I recently learned about Obsidian from a friend, but haven’t started using it yet, so perhaps I can offer a perspective that differs from current users of Obsidian or any of the other apps you listed.
To start, I currently keep a hodge-podge of personal notes, some digitally and some in handwriting, covering different topics, using different formats, and there’s not really much that is common between any of these, except that I am the author. For example, I keep a financial diary, where I intermittently document the thinking behind certain medium/long-term financial decisions, which are retained only as PDFs. I also keep README.md files for each of the code repos that I have for electronics and Kubernetes-related projects. Some of my legacy notes are in plain-text .txt file format, where I’m free-form record what I’ve working on, relevant links, and lists of items outstanding or that are TODOs. And then there is the handwritten TODO and receivables list that I keep on my fridge.
Amongst all of this chaos, what I would really like to have the most is the ability to organize each “entry” in each of their respective domains, and then cross-reference them. That is, I’m not looking to perform processing on this data, but I need to organize this data so that it is more easily referenced. For example, if I outline a plan to buy myself a new server to last 10 years, then that’s a financial diary entry, but it would also manifest itself with TODO list items like “search for cheap DDR5 DIMMs” (heaven help me) and “find 10 GbE NIC in pile”. It may also spawn an entry in my infrastructure-as-code repo for my network, because I track my home network router and switch configurations in Git and will need to add new addresses for this server. What I really need is to be able to refer to each of these separate documents, not unlike how DOIs uniquely identify research papers in academic journals.
It is precisely because my notes are near-totally unstructured and disparate that I want a powerful organization system to help sort it, even if it cannot process or ingest those notes. I look at Obsidian – based on what little I know of it – like a “super filing cabinet” – or maybe even a “card catalog” but that might be too old of a concept lol – or like a librarian. After all, one asks the librarian for help finding some sort of book or novel. One does not ask the librarian to rehash or summarize or extract quotes from those books; that’s on me.
- Comment on How long until we can start shorting years to 2 numbers again? 1 month ago:
In the English-speaking world, you can always shorten the year from 4 to 2 digits. But whether: 1) this causes confusion or 2) do you/anyone care if it does, are the points of contention. The first is context-dependent: if a customer service agent over the phone is trying to confirm your date of birth, there’s no real security issue if you only say the 2 digit year, because other info would have to match as well.
If instead you are presenting ID as proof of age to buy alcohol, there’s a massive difference between 2010 and 1910. An ID card and equivalent documentation must use a four digit year, when there is no other available indicator of the century.
For casual use, like signing your name and date on a holiday card, the ambiguity of the century is basically negligible, since a card like that is enjoyed at the time that it’s read, and isn’t typically stashed away as a 100-year old memento.
That said, I personally find that in spoken and written English, the inconvenience of the 4 digit year is outweighed by the benefit of properly communicating with non-American English users. This is because us American speak and write the date in a non-intuitive fashion, which is an avoidable point of confusion.
Typical Americans might write “7/1/25” and say “July first, twenty five”. British folks might read that as 7 January, or (incorrectly) 25 January 2007. But then for the special holiday of “7/4/25”, Americans optionally might say “fourth of July, twenty five”. This is slightly less confusing, but a plausible mishearing by the British would be “before July 25”, which is just wrong.
The confusion is minimized by a full 4 digit year, which would leave only the whole day/month ordering that is ambiguous. That is, “7/1/2025”.
Though I personally prefer RFC3339 dates, which are strictly YYYY-mm-dd, using 4 digit years, 2 digit months, and 2 digit days. This is always unambiguous, and I sign all paperwork like this, unless it explicitly wants a specific format for the date.
- Comment on If you had too, how would go about running a Instagram account? 1 month ago:
For the objective of posting photos to an Instagram account while preserving as much privacy as possible, your approach of a separate machine and uploading using its web browser should be sufficient. That said, Instagram for web could also be sandboxed using a private browsing tab on your existing desktop. Certainly, avoiding an installed app – such as the mobile app – will prevent the most obtuse forms of espionage/tracking.
That said, your titular question was about how to maintain an Instagram account, not just post images. And I would say that as a social media platform, this would include engagement with other accounts and with comments. For that objective, having a separate machine is more unwieldy. But even using a private browsing tab on your existing machine is still subject to the limits that Instagram intentionally imposes on their desktop app: they save all the crucial value-add features for the mobile app, where their privacy invasion is greatest.
To use Instagram in the least obtuse manner means to play the game by their rules, which isn’t really compatible with privacy preservation. To that end, if you did want a full Instagram experience, I would suggest getting a separate, cheap mobile phone (aka a “YOLO phone”) to dedicate to this task. If IG doesn’t need a mobile number, then you won’t even need a working SIM account. Then load your intended images using USB file transfer, and use an app like Imagepipe (available on F-Droid) to strip image metadata.
- Comment on [deleted] 1 month ago:
For the blockchain technology at the very core foundation of cryptocurrencies, it’s a reasonable concept that solves a specific challenge (ie no one can change this value unless they have the cryptographic key) and the notion of an indelible or tamper-evident ledger is useful in other fields (eg certificate revocation lists). Using a blockchain as a component is – like all of engineering – about picking the right tool for the job, so I wouldn’t say that having/not having a block chain imparts any sort of opinionation or qualities of good/bad.
One step above the base technology is the actual application as currency, meaning a representation of economic value, either to store that value (eg gold) or for active trade (eg the €2 Euro coin). All systems of currency require: 1) recognition and general consensus as to their value, and 2) fungibility (ie this $1 note is no different than your $1 note), and 3) the ability to functionally transfer the currency.
Against that criteria, cryptocurrencies have questionable value, as seen by how volatile the cryptocurrency-to-fiat currency markets are. Observe that the USD or Euro or RMB are used for people’s salaries, denominate their home mortgage loans, for buying and selling crude oil, and so on. Yet basically no one uses cryptocurrency for those tasks, no one writes or accepts business-to-business contracts denominated in cryptocurrency, and only a small handful of sovereign states accept cryptocurrency as valid payment. That’s… not a great outlook for circulating the currency.
But for fungibility, cryptocurrency clearly meets that test, and probably exceeds the fiat currencies: there’s no such thing as a “torn” Bitcoin note. There are no forgeries of Etherium. It is demonstrable that a unit of cryptocurrency that came from blood-diamond profits is indistinguishable from a unit that was afforded by wages at a fuel station in Kentucky. There are no “marked notes” or “ink packs” when committing cryptocurrency theft, and it’s relatively easy to launder cryptocurrency through thousands of shell accounts/addresses. To launder physical money a thousand times is physically impossible, and is way too suspicious for digitalized fiat current transfers.
And that brings us to the ability to actually transfer cryptocurrency. While it’s true that it should only be an extra ledger entry to move funds from one address/account to another, each system has costs buried somewhere. Bitcoin users have to pay the transaction costs, or currencies pegged to other currencies have to “execute” a “smart contract”, with attendant verification costs such as proof-of-work or proof-of-stake. These costs simply don’t exist when I hand a $20 note to a fuel station clerk. Or when my employer sends my wages via ACH electronic payment.
Observe how cryptocurrency is traded not at shops with goods (eg Walmart) or shops for currency (eg bureau de change at the airport) but mostly only through specialized ATMs or through online exchange websites. The few people who genuinely do use their cryptocurrency wallets to engage transactions are now well in the minority, overshadowed by scammers, confidence/romance tricksters, investment funds with no idea of what they’re doing except to try riding the bandwagon, and individuals who have never traded financial instruments but were convinced by “their buddy’s friend” who said cryptocurrency was a money-making machine.
To that end, I would say that cryptocurrencies have brought out the worst of financial manipulators, and their allure is creating serious financial perils for everyday people, whether directly as a not-casino casino or to pay a ransomware extortion, or indirectly through the destabilization of the financial system. No one is immune to a breakdown of the financial system, as we all saw in 2008.
I used to like discussing eith people about the technical merits of ledger-based systems, but with the awful repercussions of what they’ve enabled, it’s a struggle to have a coherent conversation without someone suggesting a cryptocurrency use-case. And so I kinda have to throw the whole baby out with the bathwater. Maybe when things quiet down in a few decades, the technology can be revisited from a sober perspective.
- Comment on Does each country have a book/library of the laws of the land that a commoner can consult to check if they're about to do something illegal? 1 month ago:
Directly answering the question: no, not every country has such a consolidated library that enumerates all the laws of that country. And for reasons, I suspect no such library could ever exist in any real-life country.
I do like this question, and it warrants further discussion about laws (and rules, and norms), how they’re enacted and enforced, and how different jurisdictions apply the procedural machine that is their body of law.
To start, I will be writing from a California/USA perspective, with side-quests into general Anglo-American concepts. That said, the continental European system of civil law also provides good contrast for how similar yet different the “law” can be. Going further abroad will yield even more distinctions, but I only have so much space in a Lemmy comment.
The first question to examine is: what is the point of having laws? Some valid (and often overlapping) answers:
- Laws describe what is/isn’t acceptable to a society, reflecting its moral ideals
- Laws incentivize or punish certain activities, in pursuit of public policy
- Laws set the terms for how individuals interact with each other, whether in trade or in personal life
- Laws establish a procedure machine, so that by turning the crank, the same answer will output consistently
From these various intentions, we might be inclined to think that “the law” should be some sort of all-encompassing tome that necessarily specifies all aspects of human life, not unlike an ISO standard. But that is only one possible way to meet the goals of “the law”. If instead, we had a book of “principles” and those principles were the law, then applying those principles to scenarios would yield similar result. That said, exactly how a principle like “do no harm” is applied to “whether pineapple belongs on pizza” is not as clear-cut as one might want “the law” to be. Indeed, it is precisely the intersection of all these objectives for “the law” that makes it so complicated. And that’s even before we look at unwritten laws.
The next question would be: are all laws written down? In the 21st Century, in most jurisdictions, the grand majority of new laws are recorded as written statutes. But just because it’s written down doesn’t mean it’s very specific. This is the same issue from earlier with having “principles” as law: what exactly does the USA Constitution’s First Amendment mean by “respecting an establishment of religion”, to use an example. But by not micromanaging every single detail of daily life, a document that starts with principles and is then refined by statute law, that’s going to be a lot more flexible over the centuries. For better/worse, the USA Constitution encodes mostly principles and some hard rules, but otherwise leaves a lot of details left for Congress to fill in.
Flexibility is sometimes a benefit for a system of law, although it also opens the door for abuse. For example, I recall a case from the UK many years ago, where crown prosecutors in London had a tough time finding which laws could be used to prosecute a cyclist that injured a pedestrian. As it turned out, because of the way that vehicular laws were passed in the 20th Century, all the laws on “road injuries” basically required the use of an automobile, and so that meant there was a hole in the law, when it came to charging bicyclists. They ended up charging the cyclist with the criminal offense of “furious driving”, which dated back to an 1860s statute, which criminalized operating on the public road with “fury” (aka intense anger).
One could say that the law was abused, because such an old statute shouldn’t be used to apply to modern-day circumstances. That said, the bicycle was invented in the 1820s or 1830s. But one could also say that having a catch-all law is important to make sure the law doesn’t have any holes.
Returning to American law, it’s important to note that when there is non-specific law, it is up to the legislative body to fill those gaps. But for the same flexibility reasons, Congress or the state or tribal legislatures might want to confer some flexibility on how certain laws are applied. They can imbue “discretion” upon an agency (eg USA Department of Commerce) or to a court (eg Superior Court of California). At other times, they write the law so that “good judgement” must be exercised.
As those terms are used, discretion more-or-less means having a free choice, where either is acceptable but try to keep within reasonable guidelines. Whereas “good judgement” means the guidelines are enforced and there’s much less wiggle-room for arbitraryness. And confusingly so, sometimes there’s both a component of discretion and judgment, which usually means Congress really didn’t know what else to write.
Some examples: a District Attorney anywhere in California has discretion when it comes to filing criminal charges. They could outright choose to not prosecute person A for bank robbery, but proceed with prosecuting person B for bank robbery, even though they were working together on the same robbery. As an elected official, the DA is supposed to weigh the prospects of actually obtaining a guilty verdict, as well as whether such prosecution would be beneficial to the public or a good use of the DA office’s limited time and budget. Is it a bad look when a DA prosecutes one person but not another? Yes. Are there any guardrails? Yes: a DA cannot abuse their discretion by considering disallowed factors, such as a person’s race or other immutable characteristics. But otherwise, the DA has broad discretion, and ultimately it’s the voters that hold the DA to account.
Another example: the USA Environmental Protection Agency’s Administrator is authorized by the federal Clean Air Act to grant a waiver of the supremacy of federal automobile emissions laws, to the state of California. That is to say, federal law on automobile emissions is normally the law of the land and no US State is allowed to write their own laws on automobile emissions. However, because of the smog crisis in the 70/80s, the feds considered that California was a special basket-case and thus needed their own specific laws that were more stringent than federal emissions laws. Thus, California would need to seek a waiver from the EPA to write these more stringent laws, because the blanket rule was “no state can write such laws”. The federal Clean Air Act explicitly says only California can have this waiver, and it must be renewed regularly by the EPA, and that California cannot dip below the federal standards. The final requirement is that the EPA Administrator shall issue the waiver if California requests it, and if they qualify for it.
This means the EPA Administrator does not have discretion, but rather is exercising good judgement: does California’s waiver application satisfy the requirements outlined in the Clean Air Act? If so, the Administrator must issue the waiver. There is no allowance of an “i don’t wanna” reason for non-issuance of the waiver. The Administrator could only refuse if they show that California is somehow trying to do an end-run around the EPA, such as by trying to reduce the standards.
The third question is: do laws encompass all aspects of everything?. No, laws are only what is legally enforced. There are also rules/by-laws and norms. A rule or by-law is often something enforced by something outside the legal system’s purview. For example, the penalty for violating a by-law of the homeowner’s association might be a revocation of access to the common spaces. For a DnD group, the ultimate penalty for violating a rule might be expulsion.
Meanwhile, there are norms which are things that people generally agree on, but felt were so commonplace that breaking the norm would make everything else nonfunctional. For example, there’s a norm that one does not use all-caps lock when writing an online comment, except to represent emphasis or yelling. One could violate that norm with no real repercussions, but everyone else would dislike you for it, they might not want to engage further with you, they might not give you any benefit of the doubt, they may make adverse inferences about you IRL, or other things.
TL;DR: there are unwritten principles that form part of the law, and there’s no way to record all the different non-law rules and social norms that might apply to any particular situation.
- Comment on How does the private equity bubble compare to the AI bubble if at all? 1 month ago:
Used for AI, I agree that a faraway, loud, energy-hungry data center comes with a huge host of negatives for the locals, to the point that I’m not sure why they keep getting building approval.
But my point is that in an eventual post-bubble puncture world where AI has its market correction, there will be at least some salvage value in a building that already has power and data connections. A loud, energy-hungry data center can be tamed to be quiet and energy-sipping based on what’s hardware it’s filled in. Remove the GPUs and add some plain servers and that’s a run-of-the-mill data center, the likes of which have been neighbors to urbanites for decades.
I suppose I’d rehash my opinion as such: building new data centers can be wasteful, but I think changing out the workload can do a lot to reduce the impacts (aka harm reduction), making it less like reopening a landfill, and more like rededicating a warehouse. If the building is already standing, there’s no point in tearing it down without cause. Worst case, it becomes climate-controlled paper document storage, which is the least impactful use-case I can imagine.
- Comment on How does the private equity bubble compare to the AI bubble if at all? 2 months ago:
Racks/cabinets, fiber optic cables, PDUs, CAT6 (OOBM network), top-of-rack switches, aggregation switches, core switches, core routers, external multi-homed ISP/transit connectivity, megawatt three-phase power feeds from the electric utility, internal power distribution and step-down transformers, physical security and alarm systems, badge access, high-strength raised floor, plenum spaces for hot/cold aisles, massive chiller units.
- Comment on How does the private equity bubble compare to the AI bubble if at all? 2 months ago:
Absolutely, yes. I didn’t want to elongate my comment further, but one odd benefit of the Dot Com bubble collapsing was all of the dark fibre optic cable laid in the ground. Those would later be lit up, to provide additional bandwidth or private circuits, and some even became fibre to the home, since some municipalities ended up owning the fibre network.
In a strange twist, the company that produced a lot of this fibre optic cable and went bankrupt during the bubble pop – Corning Glass – would later become instrumental in another boom, because their glass expertise meant they knew how to produce durable smartphone screens. They are the maker of Gorilla Glass.
- Comment on How does the private equity bubble compare to the AI bubble if at all? 2 months ago:
I’m not going to come running to the defense of private equity (PE) firms, but compared to so-called AI companies, the PE firms are at least building tangible things that have an ostensible alternative use. A physical data center building – even one located far away from the typical metropolitan area that have better connectivity to the world’s fibre networks – will still be an asset with some utility, when/if the AI bubble pops.
In that scenario, the PE firm would certainly take a haircut on their investment, but they’d still get something because an already-built data center will sell for some non-zero price, with possible buyers being the conventional, non-AI companies that just happen to need some cheap rack space. Looking at the AI companies though, what assets do they have which carry some intrinsic value?
It is often said that during the California Gold Rush, the richest people were not those which staked our the best gold mines, but those who sold pickaxes to miners. So too would PE firms pivot to whatever comes next, selling their remaining interest from the prior hype cycle and moving to the next.
I’ve opined before that because no one knows when the bubble with burst, it is simultaneously financially dangerous to: 1) invest into that market segment, but also 2) to exit from that market segment. And so if a PE firm is already bet most of the farm, then they might just have to follow through with it and pray for the best.