[-] nybble41@programming.dev 19 points 8 months ago

The EULA also prohibits using Nightshade "for any commercial purpose", so arguably if you make money from your art—in any way—you're not allowed to use Nightshade to "poison" it.

[-] nybble41@programming.dev 7 points 8 months ago

They could stick to public domain & indie titles. They won't, but they could.

[-] nybble41@programming.dev 9 points 9 months ago

bi- means two, as in bicycle: two wheels (circles)

semi- means half, as in semicircle: half of a circle

The problem is that the prefixes can be parsed as affecting either duration/interval as in (bi-week)ly, every two weeks, or frequency as in bi-(weekly), two times weekly. The same applies to semi-.

Personally I find the frequency interpretation a bit of a stretch—"two" is not the same as "two times" or "twice"—so I would tend to read e.g. bimonthly as every two months rather than twice each month.

[-] nybble41@programming.dev 13 points 9 months ago

If you want one-second resolution, sure. If you want nanoseconds a 64-bit signed integer only gets you 292 years. With 128-bit integers you can get a range of over 5 billion years at zeptosecond (10^-21 second) resolution, which should be good enough for anyone. Because who doesn't need to precisely distinguish times one zeptosecond apart five billion years from now‽

[-] nybble41@programming.dev 12 points 9 months ago

Technically isn't the Earth itself a sort of space ship which is orbiting (...a star which is orbiting...) the black hole at the center of the Milky Way galaxy? Not really close enough for time dilation to be a factor, but still.

[-] nybble41@programming.dev 12 points 11 months ago

I'm fairly certain that last one is UB in C. The result of an assignment operator is not an lvalue, and even if it were it's UB (at least in C99) to modify the stored value of an object more than once between two adjacent sequence points. It might work in C++, though.

[-] nybble41@programming.dev 7 points 11 months ago* (last edited 11 months ago)

No, that's not how I2P works.

First, let's start with the basics. An exit node is a node which interfaces between the encrypted network (I2P or Tor) and the regular Internet. A user attempting to access a regular Internet site over I2P or Tor would route their traffic through the encrypted network to an exit node, which then sends the request over the Internet without the I2P/Tor encryption. Responses follow the reverse path back to the user. Nodes which only establish encrypted connections to other I2P or Tor nodes, including ones used for internal (onion) routing, are not exit nodes.

Both I2P and Tor support the creation of services hosted directly through the encrypted network. In Tor these are referred to as onion services and are accessed through *.onion hostnames. In I2P these internal services (*.i2p or *.b32) are the only kind of service the protocol directly supports—though you can configure a specific I2P service linked to a HTTP/HTTPS proxy to handle non-I2P URLs in the client configuration. There are only a few such proxy services as this is not how I2P is primarily intended to be used.

Tor, by contrast, has built-in support for exit nodes. Routing traffic anonymously from Tor users to the Internet is the original model for the Tor network; onion services were added later. There is no need to choose an exit node in Tor—the system maintains a list and picks one automatically. Becoming a Tor exit node is a simple matter of enabling an option in the settings, whereas in I2P you would need to manually configure a proxy server, inform others about it, and have them adjust their proxy configuration to use it.

If you set up an I2P node and do not go out of your way to expose a HTTP/HTTPS proxy as an I2P service then no traffic from the I2P network can be routed to non-I2P destinations via your node. This is equivalent to running a Tor internal, non-exit node, possibly hosting one or more onion services.

[-] nybble41@programming.dev 9 points 11 months ago

It is not true that every node is an exit node in I2P. The I2P protocol does not officially have exit nodes—all I2P communication terminates at some node within the I2P network, encrypted end-to-end. It is possible to run a local proxy server and make it accessible to other users as an I2P service, creating an "exit node" of sorts, but this is something that must be set up deliberately; it's not the default or recommended configuration. Users would need to select a specific I2P proxy service (exit node) to forward non-I2P traffic through and configure their browser (or other network-based programs) to use it.

[-] nybble41@programming.dev 14 points 1 year ago

Allegories aside, the Bible definitely has a few LGBTQ characters, even if they're not portrayed in a very positive light. I suppose that means they'll be banning the Bible from school libraries? Not to mention a fair amount of historical literature… including anything featuring Leonardo da Vinci, Florence Nightingale, King James (yes, that King James), William Shakespeare, King Richard I, or Julius Caesar.

It will be interesting to see whether this makes the history classes easier, for lack of material to cover, or harder, for lack of references.

[-] nybble41@programming.dev 7 points 1 year ago

A person can see a dog whistle and know it for what it is without being able to hear it. Also it's not only dogs who can hear dog whistles; some people just have exceptionally good hearing.

[-] nybble41@programming.dev 10 points 1 year ago

Just luxury spending and underperforming investments. Essential spending can't be deferred, and worthwhile investments will outpace any natural rate of deflation. Forced inflation drives conspicuous consumption and malinvestment, but in doing so it increases monetary velocity, which helps bankers and tax collectors extract higher rent from the economy.

[-] nybble41@programming.dev 10 points 1 year ago

MongoDB is under the Server Side Public License (SSPL) which is not an Open Source license.

view more: next ›

nybble41

joined 1 year ago