

- Getting users to post text instead of screenshots of text.
The sad reality is that while there are a lot of great people on Lemmy, there are also some who use the platform to attack others, stir up conflict, or actively try to undermine the project. Admins are volunteers who deal with the latter group on a constant basis, this takes a mental toll. Please understand why our admins chose to step down, and be kind to the admins on whatever instance you decide to join.
It’s also behind a third-party captcha service, which can fingerprint your browser, and collect a history of which articles you read and what pages you come from to view them.
Last I checked, archive.org usually didn’t work when articles are paywalled. Has that changed?
In my experience, it depends on when the snapshot is made. If made early enough that the paywall was not yet in place (probably because publishers want their articles to be indexed by search engines) then it will not have the paywall.
One nice thing about archive.org’s mirroring is that they list all their snapshots of a page by date and time, so if the latest one contains a paywall, you can sometimes go back to the first one and find it with no paywall.
A useful product can be nice, but I wouldn’t call this patent uplifting news.
There are also bluetooth adapters that plug directly into those older iPods’ accessory port (the slot on the bottom) instead of the headphone jack.
The main benefit of the one I used was being compact, with no wires. The main drawback was having to remove the adapter to charge the iPod. I guess a model with a USB charging cable might exist.
If we are to allow them to hold positions of extraordinary power over us, then we must also hold them to an extraordinary level of responsibility, and their actions must be subject to extraordinary scrutiny and severe consequences for wrongdoing. That is the only way it can work.
None of those are examples of people using firearms to stand against tyranny. Not even at a small scale, let alone a meaningful one.
(Note that racist organisations are not governments. They’re awful, but they are not fascism and do not constitute tyranny.)
In computer science, read-copy-update (RCU) is a synchronization mechanism that avoids the use of lock primitives while multiple threads concurrently read and update elements that are linked through pointers and that belong to shared data structures (e.g., linked lists, trees, hash tables).
Can you share a meaningful number of examples showing Democrats with guns standing up to neo-fascists?
Because while your comment has an air of sensibility, the news stories that I’ve seen over the decades give the impression that the Americans who choose to own guns to protect their rights are overwhelmingly supporters of the very fascists that are in the spotlight now. I would love reason to believe otherwise, but since I don’t have one, I am skeptical of your argument.
The host’s intro made me laugh out loud.
“If you’re anything like me, you’ll prob’ly be fascinated by a brand new game called… [looks down at notes to read the name of the game…]”
Seriously, though, I’m thankful that he put a spoiler warning right up front. I’ll have to save this for later.
Yes, that’s part of the ecosystem. :)
I recently started it.
Gameplay-wise, I find it bland at best: A world traversed entirely on rails, and JRPG-style combat with timed dodge/parry moves. These mechanics don’t excite me, but I’m still playing anyway, because…
As a work of art, I find it gorgeous. The operatic soundtrack, despite being a genre outside my usual preferences, is captivating. The voice acting is nuanced and immersive like I don’t think I’ve heard in any other game (so much that I can mostly overlook the terrible lip sync problems in the animation). A few of the facial expressions are… disarming. The environments are so beautiful that I sometimes find myself just staring at them for a while instead of advancing the story.
It’s too early to be sure I’ll stick with it, but I suspect that I will, just as I would a film that indulges the senses.
Hashing takes up cpu time
Oh my goodness.
I am very skeptical of this reasoning. If hashing of 256-character passphrases, or even 2560-character passphrases, consumes enough CPU time to risk overloading your system, then I think your are in an infinitesimal niche worthy of a detailed write-up.
If you’re worried about that load, just wait until you learn about key derivation functions.
But here’s where Debian gets tripped up by the ecosystem: the moment you hit a login prompt, you enter a session with user-locked audio. This isn’t Debian’s fault. It’s the fault of PulseAudio, PipeWire, and the entire philosophy of session-bound audio daemons that don’t care what the kernel is doing.
It’s worth noting that PipeWire is being developed with support for a system-wide, multi-user instance, which should solve the problem that I think the author is describing above. When I last checked a couple years ago, it was enabled with this build option: -Dsystemd-system-service=enabled
The name of that flag seems to imply that systemd is required, which would be disappointing for folks who use other init systems. I haven’t tried it, so I don’t know if it’s a true requirement or just a name that was convenient at the time it was created.
I attribute Java’s uptake to a large amount of marketing and support, which led to a massive ecosystem. Even a mediocre language like this one can find success when propped up like that.
What are you worried about overloading?
https://pubs.acs.org/doi/10.1021/acs.est.4c11265#_i24
4.4. PFAS in Beer and Drinking Water Occurrence
Beers selected based on their brewery location’s proximity to known elevated levels of PFAS in drinking water had 15 times the odds of having one or more detection of PFAS compared to larger-scale U.S. or international beers selected based on consumer popularity without known PFAS sources in municipal water. The PFSAs and PFOA had the highest detection rates and were also among the most frequently detected chemicals in drinking water across the United States in recent studies. (26,28,55,67) The substitution of long-chain PFSAs with short-chain PFSAs (PFBS) has also been observed with high detection rates in recent drinking water studies as well as beers we analyzed. (26,28,55,61)
North Carolina beers, particularly those within the Cape Fear River Basin, generally had detections of more PFAS species than Michigan or California beers, which reflects the variety of PFAS sources in NC. (68) The two beers with the largest number of different PFAS detected were both located in the upper regions of the Cape Fear River Basin in Chatham and Alamance counties, where larger variability in the types of PFAS as well as higher concentrations of PFAS have been observed in surface waters in the Haw River. (14,68) HFPO–DA was detected in both beer and raw water from a drinking water treatment plant (DWTP) in the lower region of the Cape Fear River Basin. (14) The DWTP at which HFPO–DA was detected pulls in water from the Cape Fear River downstream from a fluorochemical manufacturing plant that produces the chemical. (14,69)
Similarities between PFAS in drinking water and beer were also observed in Michigan, where Kalamazoo County had the highest reported average PFOA concentration from the state-reported drinking water of all counties in the three states. The beer brewed in this county also had the highest measured PFOA concentration of all of the beers in the study. The correlations between ∑PFAS, PFOA, and PFBS levels in beers were linked to local drinking water contamination.
Approximately 18% of breweries operating in the United States are located within zip codes served by public water supplies with detectable PFAS in drinking water as reported by UCMR5 (as of July 2024; Figures 6 and S2). We found that international beers were less likely to have detectable PFAS or PFAS at higher levels, which may reflect the lack of or lower levels of PFAS in drinking water in these regions. The first study of PFAS in tap water in Latin America found that PFAS were not generally associated with any drinking water source in Guatemala City, the region’s largest city, which lacked PFAS manufacturing industries; rather, PFAS occurrence in tap water was instead associated with plastic water storage tank usage. (70)
Figure 6. U.S. Map showing total PFAS (ppt; color scale) in zip codes served by public drinking water supplies reported by UCMR5 (July 2024) and locations of currently operating breweries (light blue circles). See Figure S2 for additional maps zoomed into several regions.
No, there is no valid reason to limit web passwords to lengths as short as 8 or 16 characters. If someone has built such a system with a technical limit that short, then what they have built is (from a security perspective) garbage.
Thankfully, NIST finally dropped their terrible password guidelines of the past in favor of sensible ones. Perhaps this will lead to fewer bad decisions being made in web development circles.
A few relevant sections:
https://pages.nist.gov/800-63-4/sp800-63b.html#usability-considerations-by-authenticator-type
https://pages.nist.gov/800-63-4/sp800-63b.html#length
https://pages.nist.gov/800-63-4/sp800-63b.html#passwordver
Obligatory xkcd:
(To be clear, this comic’s approach to passphrases is sound advice.)