[-] EveryMuffinIsNowEncrypted@lemmy.blahaj.zone 2 points 5 hours ago* (last edited 5 hours ago)

There's a certain point where it just comes down to trust. And if you distrust a company enough that you think they aren't posting the same code to the git repository that they say they are, then maybe that's when you shouldn't be doing business with them.

This is the case with all organizations, corporate or otherwise.

My apologies. Your comment came off (to me anyway) as the former.

[-] EveryMuffinIsNowEncrypted@lemmy.blahaj.zone 5 points 8 hours ago* (last edited 8 hours ago)

So, I just looked it up and apparently their official stance is that auditing is questionably effective and thus unnecessary:

Our software is free and open source, while we repute at the moment [it's] not acceptable to provide external companies with root access to our servers to perform audits which can not anyway guarantee future avoidance of traffic logging or transmission to third parties. On the contrary, we deem very useful anything related to penetration tests. Such tests are frequently performed by independent researchers and bounty hunters and we also have a bounty program.

In other words, their reasoning is:

  1. Their software is free and open source, so if it does logs anything, the community would find out, so in this sense the community is the independent auditors;
  2. There's no stopping an audited party from ceasing to log right before the audit and start up again after the audit ends, so an audit is kind of toothless anyway;
  3. Regarding penetration tests, they already have independent testing done as well as a bounty program.

Personally, I don't agree with points #2 and #3, but point #1 is fair I suppose. In my opinion, it should not be up to the users to hold the company accountable; and there is a difference between penetration tests and log auditing, as the former I believe are merely to check the resilience against outside hacking.

My end impression is that judging from their other documentation and forum posts, the fact that their software is fully open-source, and their past behavior in accordance with their stated values, I think I'm inclined to believe them. However, it is somewhat worrying nevertheless that there isn't log auditing involved regardless of their actions.

What do you mean? Are they not good for privacy or security? They seem definitely more zealous about that on their FAQs and forum pages than, say, ProtonVPN, for sure.

Fair enough. We all have our preferences. :)

[-] EveryMuffinIsNowEncrypted@lemmy.blahaj.zone 10 points 2 days ago* (last edited 9 hours ago)

ProtonVPN also has port-forwarding.

That being said, last time I tried it, their Linux GUI was abysmal, though I hear they recently did a revamp. I haven't used it yet though so I can't speak on it beyond that.

Just something to keep mind.

 


Edit: Syntax.

[-] EveryMuffinIsNowEncrypted@lemmy.blahaj.zone 1 points 2 days ago* (last edited 2 days ago)

I don't mind self-learning. Hell, if I'm interested in the subject matter, I usually find myself experimenting and researching.

I'm all about that "wait, I wonder if..." mindset. 😎

[-] EveryMuffinIsNowEncrypted@lemmy.blahaj.zone 1 points 2 days ago* (last edited 2 days ago)

I work as a cashier at a dead-end retail store in a town of 5000. (Seriously, the closest reasonably large city is like 30 minutes away.) So I don't think there's much of an opportunity at my current workplace. Haha.

But you still make an excellent point and it sounds like a good starting-off point. Thank you!

6
submitted 3 days ago* (last edited 3 days ago) by EveryMuffinIsNowEncrypted@lemmy.blahaj.zone to c/python@programming.dev

I'm currently doing Dr. Charles Severence's lessons on FreeCodeCamp to try to learn Python3. I'm on lesson exercise 02_03 and confused about multiplying floating-point and integer values.

The goal is to write a Python program multiplying hours worked by pay rate to come up with a pay quantity.

This is the code I wrote:

h = input("Enter hours: ")
r = input("Enter pay rate: ")
p = float(h) * r

I got a traceback error, and the video said the correct way to solve said error was change Line 3 from p = float(h) * r to p = float(h) * float(r).

However, what I'm confused about is why would I need to change r to a floating-point value when it's already a floating-point value (since it'd be a currency value like 5.00 or something once I typed it in per the input() command*?

What am I missing here?

 


*I can't remember: are the individual commands in a python line called "commands"?

 

 


Edit: Wrote plus signs in my post here instead of asterisks. Fixed.

 


EDIT: Thanks to @Labna@lemmy.world and @woop_woop@lemmy.world. I thought that the input() function was a string until the end-user types something in upon being prompted, and then becomes a floating-point value or integer value (or stays a string) according to what was typed.

This is incorrect: the value is a string regardless of what is typed unless it is then converted to another type.

28
submitted 1 week ago* (last edited 1 week ago) by EveryMuffinIsNowEncrypted@lemmy.blahaj.zone to c/privacy@lemmy.ml

(See bottom for tl;dr.)

I'm the kind of person who loses their keys easily, so I love the idea of trackers: little devices that you can attach to your wallet, phone, or keyring that connect via bluetooth to an app on your phone to help you find it.

Problem is pretty much all the options I can find are run by companies with shitty privacy policies: Tile, Apple AirTag, Chipolo, and so forth.

  • Tile collects shitloads of data and is partnered with Amazon to boot;
  • Apple Airtags AFAIK only work with Apple devices, and besides it's Apple so no thank you; and
  • Chipolo also collects shitloads of data and shares information with data brokers and data collection companies of all stripes. No thank you.

In any case, I really don't need a location network larger than maybe 200 meters (about 650 feet). If I lose my keys, odds are it's either in my car or in my house, and my house is like 100 square meters (about 1000 square feet). So Bluetooth is really all I need. I don't even need to see it on a map; I just need for it to ding or something.

I'm currently using Tile but I really want to get away from it. Worst case scenario, I'll stop using the Tile, but I really am a forgetful little shit. Lol.

 

tl;dr – Looking for recommendations for ideally short-range Bluetooth trackers for keys with decent privacy. Max required range = 200 m (650 ft). Also, pie tastes great. Cheers.

42

I'm currently learning Python and am learning about very basic functions such as int(), float(), and input().

I have the first two down pat, but I'm struggling to understand the last. The example I'm looking at is found at 12:26 of this video:

nam = input('Who are you? ')
print('Welcome', nam)

Who are you? Chuck
Welcome Chuck

In this case, wouldn't nam be a variable equal to the text on the right side of the = sign?

In which case, if nam is equal to input('Who are you? '), then wouldn't print('Welcome', nam) just result in

Welcome input(Who are you? )?

Obviously not (nor does it work in a compiler), which leads me to believe I'm clearly misunderstanding something. But I've rewatched that section of the video several times, and looked it up elsewhere on the web, and I just can't wrap my head around it.

Could someone help me with this?

Thanks.

83

I'm currently learning how to code (currently Python, then maybe JavaScript), but I'm not always around my desktop, and learning on my phone is not always an option (also, it can be quite cumbersome at times). Therefore, I'm looking into purchasing a laptop just for learning how to code and stuff.

I don't want to get a Chromebook because I want to be able to wipe the drive and install Linux on it (probably Linux Mint). Maybe it's changed since 2013, but the last time I had a Chromebook, it was a pain in the ass to install even bog-standard Ubuntu on it.

Problem is, I'm also heavily limited by space & budget: no more than 11 in (280 mm) total laptop width and 330 USD base price.

Does anyone have any suggestions?

Please forgive me if this is not the right space for this kind of question. Lemme know if it is and I'll delete it. :)

1
submitted 4 months ago* (last edited 4 months ago) by EveryMuffinIsNowEncrypted@lemmy.blahaj.zone to c/main@lemmy.blahaj.zone

I suppose the answer could apply to any instance, but I'm mostly referring to this one.

Mind you, I don't have two accounts, but I'm considering it: one for memes, the other for serious discussion.

But I'm unsure if that's considered bad form by most people, so I thought I'd ask.

Thanks!

 


EDIT: Also, come to think of it, even if it were okay, would it even be possible to have to be logged into two separate accounts on the same instance at the same time with the same browser profile? :/

1

Lately, when I load up lemmy.blahaj.zone, the notification bell in the corner of the screen doesn't display a count typically until I load a post or comment.

It's also only a recent thing.

Any idea what might be causing it?

Not sure what other details you might need, so just ask if you think of anything. :)

18
submitted 5 months ago* (last edited 5 months ago) by EveryMuffinIsNowEncrypted@lemmy.blahaj.zone to c/piracy@lemmy.dbzer0.com

To start off, I just want to say that Kega Fusion is a wonderful emulator for pre–Sega Saturn emulation. However, the fact that it is not open-source concerns me. What if something happens and the person is required to take it down? (Not likely after 14 years but still...) Or hell they just decide to take it down for whatever reason. (Again, not likely after 14 years, but still...)

I still am using it, but it would also be nice to have an alternative if the worst were to happen, or hell just in case there's a person out there who would prefer a different emulator.

Unfortunately, the Megathread is kind of...lacking in this department. In the Sega subsection, it lists three emulators: two for the Dreamcast and one for the Genesis / Mega Drive and below.

So, yeah, does anyone know of any alternatives we could add to the Megathread?

(On the same note, I'd also like to add that Yabause seems a decent enough emulator for the Saturn, none of for which are included on the Megathread. (Not sure if my syntax was correct there... :/ ))

116

I remember back in the day the emulator Snes9x was one of the best emulators for Super Nintendo emulation, but it's not on the Megathread. Is it no longer trustworthy or was it just missed?

Sorry if this was already asked in this community. I would've searched but Lemmy (or at least my Lemmy instance, I suppose) doesn't seem to have a search function for intra-Community searching.

Cheers.

1

Howdy, y'all. :)

So, within the last couple of days or so, I've been having this problem where if I click on the notification bell, then the chain icon next to a shown reply, then click "Show context" above the horizontal rule (see screenshot), it doesn't proceed to load the context. Rather, it just reloads the same page.

The strange thing is this doesn't happen with every notification. Another notification I had was from here on the Blahaj Lemmy instance, and that worked fine. Maybe it's a thing to do with federation protocols? Anyway, I'm no expert. I just thought I'd ask. :)

Cheers.

20
submitted 7 months ago* (last edited 7 months ago) by EveryMuffinIsNowEncrypted@lemmy.blahaj.zone to c/lemmy@lemmy.ml

Hello.

I'm extremely tired, so it very well could be that this is extremely simple and I'm just not getting it. However, what I would like to know is how to open a post from a community on one instance on another instance.

For example, here's a recent post from !asklemmy@lemmy.ml. I know that to open that community in the instance lemmy.blahaj.zone, I would merely type into the address bar

lemmy.blahaj.zone/c/asklemmy@lemmy.ml

However, how would I open that particular post in that community on the latter instance? Is it even possible?

Cheers.

 

P.S.

I did do some searching on both this community as well as the Reddit Lemmy FAQ page but I didn't find anything. However, I could've missed something. If it's something obvious, I apologize in advance.


Edit: Assuming I understand what people are saying, well, evidently, it seems to be a current limitation of the ActivityPub protocol. Perhaps that will change one day. Hopefully soon. ¯\_(ツ)_/¯

45
submitted 7 months ago* (last edited 7 months ago) by EveryMuffinIsNowEncrypted@lemmy.blahaj.zone to c/piracy@lemmy.dbzer0.com
  • In the Megathread, section 3-12 (Unsafe Sites), under "All Purpose", the first entry is 1377x-to, reason listed as

    Fake clone: (Crafted with cunning intent to ensnare unsuspecting users through deliberate deception).

  • However, in the Megathread, section 3-1 (All Purpose), under "Torrents", likewise the first entry is 1377x-to.

 


Edit:

Lol, got the characters mixed up, I guess. Whoops. Well, to all the people being nice about it and kindly letting me know, thank you very much!

To all the people being dicks about it (concerningly a lot of you it seems ಠ_ಠ), maybe learn a bit of humility. Some people mix up similar-looking characters in their heads. It's a thing that happens.

231
submitted 10 months ago* (last edited 10 months ago) by EveryMuffinIsNowEncrypted@lemmy.blahaj.zone to c/lemmyshitpost@lemmy.world
view more: next ›

EveryMuffinIsNowEncrypted

joined 1 year ago