• 0 Posts
  • 28 Comments
Joined 2 years ago
cake
Cake day: June 9th, 2023

help-circle
  • Color is mostly a biological sensation. In low light, humans lose color acuity because rods are activated more than cones. Objects reflect the same wavelengths, but our cones can’t activate due to low energy. Does this mean color fades in low light? It depends on the physiology of the perceiver.

    Humans have three color receptors peak-sensitive to red, green, and blue. Dogs have only two: yellow and blue. This means they can’t distinguish certain wavelengths. To dogs and colorblind humans, red and green look the same because their receptors are activated similarly. Color isn’t just a property of light; it’s a biological perceptual experience.


  • ianonavy@lemmy.worldtoSelfhosted@lemmy.worldWhat is Docker?
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    8 days ago

    A signature only tells you where something came from, not whether it’s safe. Saying APT is more secure than Docker just because it checks signatures is like saying a mysterious package from a stranger is safer because it includes a signed postcard and matches the delivery company’s database. You still have to trust both the sender and the delivery company. Sure, it’s important to reject signatures you don’t recognize—but the bigger question is: who do you trust?

    APT trusts its keyring. Docker pulls over HTTPS with TLS, which already ensures you’re talking to the right registry. If you trust the registry and the image source, that’s often enough. If you don’t, tools like Cosign let you verify signatures. Pulling random images is just as risky as adding sketchy PPAs or running curl | bash—unless, again, you trust the source. I certainly trust Debian and Ubuntu more than Docker the company, but “no signature = insecure” misses the point.

    Pointing out supply chain risks is good. But calling Docker “insecure” without nuance shuts down discussion and doesn’t help anyone think more critically about safer practices.



  • ianonavy@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    14 days ago

    So the end result of this is… companies race to burn fossil fuels into plastic to take water away from municipal or agricultural sources, remove as much safety filtering as they legally (or illegally) can “because it’s cheaper and more competitive” and buy up as much water rights and other water bottling companies as they can with the centralized capital because economies of scale mean better margins. And then once they have a monopoly, they jack up the price and screw over everyone who doesn’t have free water in their taps (which is everyone because the cities all got priced out and had to sell their water rights so now people have to buy bottled water).

    Regulation in this scenario doesn’t work because the water companies are operating in some country across the world which has no money or army to enforce its laws. Or the local politicians are corrupt. There is no competition because people don’t have any real choice: they have to drink water which means they have to buy it from some company (as opposed to getting it for free as a human right). That is the big lie we’re all told about capitalism: that competition is a given in every market, government regulation is “in the way” and that the free market will somehow lead to the best outcome for all. At least for water (and also for web browsers), that is patently and obviously not true.

    Edit: link formatting





  • I don’t entirely agree. TikTok isn’t just silly dances, thirst traps, and trends—it has played a significant role in community organizing and coalition-building across social movements. Consider the university Pro-Palestine encampments or mainstream news reporting on social media reaction to the United Healthcare CEO’s killing. Neither is solely attributable to TikTok, but the scale and nature of discussion on the platform have demonstrably influenced real-world conversation and activism. Another example is Keith Lee’s viral restaurant reviews transforming the viability of small mom and pop businesses overnight.

    What sets TikTok apart isn’t just its massive reach (150 million monthly active users, nearly half the US population) but also its algorithm and features that enable collaborative, asynchronous discussion. Unlike YouTube Shorts or Instagram Reels, where content is mostly one-off entertainment with fleeting comment sections, TikTok fosters actual conversations. Features like stitching allow users to directly respond to others, creating an evolving discourse where users can trace context. At times, entire feeds become dominated by discussion of a single topic—sometimes celebrity gossip, but often major events like October 7 or the United Healthcare CEO killing. This level of organic, large-scale discourse doesn’t happen the same way on other platforms. A great example of this dynamic was when TikTok users collectively decided to migrate to the actually Chinese app XiaoHongShu specifically to spite the US government. That didn’t just happen—it was discussed and coordinated.

    In my view, TikTok is a national security threat not because of unproven claims about data leaks or state-authored propaganda, but because it provides an already restless and dissatisfied population with a real platform to discuss issues and organize. If a decentralized, open-source alternative existed at scale, TikTok itself wouldn’t be necessary. I acknowledge that TikTok—like any centralized platform—has real issues, particularly around privacy and censorship. But until such a decentralized alternative gains traction, TikTok remains important. And even then, I doubt the US government would be any more comfortable with a decentralized version, since it still wouldn’t give them control over what discussions take place.







  • Not exactly the same, but I find “plug” and “socket” or “jack” to be generally more useful terms since the definitions are based on function rather than similarity to genitalia. Plugs are usually male, but always. For example, computer power supplies typically have a male jack and a female plug. In those situations, I find it more meaningful to describe the part by whether it is fixed or moves rather than which way the prongs go.




  • While “sociopathy” isn’t a scientific term, claiming that all autistic people are sociopaths is a harmful false equivalence. Associating autism with the stigma of sociopathy based on your own definition doesn’t hold up. Your sources confirm that “sociopathy” isn’t scientific but don’t support your claim about autism.

    ASD and ASPD are distinct conditions, and the colloquial use of “sociopath” generally refers to traits associated with ASPD, not autism. Language evolves over time—consider how “literally” now also means “figuratively” due to ironic use, or how “antisemitism” specifically refers to discrimination against Jews, despite its broader etymological roots. Similarly, “sociopath” today typically refers to ASPD-related traits, not just any “social illness.”

    The person you’re responding to provided reputable sources disputing your definition, while your own sources lack expertise in psychology or linguistics. In fact, your third source even contradicts your argument; the article cites a contemporary psychologist who directly contrasts psychopaths with autistic children, highlighting the differences between the two conditions. If you’re calling others “pseudoscientists,” it’s important to evaluate your sources more carefully.

    People aren’t downvoting the idea that “sociopathy is nothing to be ashamed of”—that’s a valid point. But instead of playing word games, you could focus on that truth directly.




  • Adding onto what TheMrDrProf said: basically LetsEncrypt just wants to know you actually control the domain you’re using to get the certificate. With HTTP challenges, your domain has to resolve to a working HTTP server. With DNS challenges, you need API access to your DNS provider so that Certbot can set a temporary record that proves ownership.

    If you’re using NPM to manage your certs, then as TheMrDrProf said as long as the HTTP request from LetsEncrypt can make it to your NPM through the VPS proxy, you should be able to pass the challenge and get a certificate. The IP address of the domain doesn’t really matter as long as the request makes it all the way to the challenge HTTP server, which in this case is NPM.

    In NPM, you should see “Use a DNS challenge” option. If you use that and your DNS Provider is supported (if not, I recommend Cloudflare), then your VPS proxy does not even need to be working in order to renew certificates. This has a few advantages such as being able to shut off unencrypted traffic on port 80 completely.