Wait till they find out who has been onboarded to OpenAI already, xd
DapperPenguin
I love this, thank you for sharing. It would be nice if you linked directly to your repository next time instead whatever
https://memory-graph.com/#codeurl=https%3A%2F%2Fraw.githubusercontent.com%2Fbterwijn%2Fmemory_graph%2Frefs%2Fheads%2Fmain%2Fsrc%2Fbin_tree.py×tep=0.2&play=
this link was. I'll add it below just for others.
I would always recommend against normal users from straying away from the most beaten path. These more technical appealing distros are for advanced users that have specific purpose and use cases in mind. Yeah, in particular, users that adjust their environment frequently (maybe for software development purposes), and want to ensure system stability at the same time.
This indiscriminate targeting, as the FBI and White House security officials have previously noted, allowed Beijing’s snoops to geo-locate millions of mobile phone users, monitor their internet traffic, and, in some cases, record their phone calls.
Oh no! If anybody's going to spy on our civilians, it's going to be us. Sarcastic snide remarks aside, good to know the government potentially stopped a major national cyber attack even if it was about 5 years after salt typhoon's digital reconnaissance began.
I also greatly appreciate blogs and articles. Still, that is not to say videos are useless. There are still a lot of great technical videos out there
I understand your sentiment. I wonder, if one were to "recruit" a lot of popular youtubers to stream in a decentralized fediverse manner by offering to make a simple hardware solution for them, would it encourage others to follow? How much of an investment would that be? Presumably you could keep the hardware "product" going and if more catch on they could also be directed towards your solution as helping them get in (quicker to market) as the network effect grows.
One would need to address the way people could monetize themselves aside from getting direct viewer support via subscriptions or donations.
You can simply go to the official tor or i2p pages and read more about details, then do follow up research from there. With i2p there's actually a few parallel implementations actively being developed. Original is in Java, there's a C++ one, and then another one I can't remember. Very new implementations are being made in Rust as well
Thanks for volunteering to help the network in good faith! I think it is much easier for normal people to get an i2p router up and running and help the entire network, instead of setting up a tor node. And with the use of inbound/outbound unidirectional tunnels (which you can set up to 5 nodes each), you could theoretically have a 10 node round trip of intermediate tunnels between you and a server, as opposed to tor which uses a bidirectional tunnel.
Some gracious users set up what is known as an "outbound proxy", which acts like tor exit node to the clearnet. Personally I would never host one of these, as I am hesitant of having anonymous entities make clearnet requests and being held liable. But as an i2p router in somebody else's tunnels, you can just imagine yourself as a road on a map that other roads connect to. The road isn't responsible for what people are carrying on it, or what their destination might be. That would be an unreasonable expectation to place on any road. In fact, the router doesn't have any idea of what the exact destination is, even if it's the last node in the tunnel - simply because during the encryption/decryption process it only knows of the next address to hit!
For example, say an i2p router hosts a git server. It could be the destination for packets, where clients are using it for version control, or it could act as a node in somebody's tunnels to connect with other servers/clients. From the network view, I do not believe you can tell, and that is pretty neat.
In the effort of being transparent and educating you, I do believe an outstanding problem is stream isolation. You should be able to do "soft resets" that reset your identity, although I forget the exact technical i2p term for this. This concern is for clients, not just leaving a router up. So if you intend on using that router to access the network yourself, it would be a good idea to do that soft or hard reset occasionally depending on your concerns. You can do it as often or never at all.
If you could project into the future, you might see that VPNs are a dwindling non-solution to the problem. As this unsettling trend makes waves across all jurisdictions in the world, every VPN's IP will be subject to these new controls.* Eventually normies might need to understand technologies like Tor or I2P. Only problem is, if things get really bad they might ban the use of both outright. I'm not sure if I2P can be detected just as Tor, but I do know Tor users can be detected easily. Which is why if you're in a "censorship" country you need to use some sort of special subset of entry guards. I2P might be better because every node in the network is like a router, none are specifically entry, middle, or exit nodes. Only thing I could think of, maybe some form of deep packet inspection? If everybody runs an I2P router, then simply making requests to other nodes is not enough to determine it's an i2p communication?* It's just distributed computing, the way the internet was intended!
Blaming Russia for the inadequacies of much more powerful nations like the US is pretty ignorant, imo.
Guess this is what happens when a post in the lemmy verse gets about 100 comments.
From my discussion with C++ folk, auto is just part of the "modern" way of doing c++. Paired with the -> return type. Perhaps including that -> return type negates this problem? It's still strange to me. Feels more like Rust