leanleft

joined 5 years ago
MODERATOR OF
[–] leanleft@lemmy.ml 2 points 1 year ago

There are way more companies who want to text-mine user content than there are blind people using the internet to read my content.

[–] leanleft@lemmy.ml 5 points 1 year ago (1 children)
[–] leanleft@lemmy.ml 6 points 1 year ago

Google sucks

[–] leanleft@lemmy.ml 1 points 1 year ago

Diaspora has private groups. But many downsides.
For example.. discovering people, first involves sharing with them.

[–] leanleft@lemmy.ml 1 points 1 year ago

It would be dfficult to keep all kinds of random things in an affordable database.

I'm more concerned about the meaning of life. Which, conveniently is 42.

[–] leanleft@lemmy.ml 1 points 1 year ago

The corruption is almost complete

[–] leanleft@lemmy.ml 1 points 1 year ago

Verizon seemed to lower their prices but prices are only valid for first year of service.

[–] leanleft@lemmy.ml 2 points 1 year ago

If its just a game then why not run it in any old browser.
It doesnt matter much, in this case.

[–] leanleft@lemmy.ml 8 points 1 year ago

Be careful that unlimited ( more acurately labeled via the "high speed data" limit) is a widely used practice of false advertising.
Check the throttle speed to see what happens after you run out of data.

[–] leanleft@lemmy.ml 0 points 1 year ago* (last edited 1 year ago)

Not perfect:
But here are some ideas.

  • reddit (tor)
  • wikipedia (tor)
  • certain niche direct sources (tor)

More ideal ideas:

  • certain specific private source (maybe tor). Not reliable but high quality.
  • large collection of raw links ( requires labor, skill. And yields imperfect results )
  • searx ( mainly to share with friends and as a fallback. it is a pretty great premade metasearch engine when selfhosted)
  • ready-to-go foss searchengine implementations. (Limited in scope, requires decent amount of "labor" and time. Requires setup phase and light maintaining. Extremely high quality results. Optionally invest money in various ways to supercharge. Perhaps recruit collaborators)

other stuff:

  • creating private collections and bookmarks
  • not using internet or using rarely or using in cautious way. Or not using www.
  • focusing on distracting self with hands-on projects.

What am i actually using at this point? (Nothing is set up currently!).

  • Sometimes i use tor 70% of the time. Sometimes i use tor 30% of the time.
  • very frequently non www .
  • duckduckgo when needed. [Often] without visiting the links
  • niche sources (2, ..)
  • reddit

*this isnt perfect! but i think overall i think i dont spend much time traveling to websites for info.

Historically:

  • searx
  • searchengine
  • dabble in scaling.

Future:

  • selfhost
  • scaling
  • further isolation
  • IRL
  • other stuff. such as creating new solutions.

There is certainly room for immediate improvement here.
Im just lazy.

I dont need the internet as much as the internet needs me.

[–] leanleft@lemmy.ml 1 points 1 year ago

I hear people frequently say this.

Searx is basically a proxy. If you had an actual proxy.. you would achieve the exact same benefits. Its good for making it difficult.. or extremely difficult to tie a person's real identity, directly to their search query.
Another thing that searx does is sends your query to google. This is not good for privacy. But sometimes it gives you additional results.

 

..“crisis of affordability” for prescription drugs, he proposed a novel solution: allow the government to negotiate better deals for critical medications.

Repealing that so-called noninterference provision has been a centerpiece of Democratic campaigns ever since. Senator Chris Van Hollen of Maryland, a former head of House Democrats’ campaign arm, recalled that “Medicare shall negotiate drug prices” was one of the six planks in the “Six for ’06” platform that helped the Democrats win control of the House in 2006.

“It would mean that the pharmaceutical industry, which has 1,500 paid lobbyists, the pharmaceutical industry, which made $50 billion in profits last year, the pharmaceutical industry, which pays its executives huge compensation packages, and which is spending hundreds of millions of dollars to defeat this legislation, will have won,”

 

Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices.

This is a complete rewrite in Rust of the UAD project which aims at improving privacy and battery performance by removing unnecessary and obscure system apps.

 
1
"why gemini?" (ytprivate.com)
 

Tomasino talks about gemini in video

1
submitted 3 years ago* (last edited 3 years ago) by leanleft@lemmy.ml to c/gentoo@lemmy.ml
 

these should not be used system wide (see package.env). good for small programs that don't serve as dependencies for alot of other important packages. specifying flags will force them and can cause problems with compilation or cause the program to stop unexpectedly.

  _FORTIFY_SOURCE (since glibc 2.3.4)
          Defining this macro causes some lightweight checks to be performed to detect some buffer overflow errors when
          employing various string and memory manipulation functions
          (for example, memcpy(3), memset(3), stpcpy(3), strcpy(3),
          strncpy(3), strcat(3), strncat(3), sprintf(3),
          snprintf(3), vsprintf(3), vsnprintf(3), gets(3), and wide
          character variants thereof).  For some functions, argument
          consistency is checked; for example, a check is made that
          open(2) has been supplied with a mode argument when the
          specified flags include O_CREAT.  Not all problems are
          detected, just some common cases.

          If _FORTIFY_SOURCE is set to 1, with compiler optimization
          level 1 (gcc -O1) and above, checks that shouldn't change
          the behavior of conforming programs are performed.  With
          _FORTIFY_SOURCE set to 2, some more checking is added, but
          some conforming programs might fail.

          Some of the checks can be performed at compile time (via
          macros logic implemented in header files), and result in
          compiler warnings; other checks take place at run time,
          and result in a run-time error if the check fails

-fcf-protection=[full|branch|return|none|check]

Enable code instrumentation of control-flow transfers to increase program security by checking that target addresses of control-flow transfer instructions (such as indirect function call, function return, indirect jump) are valid. This prevents diverting the flow of control to an unexpected target. This is intended to protect against such threats as Return-oriented Programming (ROP), and similarly call/jmp-oriented programming (COP/JOP).

The value branch tells the compiler to implement checking of validity of control-flow transfer at the point of indirect branch instructions, i.e. call/jmp instructions. The value return implements checking of validity at the point of returning from a function. The value full is an alias for specifying both branch and return. The value none turns off instrumentation.

The value check is used for the final link with link-time optimization (LTO). An error is issued if LTO object files are compiled with different -fcf-protection values. The value check is ignored at the compile time.

The macro __CET__ is defined when -fcf-protection is used. The first bit of __CET__ is set to 1 for the value branch and the second bit of __CET__ is set to 1 for the return.

You can also use the nocf_check attribute to identify which functions and calls should be skipped from instrumentation (see Function Attributes).

Currently the x86 GNU/Linux target provides an implementation based on Intel Control-flow Enforcement Technology (CET).

-mstack-protector-guard=guard -mstack-protector-guard-reg=reg -mstack-protector-guard-offset=offset

Generate stack protection code using canary at guard. Supported locations are ‘global’ for global canary or ‘tls’ for per-thread canary in the TLS block (the default). This option has effect only when -fstack-protector or -fstack-protector-all is specified.
With the latter choice the options -mstack-protector-guard-reg=reg and -mstack-protector-guard-offset=offset furthermore specify which segment register (%fs or %gs) to use as base register for reading the canary, and from what offset from that base register. The default for those is as specified in the relevant ABI.

-fstack-protector

Emit extra code to check for buffer overflows, such as stack smashing attacks. This is done by adding a guard variable to functions with vulnerable objects. This includes functions that call alloca, and functions with buffers larger than or equal to 8 bytes. The guards are initialized when a function is entered and then checked when the function exits. If a guard check fails, an error message is printed and the program exits. Only variables that are actually allocated on the stack are considered, optimized away variables or variables allocated in registers don’t count.

-fstack-protector-all

Like -fstack-protector except that all functions are protected.

-fstack-protector-strong

Like -fstack-protector but includes additional functions to be protected — those that have local array definitions, or have references to local frame addresses. Only variables that are actually allocated on the stack are considered, optimized away variables or variables allocated in registers don’t count.

-fstack-protector-explicit

Like -fstack-protector but only protects those functions which have the stack_protect attribute.

-fstack-check

Generate code to verify that you do not go beyond the boundary of the stack. You should specify this flag if you are running in an environment with multiple threads, but you only rarely need to specify it in a single-threaded environment since stack overflow is automatically detected on nearly all systems if there is only one stack.

Note that this switch does not actually cause checking to be done; the operating system or the language runtime must do that. The switch causes generation of code to ensure that they see the stack being extended.

You can additionally specify a string parameter: ‘no’ means no checking, ‘generic’ means force the use of old-style checking, ‘specific’ means use the best checking method and is equivalent to bare -fstack-check.

Old-style checking is a generic mechanism that requires no specific target support in the compiler but comes with the following drawbacks:

    Modified allocation strategy for large objects: they are always allocated dynamically if their size exceeds a fixed threshold. Note this may change the semantics of some code.
    Fixed limit on the size of the static frame of functions: when it is topped by a particular function, stack checking is not reliable and a warning is issued by the compiler.
    Inefficiency: because of both the modified allocation strategy and the generic implementation, code performance is hampered.

Note that old-style stack checking is also the fallback method for ‘specific’ if no target support has been added in the compiler.

‘-fstack-check=’ is designed for Ada’s needs to detect infinite recursion and stack overflows. ‘specific’ is an excellent choice when compiling Ada code. It is not generally sufficient to protect against stack-clash attacks. To protect against those you want ‘-fstack-clash-protection’.

-fstack-clash-protection

Generate code to prevent stack clash style attacks. When this option is enabled, the compiler will only allocate one page of stack space at a time and each page is accessed immediately after allocation. Thus, it prevents allocations from jumping over any stack guard page provided by the operating system.

Most targets do not fully support stack clash protection. However, on those targets -fstack-clash-protection will protect dynamic stack allocations. -fstack-clash-protection may also provide limited protection for static stack allocations if the target supports -fstack-check=specific.

-fstack-limit-register=reg -fstack-limit-symbol=sym -fno-stack-limit

Generate code to ensure that the stack does not grow beyond a certain value, either the value of a register or the address of a symbol. If a larger stack is required, a signal is raised at run time. For most targets, the signal is raised before the stack overruns the boundary, so it is possible to catch the signal without taking special precautions.

For instance, if the stack starts at absolute address ‘0x80000000’ and grows downwards, you can use the flags -fstack-limit-symbol=__stack_limit and -Wl,--defsym,__stack_limit=0x7ffe0000 to enforce a stack limit of 128KB. Note that this may only work with the GNU linker.

You can locally override stack limit checking by using the no_stack_limit function attribute (see Function Attributes).

-fsplit-stack

Generate code to automatically split the stack before it overflows. The resulting program has a discontiguous stack which can only overflow if the program is unable to allocate any more memory. This is most useful when running threaded programs, as it is no longer necessary to calculate a good stack size to use for each thread. This is currently only implemented for the x86 targets running GNU/Linux.

When code compiled with -fsplit-stack calls code compiled without -fsplit-stack, there may not be much stack space available for the latter code to run. If compiling all code, including library code, with -fsplit-stack is not an option, then the linker can fix up these calls so that the code compiled without -fsplit-stack always has a large stack. Support for this is implemented in the gold linker in GNU binutils release 2.21 and later.
1
awesome-piracy (github.com)
submitted 3 years ago* (last edited 3 years ago) by leanleft@lemmy.ml to c/piracy@lemmy.ml
 

Contents VPNs VPN Guides and Tutorials VPN Subscription Services Self-hosted VPNs Browser Extensions Userscripts Password Vaults Antivirus Privacy Windows 10 Privacy Email Operating Systems Decentralised Networks Domain Names Torrenting Trackers Private Trackers Semi-Private Trackers Public Trackers Tracker Aggregators Tracker Proxies Tracker Invites Torrent Clients Deluge rTorrent WebTorrent Clients autodl-irssi Seedboxes Web-based Cloud Seedboxes Seedbox Hosting Providers Seedbox Setup Tools and Guides Tracker Frameworks Usenet Usenet Providers Usenet Indexers Usenet Indexing Software Paid Indexers Free Indexers Usenet Clients Direct Downloads Download Managers DDL Tools Custom Google Search Engines FTP Indexers DDL Search Engines and Crawlers DDL Link Sites Premium Link Generators Premium Link Hosts Open Directories Streaming Sites HD Streaming Big Media Libraries TV Anime Cartoons Sports Streaming Specialty Sites Openload Hosts Media Centre Applications Stremio Plex Plex Plugins Plex Requests Plex Scripts and Tools Plex Shares Plex Transcoding Plex Logging and Metrics Plex Clients Kodi Gaming Repacks ROMs Console Games Homebrew and Custom Firmware Music Music Streaming Music Downloading Spotify iTunes Software Ebooks Magazines Academic Papers and Material Textbooks Courses and Tutorials Audiobooks Comicbooks Manga Documentaries Fonts, Icons and Graphics Automation TV Automation Movie Automation Music Automation Subtitles Automation P2P Networks Ripping, Transcoding, Converting, Encoding Cloud Storage File Renaming and Tagging Mobile Apps Streaming Apps Torrent Apps APKs Discord Servers IPTV and DVR Acestreams IRC IRC Clients IRC Networks IRC Search Engines DC++ Full Movies On Piracy Blogs and News Content Discovery PreDB Sites Dashboards and Homepages Proxy Sites File Sharing Tools Stream Synchronisation Telegram Piracy

 

rush past automated menus and speak to someone who can help you

 

write down tasks or anxiety on your mind before you go to sleep. forget about them and then pick them up in the morning.

 

pipe docs like pdf, archives, audio, and images in the terminal.

1
tmux terminal copy paste (awhan.wordpress.com)
submitted 3 years ago* (last edited 3 years ago) by leanleft@lemmy.ml to c/commandline@lemmy.ml
 

use with lynx by pressing 'p' to print and output it to the screen/scrollback.
then you can press '!' to drop to the terminal from lynx. ('exit' to go back to lynx).
in the terminal you can copy anything you need from the scrollback page and paste it in a tmux space such as a different pane or window.

 

Let’s say you are 5 years old and your father is 30. The average between you two is 35/2 =17.5.
Now let’s say your two cousins are 17 and 18. The average between them is also 17.5.
As you can see, the average alone doesn’t tell you much about the actual numbers. Enter standard deviation. Your cousins have a 0.5 standard deviation while you and your father have 12.5.
The standard deviation tells you how close are the values to the average. The lower the standard deviation, the less spread around are the values.

 

Open a blank dark or white tab rather than the default browser's new tab page.

view more: ‹ prev next ›