• 1 Post
  • 27 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle






  • I already suggested this in another comment, but you can easily apply a thought experiment here. Magically replace all white people with black people with the same upbringing: does crime go up, down, or basically stay the same? Magically replace all pitbulls with chihuahuas with the same upbringing: do maulings go up, down, or basically stay the same?

    Couldn’t tell the cops if the mugger was white or black? Pretty understandable. Couldn’t tell the cops if the dog that bit you was a chihuahua or a pitbull? Really?

    Any “big dog with a blocky head” should be banned from breeding or sale, and nobody who agrees with that statement cares about DNA. It is a matter of public safety and it doesn’t matter that humans are the real problem, because humans are notoriously hard to control. The pitbulls and similar breeds we have today deserve all the love and comfort we can give them now, but they shouldn’t be bred into the future because there is no legitimate reason to own one except for its potential for violence and flatulence-scapegoating.










  • I think of a “mobile device” as a phone, tablet, and smartwatch, but those latter two categories are dwarfed by the market for phones, so I think they can be ignored. Laptops are dominated by Windows and macOS (BSD/Unix descendant, not Linux), so that can also be ignored. A few sites of questionable reputation put the global market share of iOS at around 30%, but let’s suppose it’s only 20%. In order for 99% of all mobile devices to be Linux-based, then only 1% of the total could be an iOS device, and roughly another 4% of the total is every other (presumably) Linux-based phone. That leaves 95% of the “mobile device” market for non-phone devices, which seems unrealistic, even accounting for industrial and commercial devices.


  • What’s the biggest code base you have ever reviewed? What’s the most recent TLS vulnerability you have encountered, as opposed to the last vulnerability in other parts of your OS? Code being swapped by the server, maybe, but are you saying you do a code review every time you update a package or dependency of some other project? This is only less secure in some inconceivably convoluted chain of events that no practical person could enact. No sane person does what you’re saying. Everyone has to trust someone else with code blindly at some point.





  • For point #1 - good riddance. That kind of porn is super creepy regardless of whether or not it is true CSAM.

    For point #2 - I might just be getting old, but I don’t have time to wade through a “bearable” feed when I can get all the best posts through someone else’s hard work. I am glad to have mods that reflect my approximate values and defederate where reasonable.

    I will appreciate when people like you repost/link the rare piece of good content that I miss out on though. I welcome views counter to my own, if well thought out or sanely provocative, but sometimes you gotta filter out trolls and creeps.

    I can say that I feel comfortable recommending my instance to people I meet IRL, and that counts for a lot with me.