• 0 Posts
  • 289 Comments
Joined 2 years ago
cake
Cake day: June 15th, 2023

help-circle


  • And this specifically target AI training web crawlers.

    There’s no way to distinguish between an AI training crawler and any other crawler. Per https://zadzmo.org/code/nepenthes/ :

    “This is a tarpit intended to catch web crawlers. Specifically, it’s targetting crawlers that scrape data for LLM’s - but really, like the plants it is named after, it’ll eat just about anything that finds it’s way inside.

    Emphasis mine. Even the person who coded this thing knows that it can’t tell what a given crawler’s purpose is. They’re just willing to throw the baby out with the bathwater in this case, and mess with legitimate crawlers in order to bog down the ones gathering data for LLM training.

    (In general, there is no way to tell for certain what is requesting a webpage. The User-Agent header that (usually) arrives with an HTTP(S) request isn’t regulated and can contain any arbitrary string. Crawlers habitually claim to be old versions of Firefox, and there isn’t much the server can do to identify what they actually are.)






  • nyan@lemmy.cafetoTechnology@lemmy.worldRight to Root Access
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    15 days ago

    The purpose of a locked boot system is privacy.

    No. Once you strip away all the rhetoric, the purpose of a locked boot system is control (over who or what can boot the system).

    Current secure boot implementations are like a door lock installed by someone else, which you are not allowed to replace and that may or may not allow you to cut your own duplicate keys for it. You have no control whatsoever over who the people who installed the lock may have given keys to, and if it turns out that the lock has a fundamental design flaw that means it can’t do its job properly, well, sucks to be you. You can’t even guarantee that the lock won’t morph into a new shape randomly or under the control of the installer, invalidating your existing keys in the process.

    Rooting a device is a tradeoff. An unreliable door lock that you don’t entirely control may be better than none, but if you know you’re leaving the door unlocked, you also know you need to take other precautions to safeguard what’s inside (or simply not leave anything of value there in the first place).

    The ideal would be a locked boot system that is installed by the user and is fully under their control, but I have yet to encounter one.


  • It isn’t in their best interests to threaten the loony Christian sects that are one of the right wing’s favourite brainwashing tools. Members of those sects rely on authority figures to “interpret” the Bible for them instead of actually paying attention to its content, but if you try to take it away from them, they’ll throw a fit like a toddler does when you take away a toy they’ve been ignoring. Restricting access to the Bible in the present day would make religious brainwashing more difficult and create more people who actually think for themselves, which is anathema to bad governments like Texas’.


  • That can be weaponized, though. US government publications are public domain. So is the Bible. We’d at least get to watch members of the Texas government tie themselves into knots worthy of a game of Twister as they try to argue that those texts are harmful on a porn site but not anywhere else.











  • Not in the way you’re hoping for. Proton is a wine offshoot, which means it’s exclusive to x86 and x86_64 arches. You could perhaps get it to run by installing qemu and setting it up to run x86_64 binaries, but even if that worked you’d likely end up with single-digit FPS in most games.

    Based on what Gentoo currently has keyworded, you should be able to get a solid useful desktop—KDE or Gnome (or sway, if that’s your preference), Firefox, Libreoffice, Gimp, VLC, and other popular basics—but I wouldn’t expect games or other proprietary software for a while yet, if ever.