I do a little bit of everything. Programming, computer systems hardware, networking, writing, traditional art, digital art (not AI), music production, whittling, 3d modeling and printing, cooking and baking, camping and hiking, knitting and sewing, and target shooting. There is probably more.

  • 4 Posts
  • 220 Comments
Joined 2 years ago
cake
Cake day: June 4th, 2023

help-circle




  • Depends on the bear. Black bears this can work, but if they attack you anyway you have to fight for your life or you are dead since they will keep attacking their prey until they are certain its dead.

    Grizzlies… Be quiet and calm and talk in a low voice, also do not run if possible, if you run they will think you are prey. If they attack you, ball up, protect your neck and head, fight as well if you really have no other option. Making yourself seem big and scary isn’t very effective with them.

    Polar bear, you’re just fucking dead.

    For all of them, carry bear bangers and or bear spray.



  • I don’t agree with the sentiment that a word used by one guy next to a slur they also used imparts a derogatory meaning to the word as well. If this were the case, we would have a problem with a lot more words.

    If someone said “F-slurs shine like a rainbow”, that doesn’t make the words shine or rainbow derogatory.

    Furthermore with the contextual usage of glowie considered - if it is derogatory, then its usage shows that its derogatory to members of the CIA rather than people of color.

    However if people continue to cite glowie as a slur for people of color, then people might start to use it in that context, and then it becomes a slur for people of color.

    Therefore I would recommend not citing the use of the word in this way because all it can do is eventually add a derogatory connotation that doesn’t currently exist outside of being next to a slur during one usage or the creation of it.



  • golden_zealot@lemmy.mltoSelfhosted@lemmy.worldPlex now want to SELL your personal data
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    3
    ·
    edit-2
    4 months ago

    UpNp or port forwarding is the same way both Plex and Jellyfin work.

    I don’t know what makes Jellyfin less secure since they both work the same way for this as far as I can tell…

    Can you be more specific about what makes Jellyfin less secure when it comes to UpNp/port forwarding?

    In the case of port forwarding at least Jellyfin is open source and has more eyes on it so it’s less likely for someone to zero day it and have at it unless I have misunderstood how each can connect off-network.

    Furthermore the hash for your password is stored along with many others at a single (or relatively few) attack point/s on a Plex business server since it’s a centralized business whereas this is never the case for Jellyfin.

    Also this thread is about Plex literally selling your personal data so I don’t really consider Jellyfin worse for exposing your personal data.

    I’ll take my chances with a single idiot who want’s to compromise my poor asses tiny network versus an actual hacker who wants to compromise an enterprise businesses network that is storing thousands or hundreds of thousands of user credentials, data, and payment information (Which Jellyfin doesn’t store even half of).

    If someone hacks Jellyfin on my network -> They have my… media files? Maybe the hash of the one password I use there?

    If somone hacks Plex on my network or anywhere - or the people they sold that data to -> They have my password hash, credit card number and probably my name that is associated to it, personal data that Plex is selling, etc.

    TL:DR I think Plex is more likely to be hacked rather than myself and the outcome of Plex getting hacked is worse than if my personal Jellyfin server gets hacked.




  • Depends on whose definition it is.

    Some define alcoholism as a dependence on the substance alone, others define it as a continued use of the substance despite it causing problems for the individual, other definitions require that the user display signs of physical dependency/withdrawal syndrome when no longer using the substance.

    Anecdotally, in my experience usually people only begin referring to someone as an alcoholic when they become physically dependent and experience withdrawals when stopping use.



  • golden_zealot@lemmy.mltoAsklemmy@lemmy.mlWhich news sources do you actually trust?
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    4 months ago

    I’ve stopped paying attention to what any regular news source says about anything themselves since it is all basically profit driven and therefore unreliable. Rather I just pay attention to sources where I can see what is said or done from the horses mouth directly, and then pay attention to people’s reactions to such things.

    These are usually few and far between, but I’m talking about what was written or said by specific persons with the clear source of it coming from their personally verified outlets.

    I also wait on this information before thinking too much about it as well because god knows if someone catches something out for being AI generated or a deepfake or what have you in this day and age. After a few days it gains some actual credibility as coming from that person and being the genuine article.

    It is also important to still not trust what any one person says about something else as well, or even multiple persons. I can never really trust what is said by anyone as facts anymore - rather this only gives insight into that specific persons opinions on the other thing.

    In the face of mountains of clear evidence and individually verified sources from many multiple persons - then and only then can I begin to trust something as fact.




  • However, If I recall correctly, I think that when creating a post if you upload an image then it is immediately put into the database whether or not the post is actually made. As a result I don’t think there is a way to overwrite these, so some trace would still remain in such an instance if I am not mistaken.

    Furthermore none of this prevents or rectifies snapshots or backups of data being created by pretty much any entity - I know that’s probably not in the scope of the question, but just something tangentially related to keep in mind.




  • One time on a summer day as a teenager I went to the grocery store with my Mom.

    We parallel parked the car a ways away from other cars. We secured the car as normal and went on a short shopping trip.

    When we came back out after maybe 15 minutes, all of the cars windows were rolled down completely.

    We both know for a fact all the windows were rolled up when we left, and even if we had them down, there would have been no reason to have the back windows down.

    Nothing was stolen, no one was around, everything appeared untouched.

    This was a Nissan Murano if I recall correctly - it did have power windows, but at the time there was no fancy stuff to remote control car features outside of having a remote starter installed, which we did not have.

    There was only one set of keys.

    We still have absolutely no explanation for this to this day.