I like to code, garden and tinker

  • 0 Posts
  • 35 Comments
Joined 9 months ago
cake
Cake day: February 9th, 2024

help-circle
  • It’s is M.2, but not the M/B+M key most M2 SSDs use but rather a A+E meant for WIFI/Bluetooth. According to this video it’s essentially 2 PCI Express x1 lanes and USB 2.0. The video goes on to explain some possible alternative uses:

    • A gigabit ethernet adapter
    • 2x SATA ports for a standard SATA drive
    • Coral tensor processor
    • SD card reader
    • 2x USB A-type ports
    • Some type of SIM card adapter (video wasn’t quite sure on it either)
    • A PCI Express x16 slot that only functionally works as a x1

    So while does this slot has it’s uses, it’s not meant to be used for M.2 drives but rather WIFI.




  • Just the act of refusing makes the act of seizing your phone legal or not. If you legally give them your phone by your own will, they are able to use all evidence they find in the courts. If you deny to give them your phone, and they seize it anyways and access it you have a valid path to throw the evidence they discover out as an illegal search and seizure of your property. I’m not a lawyer but that is the general thought process on denying them access to your property.

    Edit: Just want to say this mostly pretains to United States law and similar legal structures. This advice is not applicable everywhere and you should research your countries rights and legal protections.


  • I personally rather trust that my device isn’t able to be unlocked without my permission, rather than hope I am able to do some action to disable it in certain situations. The availability of such features is nice, but I would assume I would be incapable of performing such actions in the moment.

    My other thought is, how guilty is one perceived if they immediately attempt to lock their phones in such a matter, by a jury of their peers? I rather go the deniability route of I didn’t want to share my passcode vs I locked my phone down cause the cops were grabbing me.



  • The quotation marks did most of the lifting there, and it’s more of an anecdote of their own projections against themselves. They assume these “welfare queens” are driving around in high end cars and living luxurious lifestyles on the governments dollar, while they are the ones doing such. Sorry if there was any confusion. I agree with all the statements you have stated against Brett Farve though, they are the scum of the system they wish to project onto others.


  • Despite texts that show Favre sought to keep his receipt of the funds confidential, Favre has said he didn’t know the money came from federal funds intended for poor people. He’s paid the money back, but he’s being sued by the state of Mississippi for hundreds of thousands of dollars in interest that accrued on the money he received. Favre hasn’t been accused of any criminal wrongdoing.

    Source: (Yahoo News)

    So they could easily of have funded this themselves, but just rather steal public funds because “free money”? Sounds like a so called “welfare queen” to me.



  • From my understanding, you are pretty safe as long as you don’t provoke them (walking through the middle of them might be considered provoking) or near their calves. This article from the UK states “Where recorded, 91% of HSE reported fatalities on the public were caused by cows with calves”. Basically, mothers with a child are going to be very protective.

    Cows are a domesticated creature, so they are generally docile, but I would exercise caution because if need be they will use their mass and strength against you. I’ve heard of stories of farmers running from cows and narrowly escaping under a fence. Most of these did involve a farmer trying to separate a calve from it’s mother. I’ve also heard stories of cows jumping fences.

    And as far as memes go:






  • dudeami0@lemmy.dudeami.wintoLemmy Shitpost@lemmy.worldPlease Stop
    link
    fedilink
    arrow-up
    7
    arrow-down
    1
    ·
    8 months ago

    A blockchain is just an verifiable chain of transactions using cryptography and some agreed upon protocol. Each “block” in the chain is a block of data that follows a format specified by the protocol. The protocol also decides who can push blocks and how to verify a block is valid. The advantages it has comes from the fact the protocol can describe a method of giving authority across a pool of untrusted third parties, while still making sure none of them can cheat. Currently the most popular forms are Proof of Work (PoW) and Proof of Stake (PoS).

    Bitcoin for example is just an outgoing transaction to a specific crypto key (which is similar to a checking account) as a reward for “mining” the block, followed by a list of transactions going from a specific account to another account. These are verified by needing a special chunk of data that turns the overall hash of the entire block to a binary chunk containing a number of 0 bits in front, which makes it hard to compute and a race to get the right input data. This way of establishing an authority is called Proof of Work, and whoever is first and gets their block across the network faster wins. Other cryptocurrencies like Ethereum use Proof of Stake where you “stake” currency you’ve already acquired as a promise that you won’t cheat, and if someone can prove you cheated your stake is lost.

    The problem it solves is not needing a trusted third party to handle this process, such as a government agency or an organization. Everyone can verify the integrity of a blockchain by using the protocol and going over each block, making sure the data follows the rules. This blockchain is distributed so everyone can make sure they are on the same chain, else it’s considered a “forked” chain and will migrate back to the point of consensus. This can be useful for situations where the incentive to cheat the system for monetary or political gain outweigh the cost of running a distributed ledger. It can also be useful when you don’t want anyone selectively removing past data as the chain of verifiability will be broken. The only issue with this is you need some way to reach a consensus of who gets to make each block in the chain, as someone need to be the authority for that instant in time. This is where the requirement of Proof of Work (PoS) or Proof of Stake (PoS) come in. Without these or another system that distributes the authority to create blocks, you lose the power of the blockchain.

    Examples I’ve heard of are tracking shipments or parts (similar to how the FAA already mandates part traceability) and medical records. This way lots of organizations can publish records relating to these to a central system that isn’t under any single entities control, and can’t change their records to suit their needs.

    These systems are not fool proof though, PoW has the ability to be abused using a 51% attack and PoS requires some form of punishment for trying to cheat the system (in cryptocurrency you “stake” currency and lose it if you try to cheat the system). Both of these run into issues when there is no incentive to invest resources into the system, a lack of distribution across independent parties, or one party has sufficient power to gain a majority control of the network.

    Overall you are right to be skeptical of cryptocurrency, it’s been a long time since I participated due to the waves of scam coins and general focus on illegal activities such as gambling. The lack of central authorities also perpetuates the problem of cryptoscams, as anyone can start one and there are limited controls over stopping such scams. This is not dissimilar to previous investment scams though, it’s just the modern iteration of such scams. The real question is does it solve a real problem, as Bitcoin did in the sense it helps facilitate transactions outside of government controls. You might not agree with that but it does give it an intrinsic value to a large number of people looking to move currency without as much paperwork. Now if it makes it worth $68.5k USD (at current prices) is a different story, different people have different use cases and I only highlighted one of those.



  • If you are expecting a more windows-like experience, I would suggest using Ubuntu or Kubuntu (or any other distro using Gnome/KDE), as these are much closer to a modern Windows GUI. With Ubuntu, I can use the default file manager (nautilus) and do Ctrl+F and filter files via *.ext, then select these files then cut and paste to a new folder (drag and drop does not seem to work from the search results). In Kubuntu, the search doesn’t recognize * as a wildcard in KDE’s file manager (dolphin) but does support drag/drop between windows.


  • Looking over the github issues I couldn’t find a feature request for this, so it seems like it’s not being considered at the moment. You could make a suggestion over there, I do think this feature would be useful but it’s up to the devs to implement it.

    That being said, I wouldn’t count on this feature being implemented. This will only work on instances that obey the rules so some instances could remove this feature. When you look up your account on my instance (link here), it is up to my server to respect your option to hide your profile comments. This means the options have to be federated per-user, and adds a great deal of complexity to the system that can be easily thwarted by someone running an instance that chooses to not follow these rules.

    If your goal is to stop people looking up historical activities, it might be best to use multiple accounts and switch to new accounts every so often to break up your history. You could also delete your content but this is again up to each instance to respect the deletion request. It’s not an optimal solutions but depending on your goals it is the available solution.

    Edit: Also if your curious about the downvotes, it’s not the subject matter but your post violates Rule 3: Not regarding using or support for Lemmy.