

Maybe, but immortality also tends to come with things like extraordinary capabilities for self repair and by extension disease resistance, so maybe they get some sort of error correcting code in their DNA replication to go with it.
Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.


Maybe, but immortality also tends to come with things like extraordinary capabilities for self repair and by extension disease resistance, so maybe they get some sort of error correcting code in their DNA replication to go with it.

Yeah, though with things like the fediverse, generations that where born into the tech world (internet only really started to be a thing around high school for me, but my kids have never used dial up) and small cheap systems like raspberry pi I expect it’ll get much easier and hopefully more common.

Self host ALL the things. I know where all my pics and docs reside right here in my house.

I deleted one I didn’t even remember having. Something I created back when I first got a smart phone and as much as I recall think I used it for the primary phone login account and had my separate emails just in the client.
Only got reminded of it when they sent an email to my main address saying it had been inactive for years and was going to be deleted anyhow, so went through this process where they unlocked it after a month of waiting to see what was in there before shutting it down. Was pretty much blank from the start so it doesn’t really matter if they actually deleted it or not.
How my main email got set as a recovery is another question, probably just many years back brain not being so good at keeping online identities siloed.


How does one get so self important as to think that someone owes you a megaphone to the point you demand $50M for not letting you spout your drivel?


Bah, minor inconveniences, fix it next cycle.


Ok, so badly phrased, yes companies will do geo fencing principally for security threat containment. If a company has no means to serve customers in a region they may also block access to avoid people making orders that can’t be fulfilled.
Denying service that they functionally can perform because of the whims of politicians and politically minded actors is a foolish behavior though. Every place on earth has some wing of society that would prefer isolationist and ultra conservative practices, to self censor to the lowest common denominator is going to only push away those users who aren’t zealots.


GeoIP fencing is an eternal whack-a-mole, I’ve had to track down issues where a site owned by MS was blocked because they bought some public IP space previously owned by countries the client blocks.
In the end you have countries trying to get a piece of the pie from a company that they have no ties to but being unwilling to upset the people living there by taking an effort to block it. If they think the company is behaving incorrectly then it’s on them to deny access to their citizens that they have to answer to.
A company can’t reasonably decide which jurisdictions and IPs it should serve at any given time. If I don’t want a site in my house I don’t petition them to block my IP.


By that token, I could start my own private Island nation, make some batty rules, log into a site, and demand a bajillion dollars because my laws say so.
Internet doesn’t work that way, access is not presence of operations.


Like that it is largely offline other than to search the food DB sources, no account to have to sign into and feed your data to someone.
Dislikes, some graphical glitches on my phone like buttons going off the edge and unable to scroll down. Also, no murica measurements for those of us accustomed to measuring against arbitrary, non-scientific standards.


Donnie soon; ‘computers are for nerds, I don’t use em, we where a lot better off without all this cyber nonsense, and their Intel is wrong, Tulsi is wrong here, should have gone with AMD, sound a lot like and, and this and that, brings things together…’


Reality doesn’t actually consist of an unending torrent of bullshit drowning people in misery, that’s just what sells in the media and outrage algorithms.
Sometimes people like to see a win in their life rather than be told it’s all going to hell.


That’s pretty well what I started with 20 years or so ago, had them in some little box with some funny Nvidia CPU. That go upped to a pair of 3 TB that have somewhere around 10 years uptime on them if I recall by now, and kind of spiraled from there. Rsync on a schedule is nice for that.


Just part of a lab built over the years. Primary storage is a Dell R730XD filled mostly with 12 TB drives all set up in a ZFS array comprised of mirror vdevs, so redundant by default plus the built in ZFS snapshots for the rare need for a rollback on a dataset.
It only recently got that big because I had a mixed set of drives going back years and finally decided to work on getting them all to the same size and picked 12 as a good cost/volume balance, can find them at used server parts shops for a bit over $100 each.
Major risk is I don’t have a good auto alert for smart monitor issues, so just make sure to occasionally manually copy the vital stuff like photos to an external drive.


How do you stream it if nobody downloads it to seed things? The whole premise of seed ratios isn’t just a bragging score, it’s aiding the communal health.
Besides, I have around 60 TB of space here, that’ll hold several versions of damn near every Linux distro out there for a while, it’d be a shame to waste it.

It depends on how many layers of obfuscation you are looking to deal with. There always needs to be some publicly shared token to initiate a connection, even if that’s only the public key of a asymmetric key pair to a 3rd party auth system.
There are ways to do it, but part of the difficulty is there are so many ways to do it that coming to an agreed method is like herding cats.

Which means encrypted messaging without a backdoor would be illegal if this passes! That’s a slippery slope!
Metadata is not content, so no E2E would not be illegal. Metadata is things like who sent messages to who at what time, duration, volume of data, other externally parsable metrics like that.

It’s interesting that this is kicking up some controversy. Personally I’ve held similar thoughts since the time of AOL, that once it leaves your system it’s no longer in your control. You can ask people to delete it, and maybe they did, or maybe they deleted the one copy but not the cache version, or maybe just didn’t and lied about it. I’ve actually accidentally found stuff I thought was long lost when I decided to just mess around with some data recovery tools and pulled a bunch of pictures back from a drive I didn’t remember them ever being on.
One of my kids I saw take a picture of a snapchat with another phone. Asked what they where doing and it was explained that if you do a regular screenshot it notified the other person, so this was how they kept a copy secretly. So with that in mind, you never know who has copies of what that was posted.


Oh fuck off on both sides of that headline. Sure, we’ll let you create more monopolistic ISP lock in, just so long as you’re not making any effort at not being a biggot while you do it.
Shocking, just incredible, unbelievable even…