• 0 Posts
  • 6 Comments
Joined 1 year ago
cake
Cake day: July 9th, 2023

help-circle
  • Just to reinforce your point, the difference between a cheap running shoe and an expensive running shoe is incredible. When I first started running a few years ago, I was using a very old pair of running shoes I’ve had for a long time. I’ve since been sticking with the New Balance Fresh Foam X 880s (because I have very wide feet and NB seems like the only brand that actually makes their best running shoes in 4E) and it’s like running on a cloud.

    And then there’s also the Garmin watch that cost $300 (that I’m now stupidly considering upgrading to the new $600 Forerunner 965), the $120 HRM Pro chest strap, the $3000 Nordic Track x22i for indoor runs I got lightly used on Craigslist for a steal at $900, etc.

    And then there’s the races where you’re spending $40, $50, $100+ depending on whether it’s a 5K or 10K or half-marathon. And good running clothes are pricey too.


  • That’s not really a solid argument. Blocking is likely implemented as a very tiny piece of what is already very likely a massive table join operation. Computationally, it’s likely to have as much an impact on their compute costs as the floor mats in your car have on fuel efficiency.

    Everyone already sees different content. It’s an inherent part of Twitter. It’s not a static site where everyone sees the same thing. You see the tweets of who you’re following, and don’t see tweets of those you’ve muted. All that filtering is happening at the server level. Any new tweets or edited tweets or deleted tweets change that content too, which is happening potentially hundreds of times a second for some users.

    Anyway, caching would be implemented after a query for what tweets the user sees is performed to reduce network traffic between a browser and the Twitter servers. There’s some memoization that can be done at the server level, but the blocking feature is likely to have almost no impact on that given the fundamental functionality of Twitter.


  • I had the Samsung Note 2 back in the day. I installed a custom bootloader and OS that worked fantastically. I had GPS issues, and all the guides I read said I have to reinstall Samsung’s OS, get a GPS fix, then reinstall my custom OS.

    I made the mistake of installing a newer version of the Samsung OS which installed Knox and locked down my bootloader. I was now locked into an old, insecure Android version with no possibility of ever upgrading because Samsung abandoned it.

    From that day on, I vowed never to buy another Samsung product again. Screw them and their anti-choice bullshit.


  • I spent 15 minutes looking at all the links and clicking on a few.

    North Korea is apparently a functioning democracy that gives its civilians everything they need. They’re all extraordinary happy and love their fairly elected leader. The ones who defect only do it because they’re filthy, selfish capitalists.

    Tiananmen Square was apparently not a massacre of thousands of unarmed civilian student protestors, but the site of a skirmish between capitalist pig armed provocateurs who assaulted and killed soldiers in cold blood and acted surprised when the soldiers (with extraordinary restraint) defended themselves against their attacks, leading to just 200 deaths (including those poor innocent soldiers).

    The Uighurs are apparently all happy. The Chinese government forcibly took thousands, no, hundreds of thousands of people from their homes and placed them in camps, all out of a selfless desire to help those poor, misguided souls. There’s definitely no cultural oppression, no forced labor, and no human rights abuses. They’re just all-inclusive resorts with free “cultural lessons” to help them understand both Uighur and Chinese culture. The CCP loves their Muslim citizens and definitely doesn’t consider them terrorists in need of forced reeducation. All the horror stories we’ve heard from people whose family members were captured, or about forced organ harvesting, or rape and torture, they’re all just unproven lies. The Chinese government even offers tours of their Uighur “resorts” to prove to the world that it’s a diligent effort to support their Uighur brothers!


  • If you use encryption (I always change the settings from “prefer” to “require” encryption on every install), the ISPs literally can’t identify what you’re downloading.

    So the IP enforcement companies send the ISP a letter saying “this IP was illegally downloading our stuff. We don’t actually have proof, but trust us and punish them.”

    Big surprise, a ton of ISPs just ignore them.

    Edit: to be clear, I’m only saying encryption prevents your ISP from seeing what you’re downloading. IP (intellectual property) enforcers who participate in the torrent are the ones who inform your ISP, but their letters to the ISPs have no teeth. Some ISPs care, but a lot just ignore the letters. You still definitely want to use a VPN for all public trackers.


  • During computer learning in a computer lab 15 years ago, I figured out that the student passwords were sequential, so I could easily guess other students’ passwords. If I logged in to their account while they were logged in, they would get booted and I’d hear the inevitable “Mrs Teacher! It says my session expired!”

    I did that 2 or 3 times over the course of a few minutes before I got caught. The vice principal rambled on and on about how I was “disrupting learning” and how I “should be suspended for this” before finally telling me, “my mentor taught me a really important lesson. If your students don’t hate you, you aren’t doing your job.”

    What a horrible piece of shit.