Difficult_Bit_1339

joined 1 year ago
[โ€“] [email protected] 1 points 1 year ago (1 children)

Iโ€™ve had old oximeters get readings without even being on a patient before.

It was just picking up the environment's oxygen concentration! ๐Ÿค“

[โ€“] [email protected] 1 points 1 year ago

Don't you see how that would make e-mail worse for everyone that uses e-mail?

Imagine having an e-mail address but you couldn't send an e-mail to your friend because for whatever reason your e-mail server decided to not block Gmail. That makes e-mail worse for everyone.

It's the same here, we're trying to get away from social media silos and move towards a protocol that lets everyone participate. The kneejerk reaction here is to just create a new silo that has different owners instead of just being part of a network that shares a protocol.

[โ€“] [email protected] 0 points 1 year ago (2 children)

If we could ensure 100% compliance with a meta-blockade then I'd be for it.

However, that isn't going to happen and any instances that do federate with Meta will be the part of the Fediverse that exists to billions of people. Those instances will become the dominate instances on the Fediverse for people who want to get away from Meta but still access the Fediverse services. Lemmy, as it stands now, is only a few million people at most. We simply do not have the weight to throw around on this issue.

It is inevitable that commercial interests join the Fediverse and the conversation should be around how we deal with that inevitability rather than attempting to use de-federation as a tool to 'fix' every issue.

[โ€“] [email protected] 0 points 1 year ago (1 children)

It seems inevitable that some kind of ID system will be needed online. Maybe not a real ID linked to your person but some sort of hard to obtain credential. That way getting it banned is inconvenient and posts without an ID signature can be filtered easily.

It used to be that spam was fairly easy to detect for a human, it may have been hard to automate the detection of but a person could generally tell what was a bot and what wasn't. Large Language Models (like GPT4) can make spam users appear to produce real conversations just like a person.

The large scale use of such systems provide the ability to influence people on a mass scale. How do you know you're talking to people and not GPT4 instances that are arguing for a specific interest? The only real way to solve this is to create some sort of system where posting has a cost associated with it, similar to how cryptocurrencies use a proof of work system to ensure that the transactional network isn't spammed.

Having to perform computationally heavy cryptography using a key that is registered to your account prior to posting would massively increase the cost of such spamming operations. Imagine if your PC had to solve a problem that took 5+ seconds prior to your post being posted. It wouldn't be terribly inconvenient to you but for a person trying to post on 1000 different accounts it would be a crippling limitation that would be expensive to overcome.

That would fight spam effectively, it wouldn't do much to filter content.

1
Easy Karma (sh.itjust.works)
 
[โ€“] [email protected] 3 points 1 year ago

yt-dlp

It supports YouTube playlists also, so you can just give it a massive playlist and let it go

[โ€“] [email protected] 1 points 1 year ago

Using ! then the community name creates a proper universal link, but the script is broken and you have to manually edit it: https://lemmy.sdf.org/post/36299

Ideally the instance software should allow a user to set a 'automatically resolve community egress links locally' option. Until then it'll annoy regular users who're not going to bother with greasemonkey userscripts.

Oh, the exciting world of being an early adopter!

[โ€“] [email protected] 1 points 1 year ago

It's been ages since I did IT. If I had a user who wanted to run Linux then I knew that, on average, they were going to cause me a lot less headaches with random user issues so I wouldn't mind being flexible. Endpoint security will be different, but a lot of network security is handled through network devices that don't care what the client is.

[โ€“] [email protected] 1 points 1 year ago

Noticing a lot of suspicious activity coming from there...