jeffhykin

joined 1 year ago
[–] [email protected] 16 points 1 week ago

What's the big deal? Just solve for ...

... = (π^2 / 6) - (1 + 1/4 + 1/9)

Ez

/s

[–] [email protected] 7 points 1 month ago

OP can you add "unmedicated ADHD" to the title to be a bit more (but still not totally) accurate

[–] [email protected] 1 points 1 month ago

Kinda surprised nobody has said this: start your own instance. Seriously, thats the power of the fediverse.

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago)

Cool, this is exactly what I was hoping to learn but couldn't find. It sounds like its still a pretty manual process, but thats okay. If thats how it is righ now, then thats exactly what I want to know.

I'm considering making tools (GUI local app, but also website AUTH frontend/backend tooling) to try and make systems like this more commonplace and standardized. I didn't know about revocation keys, so I'm glad I heard about that before trying to build my own.

[–] [email protected] 1 points 2 months ago
[–] [email protected] 2 points 2 months ago (1 children)

Yeah, sorry I incrementally edited the title before posting and accidentally made it make no sense. I meant publicly announce that a private key was compromised

5
submitted 2 months ago* (last edited 2 months ago) by [email protected] to c/[email protected]
 

I'm asking for existing tools/systems that let me programmatically say: "here is my public key, BUT if each of these 5 other public keys all send a signed message saying that my public key has been compromised, then you should mark my public key as compromised, and use the new one they provide". (This is not for a particular task, I'm just curious if any existing auth systems are capable of this)

I call the idea "guardian keys" because it could be friends' public keys or or just more-securely-stored less-frequently-used keys that you control.

NOTE: I know this would not work for data encryption. Encrypted data is simply gone if a key is lost. But, for proving an identity, like a login, there could be a system like this but I don't know of any

[–] [email protected] 57 points 2 months ago* (last edited 2 months ago) (5 children)

This could actually be a pretty big deal

  1. The Eclipse foundation has been making alternatives to VS Code's "killer apps" (Docker, Python, Go, C++, SSH, Live share, etc). AKA the closed source ones exclusive to VS Code offical that make all forks of VS Code a huge downgrade. The Eclipse foundation is also running the extension store that powers VS Codium.
  2. "why not just use VS Codium?" (With the killer extensions made by Eclipse)
    • VS Codium is great, but because of manpower limits, they always have to be "downstream" of VS Code. They can't rewrite any of the core systems.
    • As someone who contributes to VS Code, and loves VS Codium, many issues I have with VS Code have been open on github for +7 years, with hundreds of comments and thumbs-ups. We can't even sort the file explorer view by last-edited and folders-first (but we can do folders-first alphabetical). Thats been open since 2017.
    • Theia looks like it could finally be the hard fork I've been waiting for. A hackable editor, trying to be open source, where all my extensions work, and the community can actually make a PR, get it merged, and extensions are not excessively sandboxed.
    • Will it be that? Only time will tell, but the Eclipse foundation has a pretty good record. They're definitely prepared for long term support.
[–] [email protected] -1 points 4 months ago* (last edited 4 months ago) (1 children)

Finally :D thank you so much!

So basically VOIP is "cheating" because its not actually handled by the network directly, the phone company pays for always-online servers, and phone(s) reach out to those server every time they change networks, in order for servers to be able to route calls to them.

Which also means! it is possible to do the same thing for computers, but it requires having

  1. A static IP
  2. An always online server
  3. The device needs a daemon that tries to connect to an always online server, and authenticates itself
  4. That server needs to manually reroute traffic (through a VPN or some other means) from the static IP address to the device, wherever it might be

Which also explains why general network providers wouldn't want to create the infrastructure. Even if universal addresses were given to each device, which simplifies DHCP and address-leasing, and shortens time it takes to handshake with the network, all of that is less of a cost than the infrastructure needed track of devices as they change networks. (And that's on top of ISP's being slow to change from the legacy approach of local networks and desktops).

^ which is more the conversation I wanted to have but didnt really get with this post.

Thats a sizable edit!

Yeah 😅 I didnt want it to be this complicated of a question, but I didnt see how else to explain that current addressing systems don't meet the same need as a phone number.

[–] [email protected] 0 points 4 months ago (3 children)

I can get VOIP calls behind a NAT without cell service. I'm asking how is that possible. Is the router somehow part of the same AP as cell service?

[–] [email protected] 0 points 4 months ago* (last edited 4 months ago) (5 children)

Cell phones don't get a new phone number every time they switch cell towers, so why do laptops.

Its not like I can write down the IP address of my friends laptop so I can send it a message once he gets to a new city. Right?

 

Why doesn't every computer have 256 char domain name, along with a private key to prove it is the sole owner of the address?

Edits: For those technically inclined: Stuff like DHCP seems unnecessary if every device has a serial number based address that's known not to collide. It seems way more simple and faster than leasing dynamic addresses. On top of that with VOIP I can get phone calls even without cell service, even behind a NAT. Why is the network designed in such a way where that is possible, but I can't buy a static address that will persist across networks endpoint changes (e.g. laptop connecting to a new unconfigured wifi connection) such that I can initiate a connection to my laptop while it is behind a NAT.

  • Yes, it would be a privacy nightmare, I want to know why it didnt turn out that way
  • When I say phone number, I mean including area/country code
  • AFAIK IP addresses (even static public ones) are not equivlent to phone numbers. I don't get a new phone number every time I connect to a new cell tower. Even if a static IP is assigned to a device, my understanding is that connecting the device to a new uncontrolled WiFi, especially a router with a NAT, will make it so that people who try to connect to the static IP will simply fail.
  • No, MAC addresses are not equivalent phone numbers. 1. Phone numbers have one unique owner, MAC addresses can have many owners because they can be changed at any time to any thing on most laptops. 2. A message can't be sent directly to a MAC address in the same way as a phone number
  • Yes, IMEI is unique, but my laptop doesn't have one and even if it did its not the same as an eSim or sim card. We can send a message to an activated Sim, we can't send a message to an IMEI or serial number
 
  • I make websites
  • If someone is banned twice (two accounts) I want it to take them more than 5min and a VPN to make a 3rd account
  • I'm okay with extreme solutions, like requiring everyone to have a Yubikey-or-similar physical key
  • I really hate the trend of relying on a phone number or Google capcha as a not-a-bot detection. Both have tons of problems
  • but spam (automated account creation) is a real problem

What kind of auth should I use for my websites?

[–] [email protected] 10 points 5 months ago* (last edited 5 months ago) (1 children)

You should watch the rest, especially the ending, there are some great quotes in there. "There's so much freedom in [suburb]. There's no shops, cafes, theaters, places to eat, schools, or even people. But uhh, that's all part of the freedom; you have the freedom to go somewhere better! like [15min city name]"

[–] [email protected] 3 points 5 months ago

This is pretty cool. I've got a couple repos that Microsoft uses for VS Code. I switched one of them to GPLv3, but maybe I'll switch the other to this license.

31
submitted 7 months ago* (last edited 7 months ago) by [email protected] to c/[email protected]
 

My friends and I did this a while ago and it was quite fun.

43
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/[email protected]
 

This might be a limitation of Lemmy or voyager, but is there some option for me to "watch" or "subscribe" to a post and be notified of new comments?

Especially relevant to asklemmy since occasionally I see a post before there's any answers.

10
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/[email protected]
 

I'd like a small group with strict/well-defined meeting times that has a coach/conversation-conductor to keep topics on track. I feel like it would work really well if advice was given/received by others with ADHD, while having a leader do stuff like

  • make sure 1 person doesn't dominate the conversation
  • keep meeting notes
  • call/text people who miss a meeting
  • follow up with people who said they were going to do something

But I've never really heard of such a system.

I've found at least two online services, but I don't really know if they're worth trying. I'm curious on your opinion and/or if any of you have tried something similar.

There's "Study Hall" which I'm not sure is what I'm really looking for https://adult-study-hall-by-adhd-rewired.mn.co/sign_up?plan_id=230880

Then this site seems to have good coaching https://news.ycombinator.com/item?id=37252231

25
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/[email protected]
 

If a human posted every 5 min, got 0 upvotes for 20 posts straight, we would ban them for spam. If bots would limit themselves to posting once a day, or once a week, and only post the top-voted non-duplicate post of that timeframe, it would be a dramatic improvement. For once, we might actually see real-lemmy posts along side bot posts, instead of the community being exclusively bots (or 99% bot posts) or exclusively Lemmy users.

I would tell the bot creators myself, except I don't know how to get in contact with them. Is there a consistent way to contact a bot creator?

view more: next ›