• 0 Posts
  • 70 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle
  • The core focus of early crypto was decentralization, not anonymity. Bitcoin is totally decentralized, but the entire premise is the blockchain contains a permanent irrefutable ledger of transactions. Basically everyone knows if Wallet A paid Wallet B. If you refill your wallet with anything remotely traceable, that means everyone knows YOU paid Wallet B, and similarly if wallet B has any ties to the real world, the lines are easy to connect.

    That’s not to say you can’t use it anonymously, but that was not the intent and thus it does anonymity poorly.



  • RvTV95XBeo@sh.itjust.workstoScience Memes@mander.xyzHoney
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    26 days ago

    The harm side comes in multiple forms:

    Harm to the animals; by removing their nutrient dense food source, and feeding them sugar water in its place, impacting colony health

    Harm to the ecosystem; by mass producing honey bees we are choking out other pollinators, and the selective breeding for honey bees prioritizes output and makes colonies more susceptible to disease and collapse.

    Even if you feel like the bees we’re farming lead a good life, that life comes at a cost of other species - we are choosing a winner in the food web in a way that could be done less harmful for similar end result (i.e., plant sugars / syrups). Much of veganism is about harm reduction.

    Knowing the importance of pollinators to our food supply, as a vegan I would probably not have much of an issue with pollinator farming if there goal was maintaining biodiversity, instead of min-maxing profit.


  • It’s a poor analogy, but imagine a public IP like a hotel, there can be lots of guests (clients) at this hotel. Hotel policy is they won’t let any outsiders in unless you know the room number (port) of the person you’re trying to reach.

    Imagine you and a friend are staying in separate hotels and want to give each other copies of your favorite Linux .ISOs, but neither of you knows the other’s room number - you show up at the hotel and the front desk tells you to pound sand because you don’t have their room number.

    As long as one of you knows the other’s room number though, you can meet.

    Torrenting without port forwarding means you can only trade your favorite .ISOs with people who have port forwarding enabled (sharing their room number to the tracker), which makes you less effective of a seeder. Enabling port forwarding allows you to share with anyone (sharing your room number with the tracker).











  • Saw this question posted elsewhere, so I’m paraphrasing somebody else, but the privacy benefits of Graphene OS are ESPECIALLY impactful if you’re using invasive apps. The whole point of setting up all of the extra sandboxing, storage limits, network restrictions, yadda yadda yadda, is specifically for people who might need or want to still leverage some apps from bigger, less trusted providers.

    I’ll flip the question, if you’re only using trusted, vetted, open source applications, do you even need GrapheneOS? Why not LineageOS, which also comes free of gapps?

    And this also fully neglects the inherent distinction between privacy and security. Maybe you trust google knowing you called your mom last night, but you don’t want your oppressive conservative government accessing your phone to view your Signal messages to your Grinder date. There’s more to privacy than just the number of times your phone pings Google Telemetry servers.



  • Honestly I don’t know, but it seems to me like extracting every single frame of a video as a lossless PNG is only really something that’s necessary if you’re trying to archive something or do frame by frame restoration. Either way, it is something that you hopefully aren’t doing every day, so why not just let it run overnight & move on?

    Otherwise ask yourself if you can settle with just extracting a single clip/section, or what’s actually wrong with lossy jpeg with a low -qscale:v (high quality) - start around 5 and work down until you visually can’t see any difference




  • Worst thing? Someone with access to your password can now break into the associated account, and use that access to snoop or potentially permanently lock you out. E2EE data could be lost forever if they change the password and 2FA.

    More likely? Unless you reuse passwords, or the associated site has been recently compromised, pretty low odds of compromise. If you suspect your 2FA has leaked, just get a new secret, easy peasy. Most reputable sites should alert you to a login on a new device, potentially giving you time to react or alerting you of snooping.

    If your secret leaks without context on what site it’s associated with, then unless your name is Taylor Swift, odds of someone associating it to a site, let alone the matching password, are astronomical.