I have lots of java and a smidgen of kotlin experience so I’ll probably just regular code it if I have to. I would still prefer if something already exists.
- 32 Posts
- 424 Comments
HumanPerson@sh.itjust.worksto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•How do I torrent safely in the US if I can't afford a VPN?English
1·8 days agoLike what is available to download.
HumanPerson@sh.itjust.worksto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•How do I torrent safely in the US if I can't afford a VPN?English
15·9 days agoI2p is slow and lacks selection but could work.
HumanPerson@sh.itjust.worksto
Ask Lemmy@lemmy.world•People who prepared costumes for Halloween: how much money/effort did you put in it?English
9·14 days agoDid a blues brothers costume with a friend. Just a black suit that most people will probably have + sunglasses and a hat.
Um ackshually Hannah Montana Linux is obviously superior in every way. /s
HumanPerson@sh.itjust.worksto
LocalLLaMA@sh.itjust.works•How often does your LLM lie to you?English
1·2 months agoI wouldn’t stop using ai completely over that. I generally don’t trust it with anything that important anyway.
HumanPerson@sh.itjust.worksto
LocalLLaMA@sh.itjust.works•How often does your LLM lie to you?English
4·2 months agoAlways. That is a known issue with ai that has to do with explainability. Basically, if you’re familiar with the general idea of neural networks, we don’t really understand the hidden layers so we can’t know if they “know” something so we can’t train them to give different answers based on if they do or don’t. They are still statistical models that are functionally always guessing.
Could you post the link to the sleeper agent thing?
HumanPerson@sh.itjust.worksto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Average 1337x userEnglish
3·2 months agoValid, although I prefer the 24/7 seed to infinity method.
HumanPerson@sh.itjust.worksto
Linux@lemmy.ml•I switched from macos to Linux because it can't stop babying users and being unnecessarily restrictiveEnglish
2·7 months agoIt’s obfuscated but not officially blocked. Their site is asahilinux.org. It’s not worth getting a macbook for yet imo , but it’s still super impressive, especially the graphics drivers. There are issues with Mac’s built in security stuff but that just means the fingerprint reader and probably some other stuff doesn’t work.
An interesting way that I don’t know of being implemented is a donation system where you donate to a feature request / issue and whoever implements / patches it gets it, and a “tax” so that some percentage of every donation can go to maintenance, server costs, etc.
HumanPerson@sh.itjust.worksto
Linux@lemmy.ml•How to use Java in Flatpak VSCodium [TUTORIAL]English
2·7 months agoI’m saving this post. I’ve managed it in the past but even then I never knew how.
HumanPerson@sh.itjust.worksto
Privacy@lemmy.ml•We want privacy but not that muchEnglish
27·7 months agoLet’s talk about privacy, just not any private operating systems because there’s a sub for that, or laws that threaten privacy because there’s a sub for that, or any corporations that try to take away people’s privacy because there’s a sub for that, or our opinions on the concept of privacy because there’s a sub for that so… privacy is, uh, not having people see what you’re doing kinda.
HumanPerson@sh.itjust.worksto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Torrenting is not allowed on WindscribeEnglish
22·7 months agoI use airvpn with an always on server setup, port forwarding, and constant seeding. If you’re okay with manually using a wireguard or openvpn client instead of an airvpn specific client it works great.
Eh, I sometimes spin up a temporary docker container for some nonsense on a separate computer. I usually just go for it after checking no one is on and backing up necessary data.
HumanPerson@sh.itjust.worksto
Privacy@lemmy.ml•How would you write a journal/diary with the adversaries being both the people you live with AND your government?English
4·7 months agoIf you’re just worried about people you live with and passive scan type stuff I’d do a LUKS flash drive and a txt file. If you are worried about more active stuff from 3 letters then I still think digital is going to be the best bet, but you’d better use qubes or even dedicate an airgapped computer with an encrypted drive but even that is iffy for a serious anti gov threat model.
HumanPerson@sh.itjust.worksto
Privacy@lemmy.ml•T-Mobile Shows Users the Names, Pictures, and Exact Locations of Random ChildrenEnglish
3·8 months agoFmdlocator. It can auto reply a text with location to whitelisted contacts.







That looks like a call center type thing. I’m more looking for “hey google” without (most of) the spyware.
Edit: re-reading my post, I see how it looks like that’s what I meant.