webghost0101

joined 1 year ago
[–] webghost0101@sopuli.xyz 7 points 3 days ago

This guy markets.

[–] webghost0101@sopuli.xyz 1 points 4 days ago

Most people who use anything other then windows for work will still use the best software for the job. Most of the advances made for it may likely also work on other distros.

I imagine this just provides a additional option that can freely be distributed and supported with european standards.

It also has potential to be used in schools moving people away from dependency on Microsoft.

[–] webghost0101@sopuli.xyz 3 points 1 week ago (1 children)

You appear much more knowledged about taxes then i am.

What way can a laymen worker lobby effectively?

[–] webghost0101@sopuli.xyz 10 points 1 week ago* (last edited 1 week ago) (3 children)

I propose that once Kamala officially assumes the position and we can ignore demented Hitler again we do our best to yeet her straight back out the Whitehouse.

We have to start getting actually mad, but in such a way where we keep thinking clearly and do not expose ourselves to emotional manipulation.

[–] webghost0101@sopuli.xyz 25 points 1 week ago* (last edited 1 week ago) (11 children)

If you are an American and not a Harris votes, what do you expect will happen to political power in the next year?

Are peacefully voting against a dictator, general strikes and forcefully guillotining the bourgeoisie all mutually exclusive?

[–] webghost0101@sopuli.xyz 1 points 1 week ago* (last edited 1 week ago)

I recognize this may be a very autistic answer (i am)

The function of a button is to be pressed, to put functionality on the bottom of a stationary device feels incredibly wrong. Thats really all there is to it.

I can forgive a reset button being on the bottom because ideally they aren’t ever pressed and you definitely don't want them accidentally pressed. I recognize that for macos a restart is usually a reset troubleshooting step and i would be probably be fine with it the button was renamed with an explanation on its actual usecase scenario.

In any regards i feel like it makes much more sense on the back where the cables go in.

I have nothing against apple besides the general capitalist/consumerism stuff. I hate google and meta much more.

[–] webghost0101@sopuli.xyz 18 points 1 week ago (6 children)

This is why some things are trade secrets rather then trademarked.

Only very few people in the world know the coca cola recipe. Legally your free to recreate it and sell. Good luck though knowing that the company has an exclusive contract to process cocaïne leaves into flavoring extract. (The narcotic byproduct sold to phrama)

[–] webghost0101@sopuli.xyz 6 points 1 week ago* (last edited 1 week ago) (2 children)

You can accurately preach best usecases all you want it falls flat before peopled experience.

I always shutdown my desktop. So did i with all my previous desktops.

Ive always shut down every windows/linux laptop i ever had.

I shut down my android tablet after use.

I owned and mainly used a MacBook pro for 5 years, i never shut it down, i never shutdown my iPhone. It was also ironically the best windows laptop i had owned at that point (in dual boot) and i always shut down when i worked in Windows, just never in macos

Apple did not tell me to do this, it is not difficult to shutdown a mac, no one told me to change what i am used to. It just somehow made the most sense so thats how i used it. And i reverted naturally when i ent back to non apple desktops. I cant explain it better then that.

This does not excuse having a power button on the bottom, thats just ridiculous. Just a hint that what your saying about downsides is irrelevant to how people realistically use it.

[–] webghost0101@sopuli.xyz 9 points 1 week ago* (last edited 1 week ago)

I thing what Democrats are conserving in simply the status quo of society.

They want politics to be about electing a party with votes, districts

They want banks to organize money.

They want corporations to employ people.

They want schools to be about preparing kids for work and freeing adults to do labor.

They want the global appearance of their finances look good. (GDP)

They want to be against war and violence except if it is in their own benefit.

They want to not care about existential issues like climate change.

I am not saying here that all of the above are overdue change but more and more appears fundamentally broken and there is no ambition for real change.

[–] webghost0101@sopuli.xyz 4 points 1 week ago (1 children)

As a fellow member of the autistic species, i wholeheartedly agree.

[–] webghost0101@sopuli.xyz 2 points 1 week ago

Well thats confusingly transparant.

[–] webghost0101@sopuli.xyz 2 points 1 week ago* (last edited 1 week ago) (1 children)

You do sound like a person knowledge enough to solve their own issues and you have been trying linux so I wouldn't lump you in with the majority of users that believe that all of linux requires terminal knowledge.

I let you in on a secret. I still have my windows drive in dual boot. I was very scared of linux, i just saw a hyprland gif and fell in love. As a windows poweruser i could not fully commit on that whim.

I have not booted into it in months and i use the same drive to install proton games. (So i can theoretically launch them from both sides) but i do plan to keep it there, just in case. At least for as long as i use that machine.

So by all means you are pretty much as much a limux user as i am, the only difference is with what os we dedicate time.

Recently i got into a powershell course from work and i know you can use 7 on unix, but i am actually thinking of spinning up some windows vm. My work is all windows so i do need to keep up. And there are good things i could say about it.

But i have a personal drive to learn linux, rooted in the philosophy of technological freedom, unrestricted by corporate whims. One day i hope to truly leave windows for a foss new world (does not need to be linux) and i hope sincere that on your own time, you will also join me there.

132
submitted 1 month ago* (last edited 1 month ago) by webghost0101@sopuli.xyz to c/photography@lemmy.world
 

Send to me by someone i know. They are not really into photography but they know i am a bit. I have permission to post it. Made using iphone se

44
For the taste sensitive (lemmy.dbzer0.com)
submitted 2 months ago* (last edited 2 months ago) by webghost0101@sopuli.xyz to c/autism@lemmy.world
 

I used to be a picky eater, then as an adult i realized its not the ingredients themselves but a mix of all kinds of sensory input.

There are a lot of tastes that are nice in small amounts but i cant have em full on.

Onions went from hated to favorite after i learned this.

If you have foods you never liked, give em a chance in a completely different format and amount

 

Just had to out this somewhere and this is probably the most safe space for it.

I am an ultra left anarchist so i support any progress shift in us political polls and i do get it.

I dont and wont ask people to stop using effective political memes. But whenever i see a top comment labeled these bad people as weird, i feel like i too would not be accepted, even if i know thats not what its about.

Sorry.

 

Hello Privacy Subscribers of Lemmy, I'm Webhost0101. With the help of ChatGPT, I've been exploring the challenges we face with digital identity, particularly regarding the use of email addresses. I've developed a concept aimed at enhancing privacy and security in our digital interactions.

Identifying the Problem: Our dependence on email addresses as universal identifiers exposes us to various privacy and security risks. The dual nature of emails - serving both as identifiers and gateways to personal communication - presents a significant challenge. The goal is to create a system that can help gradually step away from this bad practice.

The plan

The plan involves converting email addresses into hash codes to serve as digital identifiers, with these codes usable in both digital and physical realms through personalized QR codes. This approach offers a secure and private method for identity verification. While similar systems exist that use QR codes for login purposes, this concept is distinct because it does not store any authentication keys. It only maintains a 'username,' which is the hashed email, and instructions on how to convert an email address into this username. This ensures enhanced security, as the 'Sign' system is designed primarily for identity verification without directly facilitating authentication or access.

The Concept: Creating Your 'Sign'

  1. Initial Step: Visit the 'Sign' website and input your email to start the process.
  2. Email Verification: Receive a unique link via email, confirming your email's validity.
  3. Hash Generation: Use the unique link to select from multiple hashing algorithms or a default option. This generates a hash code, presented as both a string and a QR code, encapsulating the hash and the algorithm/options used.
  4. Optional AI Art Generation: You have the option to generate AI-based art from the QR code, adding a personalized aesthetic touch.
  5. Finalizing the Sign: Enter your 'Sign' into the system, which stores only the sign including the algorithm/options used. No email addresses, names, or URLs are kept.
  6. Receiving Your QR-Art: Obtain a high-quality image of your QR-art for printing on various personal items.

Using 'Sign' for Digital Identification

  • Online Login: On supported platforms, log in with your 'Sign' rather than your email address. The service checks for a corresponding email in their database that produces the same hash with the chosen algorithm/options. Services can eventually replace emails with 'Signs' for regular users.
  • Real-Life Usage: In physical stores, use your QR-art 'Sign' when asked if you have an account/booked at table.

Security and Privacy Considerations

  • Robust Encryption and Data Protection: Implement strong encryption and secure data handling practices.
  • Multifactor Verification: Use the 'Sign' as part of a multifactor identification process, alongside other verification methods.
  • Handling Hash Collisions: Establish protocols to manage the unlikely event of hash collisions, ensuring system integrity.

Advantages and Use Cases

  • Enhanced Privacy: Limits the need to share email addresses, reducing spam and data breach risks.
  • Versatility: Applicable both online and offline, enhancing convenience.
  • Personalization: The AI-generated art offers a unique, personal touch to each 'Sign'.

Conclusion: The 'Sign' system proposes a novel approach to digital identity, focusing on privacy, security, and user convenience. It represents a potential step forward in how we handle and protect our digital identifiers across various settings.

view more: next ›