jeffhykin

joined 1 year ago
[–] jeffhykin@lemm.ee 3 points 7 hours ago* (last edited 7 hours ago)

Its worth mentioning: workers would also be liable for company failure; but that actually might be one of the best parts of this idea.

See, right now you can get hired to run a company, drive it straight into the ground with stupid decisions, get paid the whole time, and then leave the now-bankrupted company with no downside for yourself. That would no longer be allowed if you were held responsible for the company at a personal level.

[–] jeffhykin@lemm.ee 2 points 17 hours ago

Wow, I really wasn't expecting a positive response to my comment. You just made my day :D, thanks!

[–] jeffhykin@lemm.ee 11 points 17 hours ago* (last edited 17 hours ago) (1 children)

TLDR: When you commit a crime for an employer, you and the employer are responsible and must both receive the consequences. Even if you signed a contract saying you're not liable -- doesn't matter; you can't choose to be "not liable".

However, when you commit a not-a-crime for an employer, only the employer gets the consequences (aka gets 100% payment/income from that work). They're treated as if they're the only one responsible/liable for that action. Somehow, this time, you can separate yourself from liability with a contract.

The argument is: Either liability is totally inseparable from a person or it is totally separable. We can't have "its inseparable but only if the person is committing a crime".

[–] jeffhykin@lemm.ee 6 points 18 hours ago* (last edited 17 hours ago) (2 children)

I'm usually the one person in the Solarpunk lemmy who debates "capitalism==bad" titles. This was a solid video; I don't think I have any critiques of the arguments. It gives me a lot to think about. The speaker does a good job at not being polarizing or sensationaliazing the topic; he simply presents the information without getting emotionally charged.

That's in contrast to the Lemmy title, which I think is senasionalized/polarizing and a bit of an insult to the listener; telling them the conclusion they should have instead of assuming they're smart enough to understand the consequences themselves. "Why workplace democracy is an inalienable right, and its incompatibility with capitalism" would be more appropriate title IMO.

Either way I'm glad this was posted.

[–] jeffhykin@lemm.ee 3 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

I think it could be a great solution. I've never considered it before. That said there's one sticking point for me:

Apportion payment to developers based on software use by paid users and the size of their contribution to that software.

That^ . That needs a lot more detail. If they provide solid details -- details that most can agree on -- then I will actually be on board with the solution.

[–] jeffhykin@lemm.ee 9 points 2 weeks ago* (last edited 2 weeks ago) (7 children)

Yeah I wish there was a way to contribute to the hosting with torrent-like seeding. My phone can seed a torrent, but its not going to host an instance.

1 like = seed for 1 month seems like an interesting model

[–] jeffhykin@lemm.ee 3 points 1 month ago

Why not both?

[–] jeffhykin@lemm.ee 32 points 1 month ago* (last edited 1 month ago)

Its a tough problem. You have to find something that you want to exist; like an app or a website or a game. For example, try making a GUI for managing SSH keys. You know, like the ones github makes you create in order to clone and push to a repo. Make a visual representation of those keys (stored in the .ssh folder), and tools to add/delete them.

Along the way you'll find tons of missing things, tools that should exist but don't. Those are the "real" projects that will really expand your capabilities as a developer.

For example, I was coding in python and wanted to make a function that caches the output because the code was inherently slow.

  • but to cache an output we need to know the inputs are the same
  • hashes are good for this but lists can't be hashed with the built-in python hash function
  • we can make our own hash, but hashing a list that contains itself is hard
  • there is a solution for lists, but then hashing a set that contains itself is a serious problem (MUCH harder than hashing a list)
  • turns out hashing a set is the same problem as the graph-coloring problem (graph isomorphism)
  • suddenly I have a really deep understanding of recursive data structures all because I wanted to a function that caches its output.
[–] jeffhykin@lemm.ee 15 points 1 month ago* (last edited 1 month ago) (1 children)

Labeling datasets is costly process. When you dont opt out, you're letting them build a labelled dataset on you-specifically for free.

[–] jeffhykin@lemm.ee 42 points 1 month ago* (last edited 1 month ago) (3 children)

Same for me: just say no, and they say OK. Effortless but the option is totally invisible.

The irony is, I've seen the staff stop using the face scanner for everyone halfway through the line to speed things up. So its not saving time, just costing money to increase surveillance.

 

Fingerprinting isn't always possible to defeat, and its not always possible to avoid making accounts (work and school accounts)

However, it should be possible to fill up tracked data with meaningless garbage and reduce the signal-to-noise ratio. Ex: a bot that browses random products on amazon to reduce profiling accuracy.

Do you guys know of any tools that do this? Anything from browser extensions to command line scripts, to anonymous group-accounts.

25
submitted 3 months ago* (last edited 3 months ago) by jeffhykin@lemm.ee to c/privacy@lemmy.ml
 

I'm asking for existing tools/systems that let me programmatically say: "here is my public key, BUT if each of these 5 other public keys all send a signed message saying that my public key has been compromised, then you should mark my public key as compromised, and use the new one they provide". (This is not for a particular task, I'm just curious if any existing auth systems are capable of this)

I call the idea "guardian keys" because it could be friends' public keys or or just more-securely-stored less-frequently-used keys that you control.

NOTE: I know this would not work for data encryption. Encrypted data is simply gone if a key is lost. But, for proving an identity, like a login, there could be a system like this but I don't know of any

 

I don't think I've seen any solarpunk art (much less real world construction) with transparent wood, so I wanted to share

Not only is transparent wood real but apparently it has been around in labs for a bit. Take a look! (And let me know if this is old news for you)

Article: https://arstechnica.com/science/2023/12/why-scientists-are-making-transparent-wood/

Wikipedia with video: https://en.m.wikipedia.org/wiki/Transparent_wood_composite

Original paper publication: https://45-79-48-20.ip.linodeusercontent.com/s/trDsHKKWwsHsQZ5

 

Why doesn't every computer have 256 char domain name, along with a private key to prove it is the sole owner of the address?

Edits: For those technically inclined: Stuff like DHCP seems unnecessary if every device has a serial number based address that's known not to collide. It seems way more simple and faster than leasing dynamic addresses. On top of that with VOIP I can get phone calls even without cell service, even behind a NAT. Why is the network designed in such a way where that is possible, but I can't buy a static address that will persist across networks endpoint changes (e.g. laptop connecting to a new unconfigured wifi connection) such that I can initiate a connection to my laptop while it is behind a NAT.

  • Yes, it would be a privacy nightmare, I want to know why it didnt turn out that way
  • When I say phone number, I mean including area/country code
  • AFAIK IP addresses (even static public ones) are not equivlent to phone numbers. I don't get a new phone number every time I connect to a new cell tower. Even if a static IP is assigned to a device, my understanding is that connecting the device to a new uncontrolled WiFi, especially a router with a NAT, will make it so that people who try to connect to the static IP will simply fail.
  • No, MAC addresses are not equivalent phone numbers. 1. Phone numbers have one unique owner, MAC addresses can have many owners because they can be changed at any time to any thing on most laptops. 2. A message can't be sent directly to a MAC address in the same way as a phone number
  • Yes, IMEI is unique, but my laptop doesn't have one and even if it did its not the same as an eSim or sim card. We can send a message to an activated Sim, we can't send a message to an IMEI or serial number
 
  • I make websites
  • If someone is banned twice (two accounts) I want it to take them more than 5min and a VPN to make a 3rd account
  • I'm okay with extreme solutions, like requiring everyone to have a Yubikey-or-similar physical key
  • I really hate the trend of relying on a phone number or Google capcha as a not-a-bot detection. Both have tons of problems
  • but spam (automated account creation) is a real problem

What kind of auth should I use for my websites?

 

Often we dig our own grave making people "defend" their opinion. Instead of winning them over, we push them to become more and more entrenched in their opinion as they build larger mental defenses against the challenges we present. So I want to hear from you:

How do you avoid putting people on the defensive? (Even though those people had a strong alternative opinion)

What was a time where the opposite happened; all the facts were there, but absolutely no one was convinced by the talk?

I feel like solarpunk has a lot of obvious-once-seen ideas and powerful "ahh-ha" moments. But if we can't convince others to take a glimpse from our perspective, not much benefit will come from it.

31
submitted 9 months ago* (last edited 9 months ago) by jeffhykin@lemm.ee to c/programming@programming.dev
 

My friends and I did this a while ago and it was quite fun.

 

JSON and YAML work great for passing data between languages.

However, sometimes, I have a pure function like y = mx + b, that I would like to pass between languages (for making plots).

What operators should be available? I think jsonnet's standard library(skip to the math operators) is the perfect example of a useful set of operations that could be shared across basically all programming languages. The operations would take/return json values rather than working with language-specific data types.

My question is does such a language exist already?

Close candidates:

  • Dhall and jsonnet are pure languages that generate json. But AFAIK they can't actually serialize pure functions. They can only use pure functions as a shorthand for generating json. I want to actually save/send functions over the wire.
43
submitted 11 months ago* (last edited 11 months ago) by jeffhykin@lemm.ee to c/asklemmy@lemmy.world
 

This might be a limitation of Lemmy or voyager, but is there some option for me to "watch" or "subscribe" to a post and be notified of new comments?

Especially relevant to asklemmy since occasionally I see a post before there's any answers.

10
submitted 11 months ago* (last edited 11 months ago) by jeffhykin@lemm.ee to c/adhd@lemmy.world
 

I'd like a small group with strict/well-defined meeting times that has a coach/conversation-conductor to keep topics on track. I feel like it would work really well if advice was given/received by others with ADHD, while having a leader do stuff like

  • make sure 1 person doesn't dominate the conversation
  • keep meeting notes
  • call/text people who miss a meeting
  • follow up with people who said they were going to do something

But I've never really heard of such a system.

I've found at least two online services, but I don't really know if they're worth trying. I'm curious on your opinion and/or if any of you have tried something similar.

There's "Study Hall" which I'm not sure is what I'm really looking for https://adult-study-hall-by-adhd-rewired.mn.co/sign_up?plan_id=230880

Then this site seems to have good coaching https://news.ycombinator.com/item?id=37252231

25
submitted 11 months ago* (last edited 11 months ago) by jeffhykin@lemm.ee to c/fediverse@lemmy.world
 

If a human posted every 5 min, got 0 upvotes for 20 posts straight, we would ban them for spam. If bots would limit themselves to posting once a day, or once a week, and only post the top-voted non-duplicate post of that timeframe, it would be a dramatic improvement. For once, we might actually see real-lemmy posts along side bot posts, instead of the community being exclusively bots (or 99% bot posts) or exclusively Lemmy users.

I would tell the bot creators myself, except I don't know how to get in contact with them. Is there a consistent way to contact a bot creator?

22
submitted 11 months ago* (last edited 11 months ago) by jeffhykin@lemm.ee to c/solarpunk@slrpnk.net
 

I plan to speak to my city council about creating a tool library, where citizens use their existing library card to checkout tools. To make the idea a bit more robust, I'm also planning to require citizens deposit something as collateral when checking out a tool.

However.

I live in Texas (I love Texas). Thankfully my city council is receptive, but I know they're going to need compelling evidence before approving something like this.

So, if you guys have any advice, or examples, particularly of this kind of system working in the US, I would love to hear about it!

view more: next ›