• 0 Posts
  • 35 Comments
Joined 11 months ago
cake
Cake day: August 8th, 2023

help-circle
  • From a theory perspective alone, ignorant of Lemmy specifics: a database query can be made to list all cached images including a unique identifier for each image. Use this list to find each cached image.

    Look at your cached image list and decide how you want to prune it. The most likely pattern for this system is FIFO, so prune the oldest cached data until you drop below the target disk usage.

    In practice, you’ll likely use somebody else’s solution. Be sure to read the contents of their solution carefully to ensure it doesn’t move sensitive data to an externally accessible location or exfiltrate data directly.





  • So, you can work around these things but you’re going to run into problems if you do:

    -If you reset the router, you need to restore the original password else they’ll know

    -if they notice you using these devices when you wouldn’t have access, they’ll remove them further from your reach. Possibly permanently.

    -If detected, a larger conflict is likely to be escalated. This includes a loss of the benefit of the doubt in the future.

    I’d suggest that this is not the battle to fight. They’re likely fighting your apparent obsession with tech. Let them have this battle and continue your fun later.

    Try the Stormlight Archive, wheel of time, or mistborn books. Maybe the redwall books if you’re younger. Fun and focus can still be had without a computer!


  • Oooo thank you for the links, that’s the part I had a difficult time with. I don’t think I’m subscribed to enough things, or I don’t check frequently enough, to get the information updates.

    I’ll see what I’m qualified to do. I don’t know Rust in particular so this is likely to turn into a rabbit hole that produces nothing but a greater knowledgebase in my brain for the next time I get fiesty about something.



  • I’ve been spending some time considering the future technology stack of Beehaw. I’d love to work on some kind of moderation tools, especially because I know that they could be inserted alongside the existing codebase - even if in an exceedingly hacky way. Heck, even client side site scraping with content matching is an option if for some horrible reason we had to.

    The fun part is not being able to ask those who run the server about specifics for what’s needed.


  • Computer Science student here.

    Forking Lemmy does fork its bad habits but doing so would at least give us the option of making direct improvements to the mod tools.

    From what I’ve read, causing deleted content to get deleted quickly is a smaller change. Advertising that shortened deletion delay and giving the admins a “these keep our shit, yeet their federation privileges but check again every day and notify me when that changes” script wouldn’t be too hard to create.

    We might even be better off ignoring the Lemmy codebase for mod tools altogether. If we outright ignore cross-platform compatibility, we can make a mod tools API independent of Lemmy-proper that does what’s needed and a JavaScript-controlled interface to sit on top or a separate toolset altogether.

    I’m pretty busy right now but I rely on Beehaw for decent social media. I’d be willing to put a bit of time into it.



  • I don’t think it’s a joke or even paranoid, just a bee noticing the effect of a quirk of human brains.

    Noticing an illogical thing because their brain took a shortcut and dusted the fallout under a rug isn’t an easy experience. The first instinct is not to assume our mind has broken, it’s to try to find the answer to make the event explainable. Often that involves thinking only inside the scope of the event because no other information is immediately apparent.


  • Consider the sheer cost of this. Shipping, especially overnight shipping, is incredibly expensive. Stores get stock on on or two regular days of the week and have a crew dedicated to just unloading that truck and getting everything on shelves, a process that takes days.

    Stores could not profit enough to put items in your path in the hope that you might buy them in this way.


  • Most likely the change here is that you’re now noticing these items where you previously didn’t. This is a documented psychological effect.

    People often look at a car they like and suddenly see that same model of car all over. People didn’t suddenly buy those cars to drive around for you, this isn’t the Truman Show. You’re just noticing them where before you didn’t even register them as anything other than a backdrop, a random blade of grass.






  • The point of a digital signature is to announce that you made this document, as it exists at the time of writing. Once a change is made it should no longer identify as signed.

    Most institutions don’t use this functionality, despite the usefulness of it. At present, I’d recommend using it for publicly distributed files to protect against bad actors publishing a document that pretends to be yours.

    As for legally binding, ask a lawyer. Generally, things are legally binding if they’re signed by all parties. The specifics get funky, but a digital signature is a solid step for announcing that you did this thing at this datetime and a judge should recognize that if it comes down to it. Bonus points if all parties attach their digital signatures.



  • Mods depend a lot of the type of mod.

    Entity model changes are relatively easy, often as simple as replacing texture and model files. This is highly dependent on the tech used to make the game and how it’s packaged.

    Sound files, similarly, are a file replacement job as long as nothing too funky is involved.

    After this, we start to get into larger toolchains. We need tools to decode game data so it can be manipulated, tools to gain access to the game as it starts up or as it runs, and tools to use those tools to create modifications and implement them easily.

    Graphics upgrade mods often use directx overrides, such as in SweetFX and Reshade. Sometimes they replace or override existing game files directly.

    Bug fixes and additional functionality are where things get really interesting. At first, these are done with hacks done in the form of function overrides that can only be created after analyzing the compiled game executable. Later, tools are built that allow easier access and present game functions to other developers for easy modification.

    And sometimes the difficult parts are skipped over entirely when developers include modding APIs or SDKs for public use.