Thread 7823 in /tech/

P7823 The Artemis support towers were struck by lightning twice. link reply
The engine bled, they didn't reach the correct temperature, fuel didn't move properly, the weather wasn't right, there were losses of communications with the electronics, and the configurations files were wrong.

What's going on? They had over a thousand different private contractors working on it!

Why doesn't China share their space tech with the USA like the USA shared it with China? I thought the were globalist and everyone was going to share tech with the world just like the USA Federal government and corporations did.

P7824 link reply
https://airandspace.si.edu/stories/editorial/stephanie-wilson-to-the-moon

Surely, naming the missions after the Greek equivalent of Diana should have helped them have a successful mission to the moon.

I guess it's a good thing they did a test before sending their diverse crew into space, and it only cost 93 billion USD since it's so efficient to produce everything using completely reliable private contractors.

Thread 7799 in /tech/

P7799 Conditional expressions link reply
>if condition then result1 else result2 [Algol, ML, Haskell]
This is an okay syntax, although it can cause confusion if allowed to be nested.

>(if condition then result1 else result2) [Ada]
Parentheses mandatory. More readable and solves the nesting problem.

>(if condition result1 result2) [Lisp]
>IIf(condition, result1, result2) [VBA, some SQL implementations]
>if condition { result1 } else { result2 } [Rust]

Also reasonable.

>condition ? result1 : result2 [C, C++, Java, JavaScript, PHP]
Barely readable garbage due to no indication at the beginning that it's a conditional expression.

>result1 if condition else result2 [Python]
Even worse garbage. Why the ***** is the condition in the middle?

>condition and result1 or result2 [Lua]
Jesus Christ, get a real conditional operator instead of recommending broken hacks like this one. Gives incorrect results when condition is true and result1 is false or nil.

Thread 6627 in /tech/

P6627 link reply
I don't get all the hate about Discord. Discord is [bold: BASED].
Seriously if you install the official client which can be downloaded legitimately or use the official website, it's safe. Discord is a trusted company.
Mumble doesn't have E2E either, and self-hosting is hard. Even setting up the client is hard.
IRC is also hard to setup.
Seriously use Discord, or as I've started calling it, Basedcord.
8 replies omitted.
P7481 link reply
>even privacy-respecting ones like Signal and ProtonMail
So only botnet? Gotcha. *****ing idiot. I would kill all discord user if I could.
P7479
>IM A MASSIVE GOY TRALALALALA
Thanks for sharing
P7486 link reply
imagine taking all this bait seriously wwwwwwwwwwww
P7488 link reply
I was about to take your bait to the bait, baiting the bait, seriously, but I will refrain.
P7503 link reply
>I-i was j-just p-pretending to take the bait...
P7781 link reply

Thread 7616 in /tech/

P7616 link reply
>It's their service, their rules. They can do whatever the ***** they want for all you care. You agreed to their terms that they can do all of that and if you don't like it, you don't have to use Discord. It's that simple. Quit complaining. Get a *****ing life.
>It's Hitler's nation, his rules. He can do whatever the ***** he wants to Jews for all you care. You agreed that he can exterminate the Jews and if you don't like it, you can leave Nazi Germany. It's that simple. Quit complaining. Get a *****ing life.

There is no hope for normies. Normies should all get selectively killed and purged.
1 reply omitted.
P7631 link reply
P7630
a port-o-potty is technically private property too but anyone is welcome to shit and piss in it
P7632 link reply
P7631
Dude I'm concerned you don't understand what my concerns are
P7713 link reply
P7630
Two different things faggot. This is like saying "saying Cloudflare is an MITM is like saying Tor is an MITM".
P7719 link reply
>>It's Hitler's nation, his rules. He can do whatever the ***** he wants to Jews for all you care. You agreed that he can exterminate the Jews
based op
P7728 link reply
P7713
Nah. It's more like saying that saying that almost isn't like saying the exact opposite.

Thread 6799 in /tech/

P6799 What do you think about analog computers? link reply
Someone I know keeps talking about them as if they are the next step, but my understanding of analog computers is they basically just revolve around ratios and a few switches that vary their function based on signal strength (force, voltage, amperage). And maybe there are some other functions like establishing various exponential growth curves to calculate exponents and square roots.

But they're totally static in terms of their functions because everything is set in the chip and in addition to that they are, in the case of electronic ones, highly sensitive to heat and the changing of electrical characteristics of parts with use or time. Also, every part has to be calibrated where as the digital chipsets can rely on a PSU to control a single static voltage measurement.

The assumed benefits of electrical analog computers is instant calculation, but that's not technically true because there is a propagation rate for electronics through a circuit.

They are certainly faster for calculating many things and can give more accurate results, if well calibrated, than digital computers due to using the practically fluid quantities of electrons, within the range that they can be measured as outputs.

But creating something as simple as email through them would be almost impossible and require a building full of sheets of circuits while also having the technical complication of relying on manual ciruit disconnection or connection to initiate something.

Now I'm getting nostalgia. These things can be really *****ing complicated to build and sorting out a problem with them without some diagnostic functions can require testing every part related to a function and reassembling them with a replacement part.
7 replies omitted.
P6885 link reply
>>P6855

>I feel like there should be a way to program an analog computer.

You're right. There is, or there seems to be. I thought of a design while pretending to sleep.

I think the difference between analog and digital computers is really about how you quantize (count) things. Analog is a description of fluid type dynamics without discrete quanities where as digital has descrete quantities involved, but that's purely a matter of the measurement and whether or not you're counting individual electrons or photons, or cycles of a particle in an atom.
P6886 link reply
discrete*
P6887 link reply
quantities*

You're all okay with some small spelling errors, right? I type fast, and don't usually proof read.
P7122 link reply
There are some deeper issues with the analog computer design I came up with that I haven't resolved yet.

They aren't insurmountable, they just require more mechanisms to keep the system functioning.

There's probably no point in thinking about it any further though because it's never going to be built by me. If I search for stuff on electrical engineering, I would be inadvertently giving away part of the design at this point.

Ultimately it's just ideas because access to resources are gatekept by private groups that don't give a ***** about anything except an endless supply of hookers, coke, and orphans in the custody of Federal agent ***** pimps.

/watch?v=XDNzN2fv5bQ

Isn't the USA great? I hate this god forsaken country.

P7183 link reply
>Ultimately it's just ideas because access to resources are gatekept by private groups that don't give a ***** about anything except an endless supply of hookers, coke, and orphans in the custody of Federal agent ***** pimps
Enroll into a public university, you stupid *****. Oh, wait, you're american so that's not really a thing. Well, get *****ed then.

Thread 6771 in /tech/

P6771 link reply
>Tor
<Ackchyually it's TOR cus dis an dat
>Tor
>Linux

<Ackchyually it's GUHNOO slash LEENIX cus dis an dat
>Linux
The naming of the software matters. The people who developed it named it for a reason.

Thread 6659 in /tech/

P6659 Anonymous polling link reply
Anonymous-Voting.jpg
Does anonymous communication make it impossible to tell how many people support an idea? Will we always have to live with the possibility of sockpuppets, shills, bots, and schizos who have convinced themselves everyone who disagrees with them is one person? Or could there be some clever cryptographic way to make polling of real humans happen without revealing their identities?
2 replies omitted.
P6676 link reply
P6662
>But are there even captchas that can only be performed by a real person anymore?
yea
its called posting a picture of yourself holding your gov id and a timestamp and making a specific randomly generated pose
oh wait, bots can just deepfake that
nvm its over
P6682 link reply
P6676
Does face-to-face meeting count as a captcha?
P6689 link reply
Once someone knows about sock puppets and astroturfing, why would they be influenced by the crowd any longer online?

The point of anonymous speech in a democracy is to spread ideas without retaliation by terrorists of various kinds, as a stop gap to prevent terrorists from dictating public opinon when it comes down to voting in elections.

>Or could there be some clever cryptographic way to make polling of real humans happen without revealing their identities?

Yeah, there's a way to generate something like that, but it requires a trust worthy party to do.

1. The trust worthy party has you drop some dust onto a plate after verifying you're a legit citizen that hasn't gotten a hash yet.

2. A device takes a picture of the dust and prints you out a very large hash of it.

3. You have the hash and walk away, the copy of the hash by the trusted party is used to verify you are a real person online, but they don't know which person you are. You could add more anonymity to this by having hash exchanges where people trade their hashes with random people.

4. Hashes are reissued every year or something.

There are other schemes you could use, but that one is pretty straight forward.
P6690 link reply
>The point of anonymous speech in a democracy is to spread ideas without retaliation by terrorists of various kinds, as a stop gap to prevent terrorists from dictating public opinon when it comes down to voting in elections.

This doesn't entirely stop terrorism though, since if the candidates are subject to terrorism, they can't run on the ideas they want or be elected because people agree with them.

That's why the anti-White terror campaigns of the 1960's and onwards had such a devastating effect on politics, once they started burning down universities and politician's offices it was no longer possible to run on a pro-Western campaign platform without intimidation.

>On February 21, 1970, at around 4:30 a.m., three gasoline-filled Molotov cocktails exploded in front of the home of New York Supreme Court Justice John M. Murtagh, who was presiding over the pretrial hearings of the so-called "Panther 21" members of the Black Panther Party over a plot to bomb New York landmarks and department stores.[82] Justice Murtagh and his family were unharmed, but two panes of a front window were shattered, an overhanging wooden eave was scorched, and the paint on a car in the garage was charred.[82] "Free the Panther 21" and "Viet Cong have won" were written in large red letters on the sidewalk in front of the judge's house at 529 W. 217th Street in the Inwood neighborhood of Manhattan.[82]

https://en.wikipedia.org/wiki/Weather_Underground#Ideology
P6716 link reply
P6682
>Does face-to-face meeting count as a captcha?
Until indistinguishable androids are a thing, I suppose so.

Thread 6473 in /tech/

P6473 End to end encryption and spam control link reply
Say you create a service that allows people to post content to each other, like email, or social media or whatever, but the messages are end to end encrypted so the server host cannot see the message contents. Say an adversary creates a few thousand sock puppet accounts and has them send spam to each other in order to occupy the server's bandwidth and memory storage. The server operator cannot see the data being sent between the sock puppet accounts, so the server operator cannot gauge which accounts are being used by legitimate users and which are sock puppet accounts meant to hog resources. What steps can the server operator take to prioritize service to legitimate users in this scenario, while preserving anonymity of the users? I think Signal's solution to this problem is to require a phone number for account registration, but this harms user anonymity.
15 replies omitted.
P6609 link reply
>>P6604

>Does Tox rely on central servers?

>No. That said, in some situations a client will choose to use publicly listed bootstrap nodes to find their way into the DHT.

To get to the DHT to use p2p, you require a bootstrapping node that can direct your traffic to a middle man hash table that compromises you and anyone you communicate with though, right?

CALEA law requires the ability to wiretap and tox was developed through github, a clearnet community development site that blocks Tor, leaving a relatively short path to identifying someone through their VPN or at least their general location if they're using a public wifi to upload to github.

https://forum.torproject.net/t/problems-with-github-com-registration-captcha-and-tor-browser/1717

>What is stopping people from tracking me through the public DHT?

My understanding of DHT anonymity is that the hashes are to be broken up into small enough pieces that they are repeated with only one version of the hash corresponding to 2 IPs with a directional element to them.

So just knowing the hashes alone would not tell you the users of that hash because the same hash exists on other nodes as well. You'd need to know the hashes and the IP addresses the nodes direct traffic between.

I don't really know a signficant amount about computers, I just reconstructed the DHT system based on what little I know about it, so I could be wrong and these protections aren't in place.

They may not be considering the number of hops in either i2p or tor aren't that many and adjusting the length of the hashes to ensure there is concurrent usage on other nodes would require a protocol adjustment to fit the numbers of current users or an adaptable protocol using data about the number of users that I don't think either the tor or the i2p protocols have the ability for.

Observing the DHT alone should not allow you to identify users, you'd need the IP addresses they direct to or ISP data.


P6610 link reply
>>P6606

>an even smaller niche fingerprint

Richocet Refresh runs through tor hidden services, so the traffic should be indistinguishable from onion site traffic from the ISP level.

P6613 link reply
>>P6600

I don't know.

I haven't actually gotten around to using it yet because my threat model plan makes these kinds of things complicated.

I boot to ram only, so to do that I would need to get it as a persistent program on a live USB OS or install it every time.

But my understanding of the program when routed through tor is that it meets a high standard for anonymity and independence from dedicated servers through p2p.
P6620 link reply
I think it would be useful if programs for linux, to facilitate boot to ram schemes, be in self contained binary wherever possible with a separate OS configuration file to integrate elements necessary at start up.

Programs like ricochet refresh don't require installation in terminal at all. You can just extract the files and then click on the binary to run it and it's all self contained in the extraction folder. So it's already excellent for boot to ram and can just be stored on an encrypted SD card.

Boot to ram OS is the future format that all OS will take. Might as well get ahead
of the curve and keep it in mind when designing programs for linux.

/watch?v=dj4Stq8Ga1A

/watch?v=0t6ApcGBShU

/watch?v=xIAOBdhZdjM

P6660 link reply
P6604
>Tox generates a temporary public/private key pair used to make connections to non-friend peers in the DHT. Onion routing is used to store and locate Tox IDs, to make it more difficult to, for example, associate Alice and Bob together by who they are looking for in the network.

That's an improvement from the last time I looked at the project. It used to be that your ip address was publicly associated with your public key hash.

Thread 1435 in /tech/

P1435 Hiding images in Fourier transforms link reply
I've been playing around with another way to hide information in images: hiding images in the Fourier transforms of other images. Pic related. What I did for this one is scale the intensity of the image and add it to the magnitude part of the Fourier transform of another image, then do an inverse Fourier transform to get back to a modified version of the original. These commands are using ImageMagick (compiled with HDRI support).

n=6000
convert-im6.q16hdri -define fourier:normalize=forward cover.jpg -fft "(" -clone 0 "(" -define quantum:format=floating-point hidden.jpg -evaluate divide $n ")" -gravity west -compose plus -composite ")" -clone 1 -delete 0-1 -ift embed1.jpg

To extract the hidden image, you can just take the Fourier transform again.

n=6000
convert-im6.q16hdri -define fourier:normalize=forward embed1.jpg -fft -delete 1 -evaluate multiply $n extracted.png

A nice property of this method is that the hidden image is recoverable (with some damage) even after lossy compression and other ways websites typically degrade uploaded images. On the other hand, it isn't very invisible; the added signal is very obvious. But someone who didn't know what to look for could easily mistake it for dithering and/or bad JPEG artifacts.
10 replies omitted.
P4821 link reply
P4807
It's mirrored about the origin because of how Fourier transforms work. The point at (k_x, k_y) represents how much of the wave e^(i*k_x*x + i*k_y*y) is present in the signal, so the point on the opposite side represents how much of e^(-i*k_x*x - i*k_y*y) there is. If the original signal is a real number, they have to be equal to each other.
P4857 link reply
Thanks. I guess the second best option then would be to pad the embedded image, only utilizing 1/4th of the cover.
P6632 link reply
So if I understand this correctly, if you know the image is a fourier transformable one and you have the specific transformation settings, you can get the hidden image out of it, but if you don't have the one of thousands of fourier setting, you can't get it without a massive process of screening all possible configurations with the entire image file and screening it by eye (currently)?

Can you hide more than one image this way?

Like could you take the scanned images of a book and hide it all in an image like that?

P6634 link reply
techoids are just glorified bean counters and spoon sorters, no different from the average npc except their ability to focus on the mundane for extended periods of time
P6653 link reply
P6632
There aren't a lot of settings involved here except adjusting the signal strength. You could do things like calculate real and imaginary parts or sine and cosine parts instead of magnitude and phase, but that wouldn't obscure the image.

Thread 5788 in /tech/

P5788 lennart link reply
Check this out, ourguy lennart finally landed at his dreamjob. Wish him good luck working on your favorite open-source projects and keep using your debian-based distro.
https://www.phoronix.com/news/Systemd-Creator-Microsoft
P6585 link reply
Keyed. Devuan rises above all.
P6587 link reply
P6585
Posted from my Devuan machine btw.

Thread 5680 in /tech/

P5680 link reply
Which steps do you take to ensure yourself a safe internet experience in your day to day life?
- at hardware level ? (e.g. GPS, molded USB slots, tamper-proof or tamper-evident cases, safes)
- at OS level ? (e.g. open source OS, firmware disallowed in the kernel, hardening)
- at browser level? (e.g. hardening, extensions)
- at behavioural analysis level? (e.g. social websites, online bookmarking, "cloud", accounts shared across multple devices)
- at autism level? (e.g. faraday cages, aluminium papers everywhere, reclusive lifestyle)
- other "best practices"
4 replies omitted.
P5730 link reply
I still use Windows 7 and I've yet to be hacked and realize it!
P5737 link reply
P5723
>Google Pixel
>Windows
>using (((official documentation)))
>M*cro$oft edge
>extensions bad
>don't be paranoid about "spyware"


>Google
>Microsoft
>trusted
P5739 link reply
noone cares
P5747 link reply
P5737
>falling for obvious madaidanbait that's been used on nanochan for over 2 years now

Thread 462 in /tech/

P462 link reply
December 3, 2021

A mysterious threat actor is running hundreds of malicious Tor relays

Security researcher claims to have identified threat actor running thousands of malicious servers.
Researchers claims the attacker may be trying to deanonymize and identify Tor users.
Evidence suggests the attacker, tracked as KAX17, is sophisticated and well-resourced.
The Tor Project has removed hundreds of KAX17 servers in October and November 2021.
Since at least 2017, a mysterious threat actor has run thousands of malicious servers in entry, middle, and exit positions of the Tor network in what a security researcher has described as an attempt to deanonymize Tor users.

Tracked as KAX17, the threat actor ran at its peak more than 900 malicious servers part of the Tor network, which typically tends to hover around a daily total of up to 9,000-10,000.

Some of these servers work as entry points (guards), others as middle relays, and others as exit points from the Tor network.

Their role is to encrypt and anonymize user traffic as it enters and leaves the Tor network, creating a giant mesh of proxy servers that bounce connections between each other and provide the much-needed privacy that Tor users come for.

Servers added to the Tor network typically must have contact information included in their setup, such as an email address, so Tor network administrators and law enforcement can contact server operators in the case of a misconfiguration or file an ***** report.

However, despite this rule, servers with no contact information are often added to the Tor network, which is not strictly policed, mainly to ensure there’s always a sufficiently large number of nodes to bounce and hide user traffic.

KAX17: Non-amateur level and persistent group
But a security researcher and Tor node operator going by Nusenu told The Record this week that it observed a pattern in some of these Tor relays with no contact information, which he first noticed in 2019 and has eventually traced back as far as 2017.

Grouping these servers under the KAX17 umbrella, Nusenu says this threat actor has constantly added servers with no contact details to the Tor network in industrial quantities, operating servers in the realm of hundreds at any given point.

The actor’s servers are typically located in data centers spread all over the world and are typically configured as entry and middle points primarily, although KAX17 also operates a small number of exit points.

Nusenu said this is strange as most threat actors operating malicious Tor relays tend to focus on running exit points, which allows them to modify the user’s traffic. For example, a threat actor that Nusenu has been tracking as BTCMITM20 ran thousands of malicious Tor exit nodes in order to replace Bitcoin wallet addresses inside web traffic and hijack user payments.

KAX17’s focus on Tor entry and middle relays led Nusenu to believe that the group, which he described as “non-amateur level and persistent,” is trying to collect information on users connecting to the Tor network and attempting to map their routes inside it.

In research published this week and shared with The Record, Nusenu said that at one point, there was a 16% chance that a Tor user would connect to the Tor network through one of KAX17’s servers, a 35% chance they would pass through one of its middle relays, and up to 5% chance to exit through one.

“High probability of relays and guards can definitely be used to identify hidden services. It can also be used to decloak users — especially if you have some other means to tracking middle relay past the guard, such as monitoring common public services,” Dr. Neal Krawetz, an independent researcher studying the Tor network, told The Record in a conversation this week.


Nusenu told The Record he’s been reporting KAX17’s servers to the Tor Project since last year, with the Tor security team removing all of KAX17’s exit relays in October 2020.

Another batch of Tor exit relays with no contact info came online immediately after the October 2020 removals, but Nusenu said he hasn’t been able to link these new servers to KAX17 just yet, even if it is very likely that they are.

Hundreds of KAX17 Tor servers removed this year as well
Contacted for comment, a spokesperson for the Tor Project confirmed Nusenu’s latest findings and said they also removed a batch of KAX17 malicious relays this year as well, in October, and a second batch in November.

“Once we got contacted, we looked through all the relays in the network and identified several hundred relays that are very likely belonging to the same group and removed them on November 8,” a spokesperson told The Record.

Tor-email
This is not academic research
As for who is behind this group, neither Nusenu nor the Tor Project wanted to speculate.

“We are still investigating this attacker and can’t provide links to any attribution so far,” a Tor Project spokesperson told us in an email earlier yesterday.

However, Nusenu says that KAX17 made at least one operational security (OpSec) mistake in its early years when some of its servers did feature an email address.

Ironically, the threat actor reused the same email to sign up for the Tor Project mailing list and then participate in discussions and advocate against the removal of their malicious servers.

While all signs point to a nation-level and well-resourced threat actor who can afford to rent hundreds of high-bandwidth servers across the globe for no financial return, The Record did ask Nusenu about the possibility of KAX17 being an academic project studying Sybil attacks, a technique known to be able to deanonymize Tor traffic under certain conditions. The researcher replied that this was unlikely and provided the following arguments why (edited for grammar):

Academic research is usually limited in time. KAX17 has been active since 2017.
Researchers do not get involved in weakening anti-bad-relays policies on the Tor mailing list.
Researchers do not fight against their removal and do not replace removed relays with new relays.

Research-based relays usually run within 1-2 autonomous systems, not >50 ASes.
Research relays usually run <100 relays, not >500.
Research relays usually do have a relay ContactInfo.
The Tor Project is quite well connected to the research community.

https://therecord.media/a-mysterious-threat-actor-is-running-hundreds-of-malicious-tor-relays/
7 replies omitted.
P1293 link reply
P1289
Tor deals with some somewhat overwhelming technical problems. I know I'm reading something like a non-technical press release but the reassurances on this page are not reassuring (stronger community based reporting... we need more funding... for our research to discover new tools we could possibly use in the future...). I guess in a cybersecurity arms race context that last one isn't as bad as other times I have heard people say those words.
P4841 link reply
tor foundation has been pozzed for years. mixnets are the future for anons.
P5265 link reply
P1287
>i2p?
They are only genuinely serious competitor to Tor. Freenet and others are focused on storage on not interactive hidden services like Tor is, Lokinet is infected with pointless cryptocurrency nonsense, and Yggdrasil isn't even focused on anonymity. Also i2p has ~50,000 routers online vs Tor's ~6500 relays, which makes attacks 10 times harder to pull off.
P5272 link reply
P4841
hope it wont turn out to be a crypto scam. will install rust once nyme drops
P5305 link reply
P5272
Mixnets seem like a good idea. Is there anyone working on this without a shitty cryptocoin attached?

Thread 3499 in /tech/

P3499 link reply
86361288_p0.jxl
>JPEG XL
1 reply omitted.
P3503 link reply
wrong image

P3500
KYS
P3504 link reply
P3500
The Yggdrasil version of the site is faster:
https://[200:e111:a7c7:6fee:8a1b:90a7:2b17:79ec]/
P3592 link reply
better lossless version of the frog everyone keeps posting
P3593 link reply
P3592
*lossless relative to the original JPEG

Thread 2450 in /tech/

P2450 link reply
500 generations.webp
1000 generations.webp
2000 generations.webp
Why does WebP generation loss do this?
6 replies omitted.
P2631 link reply
Really!?!!?! I am quite curious why, although green is kinda middle color of the spectral range and very common.
P2605 It is a video codec applied to images, and now it is too late to remove it out of existence, because of jewgle
P2659 link reply
I wonder if it has to do with the favorable treatment green gets in camera designs and this has the downstream effect of green preferred for other purposes. If that's true and relevant here, someone here should probably publish that.
Green always gets chosen for preferable treatment because in general people see a greater dynamic range of green. Consider 16 bit color. Cameras are designed like that too.
P2714 link reply
Damn, even jewgle noise is ugly. I prefer jpeg one.
YUCK!

Thread 1589 in /tech/

P1589 link reply
down again lol
P1592 link reply
Works for me
P1593 link reply
It's fixed now but they were breaking half the Internet again for a while.
https://www.cloudflarestatus.com/incidents/xvs51y9qs9dj

Now back to your regularly scheduled breaking privacy, making sites less secure, and *****ing with Tor users or anyone who doesn't want to run JS garbage, as usual.
P1603 link reply
>run the entire internet on one server
>when it breaks, most of the internet goes down

why?
P1619 link reply
What's going on and why are they tearing apart the internet?
When will this end?
P1668 link reply
P1603
Because it's free. Free DDoS protection, free CDN caching, free for them to harvest tons of information.

Thread 1648 in /tech/

P1649 link reply
A potential issue I can see right away is how few possible answers there are. A bot could solve this by just spamming enough random guesses. Google's ReCaptcha shouldn't be imitated. It's very weak as a captcha, and mainly operates by banning IP addresses.
P1653 thank you link reply
Yes, a bot can also solve this CAPTCHA by a fixed answer as well as random ones. In practical users, I must send 2 or more CAPTCHAs to users in order to increase n of answers. The expectation value of this CAPTCHA is equal to its number of selectable answers. In this test, I set it to 120. Easy to solve for bots. And also humans? :D
P1667 link reply
P1653
I would prefer having to solve a slightly more difficult CAPTCHA then being forced to repeatedly wait for the CAPTCHA to load.

Thread 507 in /tech/

P507 link reply
Why do so many corporations use Fedora and RHEL? What's so special about them?
4 replies omitted.
P1042 link reply
Red Hat also provides companies with something to blame if their computers go offline. You don't want to be the one that's responsible for taking the blame right? Nobody got fired for choosing IBM!
P1395 link reply
Yeah and IBM owns Red Hat these days
P1406 link reply
RH has sales representatives. That's it.
They bribe corporate decision makers into buying their wares with little gifts, positive attention, and kickbacks. That's how you get sales in the corporate world, and the only reason companies like Red Hat and Microsoft are successful.
P1409 link reply
RHEL because their support is highly regarded. Fedora I can only assume is used by corporations because of its relation to RHEL.
P1433 link reply
P1406
Ah, the good Oracle strategy.

Thread 322 in /tech/

P322 link reply
Are there any database engines that implement something like SQL views, but which instead of being recalculated when you query them, get recalculated whenever one of their inputs changes?
14 replies omitted.
P1214 link reply
P1213
Didn't notice the license.

>I don't believe in databases
What's your preferred way of achieving ACID?
P1215 link reply
P1214
Right now I am not doing anything performance bound, so I can use my own trivial programs with an emphasis on brevity **inb4 I have just praised common lisp for concision**.
In contrast, when performance has been limiting my solutions have been definitionally nonportable in ways you can imagine.
An attempt at generic benchmarking of the former is pointless, and the latter is generally dumb, hence some of my bile.
P1216 link reply
Now I have actually read P336 and in this case I would just do exactly what you said you don't want to and conventional wisdom is against and instead of adding a database dependency and a using-the-database-in-a-customized-way dependency I would have just written the trivial program, and if it was too slow made it faster, and proved reliability properties that warranted it (related to makin' it faster).
P1218 link reply
P1215
P1216
ACID is about correctness rather than performance.

>proved reliability properties that warranted it
An efficient database with formal proof of ACIDity is another thing that would be very nice to have.
P1221 link reply
P1218
A historical note is that there was a common lisp metaobject protocol based persistent object protocol/database based on the pre-postgres Berkeley DB (which was ACID). Lots of modern things like it are around. My dear acl2 doesn't have a formal notion of CLOS which is a hassle.

Thread 1062 in /tech/

P1062 Can you solve this? link reply
How efficiently and simply can you implement this function?
Bonus: prove your solution correct.
17 replies omitted.
P1125 Getting closer link reply
P1107
Is that the only greedy way to do it? Would greedily swapping identical characters within cycles work?

Your sets representation solves it pretty much. We just need to disprove the existence of local optima.
Proof of a unique optimum (fail :():
From any permutations we have a set of possible moves (swaps) of identical characters to other permutations through composition. A swap will change the total cycle length by either +1 or -1. Obviously the global optimum will have all possible identical character swaps being +1. Let's choose the {QP|Q permutes identical characters of s2} form.
The identical characters are elements in various positions in the cycles of P.
Let each set of identical characters that can be swapped be Xi, containing swappable positions Xij.
Xij are unique for all i,j.
Lemma: Optimizing swaps of elements from each Xi independently optimizes Q
It doesn't?
In your counterexample there are no repeated characters within a cycle in either solution.

Maybe extending the moves to multiple swaps would work. Greedy but with some lookahead. Maybe swaps from different Xi's or something. It would work given enough swaps to represent all of Q. But what is the minimum for convexity?
In your counterexample there are extra possibilities? Like: ABFG AHICDEB. Do these change things?
If we can reduce something hard to this problem then accepting a brute force search of Q is probably fine.

Oh wait?
Proof of a unique optimum if there is only one set of identical characters X:
Assume you have Q and Q' with nswaps(QP)<nswaps(Q'P).
Q has more cycles than Q'.
Every cycle of P that Q or Q' can affect contains at least one element of X. We ignore the rest.
There are more such cycles with elements of X in Q than Q'.
Therefore, there exists a cycle in Q' with multiple elements of X. Therefore, there is a swap move from Q that decreases nswaps. Therefore, there is a unique optimum and the greedy swap algorithm works where there is only 1 set of identical characters.

This indicates that having moves be combinations of swaps from different Xi's might be convex for the general case.
P1126 link reply
P1125
Correction again...
>swap move from Q
swap move from Q'
P1127 link reply
P1125
Also "unique optimum" means unique optimal value not a unique Q...
P1131 link reply
I added two functions to get this:
ACL2 !>(get-swap-set "abcd")
((2 3) (1 3) (0 3) (1 2) (0 2) (0 1))
ACL2 !>(rank-swaps "abcd" "dabc" (get-swap-set "abcd") nil)
(1 0 1 1 0 1)
ACL2 !>(get-swap-set "abba")
((2 3) (1 3) (0 3) (1 2) (0 2) (0 1))
ACL2 !>(rank-swaps "abba" "baab" (get-swap-set "abba") nil)
(2 2 0 0 2 2)
ACL2 !>(rank-swaps "abba" "baba" (get-swap-set "abba") nil)
(2 0 0 0 0 -2)
ACL2 !>(rank-swaps "abcd" "acbd" (get-swap-set "abcd") nil)
(-1 -1 2 -2 -1 -1)
So I need to prove a lemma that only positively ranked swaps should ever be done and higher ranked moves are better, recursively break ties for multiple rank 1s (in the absence of a rank 2), and recursively collect the leftmost(choooosing) top ranked swaps.
Functions:
(defun get-swap-set (string)
(add-square-idxes nil (eta nil (length string)) (length string)))

(defun rank-swaps (string goal swaps ranks)
(if (zp (acl2-count swaps)) (reverse ranks)
(rank-swaps string goal (cdr swaps)
(append ranks
(let ((char-a (char string (car (car swaps))))
(char-b (char string (cadr (car swaps))))
(goal-a (char goal (car (car swaps))))
(goal-b (char goal (cadr (car swaps)))))
(list
(+ (if (equal char-a goal-a) -1 0)
(if (equal char-a goal-b) +1 0)
(if (equal char-b goal-b) -1 0)
(if (equal char-b goal-a) +1 0))))))))

#'add-square-idxes is in a text file above. I guess I also probably need to formalize those -1, 0, +1s by replacing them with the difference in number of matching characters in the string and goal (which is what they are, informally).
P1106
The game is proving a theorem your method is correct from the ground up, and probably then prooooooving your method is efficient or something.
P1132 link reply
Oops, c/(reverse ranks)/ranks/
I "reversed" it twice.

Thread 849 in /tech/

P849 link reply
ancientcomputing.webm
These mechanical computers they used to build are pretty cool. I especially like the multiplier.
x