why not matrix?
🚀 Seen my posts and want more? Dive deep into the issues with Big Tech at Escape Big Tech!
💡 Need FOSS-focused software solutions? Reach out on Matrix at @dannym:balooga.xyz!
why not matrix?
I prefer the extremely intuitive:
["grep -P "PPid:\t(\d+)" /proc/$$/status | cut -f2 | xargs kill -9")
]=system(
or
i:!grep -P "PPid:\t(\d+)" /proc/$$/status | cut -f2 | xargs kill -9[esc]Y:@"[cr]
It just rolls off the fingers, doesn’t it?
Edit: damn it lemmy didn’t like my meme because it assumes that characters between angle brackets are html tags :( you ruined it lemmy
EDIT 2: rewrote it, just assume that square brackets are buttons not characters
in this case the instruction set is extremely small (and includes open source verilog, so you could even fab it yourself)
quote from the website:
The CPU of the TKey is a modified version of PicoRV32, 32-bit RISC-V running at 18 MHz. Modifications includes a fast 32x32 multiplier implemented using the multiplier blocks in the iCE40 DSPs as well as a HW trap function.
The supported instruction set supported by the CPU is a subset of RV32I. Specifically it includes compressed instructions, but excludes instructions for:
- Counters
- System
- Synch
- CSR access
- Change level
- Trap redirect
- Interrupt
- MMU
The instruction set implemented by the CPU also includes multiplication instructions from the RV32IC_Zmmul (-march=rv32iczmmul) extension. Division is not supported.
Any illegal, unsupported instruction will halt the CPU. The halted CPU is detected by the hardware, which will blink the RGB LED with red to indicate the error state. There is no way for the CPU to exit the trap state besides a power cycle of the device.
Note that the CPU has no support for interrupts. No instructions, ports or logic.
there are use cases, such as security, where you want as few instructions as possible, so a full ARM processor isn’t the best idea. You may want to read the threat model page: https://tillitis.se/products/threat-model/
The more you know! I don’t follow their blog so I didn’t realize this. This is a pleasant surprise and yet another reason to love Mullvad.
The specs are literally the reason why people would buy this. It’s basically the best device we have available that can be used as a base for devices handling secure computation, or software handling secure computation. Think of a FIDO2 key, or a gpg smartcard, all secure and verifiable
I’d like to correct you by saying that GPL is DEFINITELY enforceable in countries other than america. I can’t say about every country (tho that will be the case with every license), but for instance it’s definitely enforceable in europe. For example in Germany and France there have been a few lawsuits that the FSF helped carry out against immoral companies.
If you’re in Germany the Institute for Legal Questions on Free and Open Source Software is a law firm that literally works only on enforcing the GPL, FOSS licenses and other technological human rights that are being ignored by big tech.
If you want to be even more sure about European Enforcement you may want to checkout the EUPL v1.2 which is GPLv3 compatible.
In other countries, such as Japan, the GPL is also enforceable, so long as you treat it the same way as copyright, so you’re willing to sue companies that you know are stealing from you (the FSF can help you if you can’t afford it).
Russia and China don’t care, but… it’s Russia and China, that’s not really news, is it? :)
EDIT: I will write a full article about the legal enforce-ability of FOSS licenses such as the GPL before the end of the year
MIT is a terrible license that only got popular because of the popularity of the anti-open source movement in the last decade.
one could write books about what’s wrong with the MIT license.
It could even theoretically be argued that MIT has in some ways allowed big tech companies to proliferate, by effectively allowing them to take open-source code, modify it, and then close it off in their proprietary software. What does this mean? It means that the work of countless dedicated open-source developers can be co-opted by companies that have done almost none of the work, reaping several billions of dollars, while the developers who actually did the work make no money. It’s like opening your doors wide only to have someone come in, take your stuff, and sell it back to you.
In contrast, in licenses like the GPL, there’s a requirement that if you use GPL-licensed code and modify it, your new code also has to be open-source under the GPL.
the syntax is more powerful than markdown, the whole idea of with blocks and the ability to have more complex layouts is great
I love it; it’s been my replacement for LaTeX ever since I’ve hears about it on hacker news
I don’t want to believe this, my brain is refusing to process that statement, I have stared at that article in a state of disbelief for a minute. Surely someone can’t be that stupid, right?
I have heard plenty of brain dead arguments by anti-encryption people, but this is by far the stupidest. There is no way, there is just no way that he’s so… I want to say brain dead, but that would imply that there is even a brain there for it to be dead.
Regardless of political affiliation, or even the individual’s stance on encryption, surely there can’t be a single person that heard that statement and didn’t laugh at it, right?
Perhaps the Australian stereotype of being upside down holds some truth, considering his… utterance; he must walk on his hands and constantly get bit by snakes and attacked by drop bears on his daily commute, that’s the only explanation for how someone can make such a statement
it’s so rare that it basically only exists in well run companies and well run FOSS projects (which are few and far between)
Doesn’t match my experience. The worst thing about it is ping, but download is mostly always around 100-200.
I mean fair enough, some files are in /run/current-system/sw/
well nix still uses the same structure, the only difference is that files are symlinked to files in subfolders of the /nix/store folder.
For example you may find that /etc/hosts is just a symlink to /nix/store/69420aaabbbcccdddfffggghhhiii420-hosts
In my case I’m my own server runner but hey I wouldn’t mind a donation 😂
Reminder that Google is supposedly a real tech company, yet they’ve failed at:
(No, I don’t have any repetitions, yes I missed a few)
Bonus tip:
ci" means change inside “” ca" means change around “”
the " can be replaced with any of: ({[wspbt
For changing inside or around parentheses, curky brackets, square brackets, words, sentences, paragraphs, code blocks and HTML tags respectively.
So for example if you want to replace all parameters in a function call you just do ci(
But that’s not all, the c is one of the possible operators, but not the only one.
di{ deletes the content of a block ya[ copies the content of something inside square brackets g~iw swaps the case of a word guis makes a sentence lower case gUip makes a paragraph upper case
And the most useless one: g?at replaces the content of an HTML tag with its rot13
Matrix VoIP is a thing, and it’s usable for audio & video on many clients, element and fluffychat come to mind, but probably more.
element call is also coming into element (and possibly other clients) for video calls and screensharing
why does that matter?