Indexes start from zero because they’re memory offsets, but array[0]
is still the first element because it’s an ordinal number, not an offset. It’s literally counting each element of the array. It lines up with the cardinality—you wouldn’t say ['A', 'B', 'C']
has two elements, despite array[2]
being the last element.
When done correctly, the banner is actually a consent banner. It’s a legal thing, not necessarily trying to discourage criminals. It’s informing users that all use will be monitored and it implies their consent to the technology policies of the organization. It’s more for regular users than criminals.
When it’s just “unauthorized access is prohibited”, though, especially on a single-user server? Not really any point. But since this article was based on compliance guidelines that aren’t all relevant to the homelab, I can see how it got warped into the empty “you no hack” banner.
Yes, but only if your firewall is set to reject instead of drop. The documentation you linked mentions this; that’s why open ports are listed as open|filtered
because any port that’s “open” might actually be being filtered (dropped).
On a modern firewall, an nmap scan will show every port as open|filtered
, regardless of whether it’s open or not.
Edit: Here’s the relevant bit from the documentation:
The most curious element of this table may be the open|filtered state. It is a symptom of the biggest challenges with UDP scanning: open ports rarely respond to empty probes. Those ports for which Nmap has a protocol-specific payload are more likely to get a response and be marked open, but for the rest, the target TCP/IP stack simply passes the empty packet up to a listening application, which usually discards it immediately as invalid. If ports in all other states would respond, then open ports could all be deduced by elimination. Unfortunately, firewalls and filtering devices are also known to drop packets without responding. So when Nmap receives no response after several attempts, it cannot determine whether the port is open or filtered. When Nmap was released, filtering devices were rare enough that Nmap could (and did) simply assume that the port was open. The Internet is better guarded now, so Nmap changed in 2004 (version 3.70) to report non-responsive UDP ports as open|filtered instead.
WG uses UDP, so as long as your firewall is configured correctly it should be impossible to scan the open port. Any packet hitting the open port that isn’t valid or doesn’t have a valid key is just dropped, same as any ports that are closed.
Most modern firewalls default to dropping packets, so you won’t be showing up in scans even with an open WG port.
Google destroys their own search engine by encouraging terrible SEO nonsense and then offers the solution in the form of these AI overviews, cutting results out of the picture entirely.
You search something on the Web nowadays half the results are written by AI anyway.
I don’t really care about the “human element” or whatever, but AI is such a hype train right now. It’s still early days for the tech, it still hallucinates a lot, and I fundamentally can’t trust it—even if I trusted the people making it, which I don’t.
Just because you can work with one monitor doesn’t mean multiple monitors isn’t more comfortable though. You can have multiple windows open at once, at full size, and glance between them freely. No need for them to share the limited real estate of a single monitor.
I run Sway on my laptop because it lets me take full advantage of my single monitor, but on my multi monitor desktop setup I use a regular floating DE.
Most things should be behind Authelia. It’s hard to know how to help without knowing what exactly you’re doing with it but generally speaking Authelia means you can have SSO+2FA for every app, even apps that don’t provide it by default.
It also means that if you have users, you don’t need them to store a bunch of passwords.
One big thing to keep in mind is that anything with its own login system may be more involved to get working behind Authelia, like Nextcloud.
But hey, instead of killing everyone, eugenics could lead us to a beautiful stratified future, like depicted in the aspirational sci-fi utopia of Brave New World!
I agree with you, ultimately. My point is just that “good for humanity vs bad for humanity” isn’t a debate, there’s no “We want to ruin humanity” party. Most people see their own viewpoint as being best for humanity, unless they’re a psychopath or a nihilist.
There are fundamental differences in political views as well as ethical beliefs, and any attempt to boil them down to “good for humanity” vs “bad for humanity” is going to be inherently political. I think “what’s best for humanity” is a good guiding metric to determine what one finds ethical, but using it to categorize others’ political beliefs is going to be divisive at best.
In other words, it’s not comparable to the left/right axis, which may be insufficient and one-dimensional, but at least it describes something that can be somewhat objective (if controversial and ill-defined). Someone can be happy with their position on the axis. Whereas if it were good/bad, everyone would place themselves at Maximum Good, therefore it’s not really useful or comparable to the left/right paradigm.
I don’t think that “everyone is inherently equal” is a conclusion you can reach through logic. I’d argue that it’s more like an axiom, something you have to accept as true in order to build a foundation of a moral system.
This may seem like an arbitrary distinction, but I think it’s important to distinguish because some people don’t accept the axiom that “everyone is inherently equal”. Some people are simply stronger (or smarter/more “fit”) than others, they’ll argue, and it’s unjust to impose arbitrary systems of “fairness” onto them.
In fact, they may believe that it is better for humanity as a whole for those who are stronger/smarter/more fit to have positions of power over those who are not, and believe that efforts for “equality” are actually upsetting the natural way of things and thus making humanity worse off.
People who have this way of thinking largely cannot be convinced to change through pure logical argument (just as a leftist is unlikely to be swayed by the logic of a social darwinist) because their fundamental core beliefs are different, the axioms all of their logic is built on top of.
And it’s worth noting that while this system of morality is repugnant, it doesn’t inherently result in everyone killing each other like you claim. Even if you’re completely amoral, you won’t kill your neighbor because then the police will arrest you and put you on trial. Fascist governments also tend to have more punitive justice systems, to further discourage such behavior. And on the governmental side, they want to discourage random killing because they want their populace to be productive, not killing their own.
I disagree. It would be better to set a precedent that using people’s voices without permission is not okay. Even in your example, you’re suggesting that you would have a Patreon while publishing mods that contain voice clips made using AI. In this scenario, you’ve made money from these unauthorized voice recreations. It doesn’t matter if you’re hoping to one day hire the VAs themselves, in the interim you’re profiting off their work.
Ultimately though, I don’t think it matters if you’re making money or not. I got caught up in the tech excitement of voice AI when we first started seeing it, but as we’ve had the strike and more VAs and other actors sharing their opinions on it I’ve come to be reminded of just how important consent is.
In the OP article, Amelia Tyler isn’t saying anything about making money off her voice, she said “to actually take my voice and use it to train something without my permission, I think that should be illegal”. I think that’s a good line to draw.
I can understand the concern with the ethics of AI art and plagiarism, but you’re painting with a broad brush when you say that computer engineering can’t be art.
Without considering AI, you can certainly make art through code. Math can be beautiful. Shaders in particular are a ripe avenue for programmatically generating art.
There are a lot of artists out there creating art through code, and there have been for significantly longer than the AI fad has been around. The act of creating the art is simply in writing the code, rather than in picking up a paintbrush. I doubt you accuse people who paint in Photoshop of “letting the computer paint for them”, even if they use filters or something like the bucket fill tool. That’s code creating art right there. But someone still had to input creativity, and writing code to create art that looks good requires creativity and effort and is absolutely art.
AI art has different problems with it, but “programming isn’t art” isn’t one of those reasons.
Why would a random browser extension take it upon itself to snoop on your traffic to ensure that the websites you’re using can’t be used for illegal things, and then intentionally break it if it detects something it thinks it’s illegitimate? That’s a huge breach of privacy. It’s just malware at that point. It’s not like a court of law would hold your browser extensions responsible for your piracy. That’s like blaming a cup holder because the car was used in a robbery.
No, I think this is just a bug. Especially since people have reported that the extension breaks other websites too.
In any% runs, yeah. But they skip through all the dialogue and cutscenes anyway, so it’s barely spoilers. Most of the speedrun is just crazy hops and killing Shadowheart to stuff her corpse in a crate.
AGDQ did an actual all acts speedrun, which does show the actual ending of the game though. And admittedly, more spoilery than a usual run because there’s a lot of commentary.
“as opposed to” is an idiom that just means “in contrast”. You’re creating a contrast between what they’re actually doing as opposed to what they’re supposed to be doing. “As supposed to” doesn’t work as a preposition and doesn’t actually create a contrast on its own.
You can’t really anonymously use a credit card. Privacy.com will let you give bogus info to the FOSS project if you really don’t trust the devs having your name, but you’ll have to give Privacy a bunch of info which is arguably an even bigger invasion of privacy. I suppose it’s a matter of who you trust.
Most donations will go through an intermediary like PayPal so it’s not like you’re giving them your credit card info directly.
Generally CnD letters are not generated by the ISPs themselves. ISPs don’t care what you do unless legally obligated to. When you get a CnD letter, it’s usually because someone working for a copyright holder was on a torrent and snagged your IP, then sent an infringement notice to your ISP, who in turn sends a CnD to the current holder of the IP, i.e. you.
At no point does your ISP have to read your digital communications themselves. Any one of your peers on a torrent can tell what your public IP address is, it’s inherent to the BitTorrent protocol. Copyright holders take advantage of this to catch pirates.
Unlike Tor, which is built around accessing the clearnet anonymously, I2P is primarily designed around keeping traffic in the darknet. When you join I2P, you route traffic for other nodes but only within the I2P network, it will never leave through your clearnet address.
The equivalent of Tor’s exit nodes are called “outproxies”, but they aren’t often used, there aren’t very many of them, and you have to specifically set them up manually as it isn’t the default behavior like it is for Tor.
Connecting to a switch/router doesn’t change anything, that’s just how the Internet works. The fiber from the street is almost certainly connected to switches before it gets to your house as well.
If anything would break the “fiber to the desktop” meme, it’s the fact that most residential ISP ONTs I’m aware of do not support SFP, which means that you’d have to get copper out of the ONT, then convert it back into fiber. You’d have to get lucky with an ISP that has compatible options.
I don’t get why they call hosting a mail server being your own ISP. It’s a very very loose definition of the term “ISP” there. ISPs may provide mail services on the side, but that’s not what makes them an ISP imo—its providing internet access that makes them an ISP.
On looking it up, apparently some people consider email providers ISPs in their own right though? Seems like confusing terminology.
This project uses mDNS, which is specific to the .local
TLD. The whole reason that people are against the use of .local
is because it would break mDNS. So you can set a custom TLD, but it doesn’t matter because this is actually the correct context for .local
to be used, and changing the TLD will actually break things for a lot of clients.
Yeah, fair enough. To my mind I guess I don’t think of array indexes as an example of actual zero based numbering, simply a quirk of how pointers work. I don’t see why one starting from zero has anything to do with the other starting from zero. They’re separate things in my head. Interestingly, the article you linked does mention this argument:
That said, I suppose I still use normal one-based numbering because that’s how I’m used to everything else working.