@Atemu@lemmy.ml avatar

Atemu

@Atemu@lemmy.ml

Interested in Linux, FOSS, data storage systems, unfucking our society and a bit of gaming.

I help maintain Nixpkgs.

github.com/Atemu
reddit.com/u/Atemu12 (Probably won’t be active much anymore.)

This profile is from a federated server and may be incomplete. View on remote instance

Atemu ,
@Atemu@lemmy.ml avatar

Your browser cannot block server-side abuse of your personal data. These consent forms are not about cookies; they're about fooling users into consenting to abuse of their personal data. Cookies are just one of many many technological measures required to carry out said human rights abuse.

Atemu ,
@Atemu@lemmy.ml avatar

I'd look further into that bug because it's not happening on my end.

Atemu ,
@Atemu@lemmy.ml avatar

The usual; check the server and client logs.

Atemu ,
@Atemu@lemmy.ml avatar

Do you have a better source than a 5 y/o comment in an issue?

What is this block-rate-estim?? Suddenly came to life

While I was writing a shell script (doing this the past several days) just a few minutes ago my PC fans spinned up without any seemingly reason. I thought it might be the baloo process, but looking at the running processes I see it's names block-rate-estim . It takes 6.2% CPU time and is running since minutes, on my modern 8...

Atemu ,
@Atemu@lemmy.ml avatar

Freetube won't have anything to do with h265 as youtube does not serve that format in any way.

Atemu ,
@Atemu@lemmy.ml avatar

If you're worried about that, I can recommend a service like Tailscale which does not require permanently open ports to the outside world, offering quite a bit more security than an exposed traditional VPN server.

Atemu ,
@Atemu@lemmy.ml avatar

It's a central server (that you could actually self-host publicly if you wanted to) whose purpose it is to facilitate P2P connections between your devices.

If you were outside your home network and wanted to connect to your server from your laptop, both devices would be connected to the TS server independently. When attempting to send IP packets between the devices, the initiating device (i.e. your laptop) would establish a direct wireguard tunnel to the receiving device. This process is managed by the individual devices while the central TS service merely facilitates communication between the devices for the purpose of establishing this connection.

Atemu ,
@Atemu@lemmy.ml avatar

TS is a lot easier to set up than WG and does not require a publicly accessible IP address nor any public whatsoever. It's not really comparable to setting WG up yourself; especially w.r.t. security.

Ask: How do you handle your résumés?

Usually I rely on my network & haven’t needed this kind of document in ages, but I’ve been tasked with creating a résumé for myself. I’ve grown more privacy-conscious every year & I think it’s weird that we are expected to give out so much information about ourselves to companies that lie about their culture & don’t...

Atemu ,
@Atemu@lemmy.ml avatar

more and more customary that (for some reason) they want your photo

Gotta keep the people with different skin colour out

Atemu ,
@Atemu@lemmy.ml avatar

What does this have to do with privacy? It's just a userscript to modify the regular Twitter website with all its human rights abuse.

Atemu ,
@Atemu@lemmy.ml avatar

Realtek LAN is usually not too bad.

For WiFi, you want mediatek or Intel though.

Atemu ,
@Atemu@lemmy.ml avatar

Steam is its own package manager and native games usually assume that an FHS-conformant is present. Neither of those mesh well with Nix notoriously has nothing comparable to an FHS and usually requires everything to be defined in its terms.

Atemu , (edited )
@Atemu@lemmy.ml avatar

They're in the middle of a rollout of a rewrite and have promised to publish the source soon.

Atemu ,
@Atemu@lemmy.ml avatar
Atemu ,
@Atemu@lemmy.ml avatar

Yes, yes they will. If you're the sole user, they'd identify you from your behaviour anyways.

I don't think internet proxy won't help very much w.r.t. privacy but it will make you a lot more susceptible to being blocked.

Atemu ,
@Atemu@lemmy.ml avatar

v3 is worth it though

[citation needed]

Sometimes the improvements are not apparent by normal benchmarks, but would have an overall impact - for instance, if you use filesystem compression, with the optimisations it means you now have lower I/O latency, and so on.

Those would show up in any benchmark that is sensitive to I/O latency.

Also, again, [citation needed] that march optimisations measurably lower I/O latency for compressed I/O. For that to happen it is a necessary condition that compression is a significant component in I/O latency to begin with. If 99% of the time was spent waiting for the device to write the data, optimising the 1% of time spent on compression by even as much as 20% would not gain you anything of significance. This is obviously an exaggerated example but, given how absolutely dog slow most I/O devices are compared to how fast CPUs are these days, not entirely unrealistic.

Generally, the effect of such esoteric "optimisations" is so small that the length of your unix username has a greater effect on real-world performance. I wish I was kidding.
You have to account for a lot of variables and measurement biases if you want to make factual claims about them. You can observe performance differences on the order of 5-10% just due to a slight memory layout changes with different compile flags, without any actual performance improvement due to the change in code generation.

That's not my opinion, that's rather well established fact. Read here:

So far, I have yet to see data that shows a significant performance increase from march optimisations which either controlled for the measurement bias or showed an effect that couldn't be explained by measurement bias alone.

There might be an improvement and my personal hypothesis is that there is at least a small one but, so far, we don't actually know.

More importantly, if you’re a laptop user, this could mean better battery life since using more efficient instructions, so certain stuff that might’ve taken 4 CPU cycles could be done in 2 etc.

The more realistic case is that an execution that would have taken 4 CPU cycles on average would then take 3.9 CPU cycles.

I don't have data on how power scales with varying cycles/task at a constant task/time but I doubt it's linear, especially with all the complexities surrounding speculative execution.

In my own experience on both my Zen 2 and Zen 4 machines, v3/v4 packages made a visible difference.

"visible" in what way? March optimisations are hardly visible in controlled synthetic tests...

It really doesn’t make sense that you’re spending so much money buying a fancy CPU, but not making use of half of its features…

These features cater towards specialised workloads, not general purpose computing.

Applications which facilitate such specialised workloads and are performance-critical usually have hand-made assembly for the critical paths where these specialised instructions can make a difference. Generic compiler optimisations will do precisely nothing to improve performance in any way in that case.

I'd worry more about your applications not making any use of all the cores you've paid good money for. Spoiler alert: Compiler optimisations don't help with that problem one bit.

Atemu ,
@Atemu@lemmy.ml avatar

I'd define "bloat" as functionality (as in: program code) present on my system that I cannot imagine ever needing to use.

There will never be a system that is perfectly tailored to my needs because there will always be some piece of functional code that I have no intention of using. Therefore, any system is "bloated" and it's a question to which degree it is "bloated".

The degree depends on which kind of resources the "bloat" uses and how much of it. The more significant the resource usage, the more significant the effect of the "bloat". The kind of resource is used defines how critical some amount of usage is. 5% Power, CPU, IO, RAM or disk usage have varying degrees of criticality for instance.

Some examples:

This system has a calendar app installed by default. I don't use it, so it's certainly bloat but I also don't care because it's just a few megs on disk at worst and that doesn't hurt me in any way.

Firefox frequently uses most of my RAM and >1% CPU util at "idle" but it's a useful application that I use all the time, so it's not bloat.

The most critical resource usage of systemd (pid1) on my system is RAM which is <0.1%. It provides tonnes of essential features required on a modern system and therefore not even worth thinking about when it comes to bloat.

I just noticed that mbrola voices sneaked into my closure again which is like 700MiB of voice synthesis data for many languages that I don't have a need for. Quite a lot of storage for something I don't ever need. This is significant bloat. It appears Firefox is drawing it in but it looks like that can be disabled via an override, so I'll do that right now.

Atemu ,
@Atemu@lemmy.ml avatar

Which version was that introduced in? 6.9?

Stopping a badly behaved bot the wrong way.

I host a few small low-traffic websites for local interests. I do this for free - and some of them are for a friend who died last year but didn't want all his work to vanish. They don't get so many views, so I was surprised when I happened to glance at munin and saw my bandwidth usage had gone up a lot....

Atemu ,
@Atemu@lemmy.ml avatar

While I wouldn't put it past tech bros to use such unethical measures for their latest grift, it's not a given that it's actually claudebot. Anyone can claim to be claudebot, googlebot, boredsquirrelbot or anything else. In fact it could very well be a competitor aiming to harm Claude's reputation.

Atemu ,
@Atemu@lemmy.ml avatar

Usually, fundamental rights cannot be "sold"

It's really quite perverse if you think about it.

Atemu OP ,
@Atemu@lemmy.ml avatar

Nvidia has been slowly trying to open a little over the years; first GBM support in the proprietary driver then the open OOT module and finally GSP firmwares for the kernel; allowing an OSS kernel module to exist.

The OSS graphics community has obviously shown that it doesn't want Nvidia's open module (which is tied to the proprietary driver anyways) and would rather build out its own OSS drivers atop an adapted Nouveau/NOVA. Perhaps Nvidia finally realised this?

I'm sceptical too but for now this appears to be an actually good move from Nvidia?

Atemu OP ,
@Atemu@lemmy.ml avatar

Yeah, that has been the largest pain point for all these years I heard.

Atemu OP ,
@Atemu@lemmy.ml avatar

Are you sure you replied to the correct comment?

Open source e reader ( lemmy.ml )

I recently got a Sony prs 600 e reader from 2009. The battery is at the end of its life (It lasts about 3 days with heavy reading, and a couple weeks without reading). No backlight, no Wi-Fi, just an SD card that I can load epub files and small PDFs. The screen is slow and the contrast isn't the best. The "touch screen" is the...

Atemu ,
@Atemu@lemmy.ml avatar

parents are a motor to innovation

Absolutely. No parents -> No children -> No innovation.

Atemu ,
@Atemu@lemmy.ml avatar

Pretty sure it's even inside a secure element; inaccessible to even the OS.

Do you take pictures with GPS tags on?

Hiya, so quickly wondering wether you have enabled this or not. Obviously it's not great for privacy, but it also seems very nice to have for image cloud solutions, so that images can be sorted based on location. Are there any good solutions for this? I'd like have it enabled, but also afraid of sharing images with sensitive...

Atemu ,
@Atemu@lemmy.ml avatar

I used to not but I wish I did. I want to know where pictures were taken. Photo album software like Immich can also make cool maps out of your photos this way and group photos by location.

As long as you're not sharing the pictures with anyone, there is no loss of privacy whatsoever in doing this. I don't see any reason to generally label it as "not great for privacy".

When sharing publicly, you need to be careful of course and run the images through an EXIF metadata stripper.

Atemu ,
@Atemu@lemmy.ml avatar

Why is this being downvoted? It's clearly labelled as Japanese; if you don't want to see foreign languages, filter them out.

Atemu ,
@Atemu@lemmy.ml avatar

Not that I can tell; just an explanation how df works on Linux and macOS.

Atemu ,
@Atemu@lemmy.ml avatar

Note that 1660 ti and 1060 are from an entirely different generation of product; one is Turing the other Pascal.

Linux 6.10 To Merge NTSYNC Driver For Emulating Windows NT Synchronization Primitives ( www.phoronix.com )

Going through my usual scanning of all the "-next" Git subsystem branches of new code set to be introduced for the next Linux kernel merge window, a very notable addition was just queued up... Linux 6.10 is set to merge the NTSYNC driver for emulating the Microsoft Windows NT synchronization primitives within the kernel for...

Help with HDD

I have a 4TB HDD that I use to store music, films, images, and text files. I have a 250GB SDD that I use to install my OS and video games. So far I didn't have any problem with this setup, obviously it's a bit slower when it reads the HDD but nothing too serious, but lately it's gotten way worse, where it just lags too much when...

Atemu ,
@Atemu@lemmy.ml avatar

Monitor I/O on the drive; is anything using it while your system is idle?

What's I/O like when loading an album?

Anyone know exactly what info Youtube captures from you from its browser version (and by what means)?

I know the prevailing sentiment for a long time in the privacy community has been "DAE Youtube bad?" though I have always thought that it is kinda overblown. Besides, I am using Firefox which is supposed to isolate tabs so they can't speak to each other, so I felt a small amount safer using Youtube....

Atemu ,
@Atemu@lemmy.ml avatar

Typing anything in another window that is not my browser

Which windows exactly? The apps you're typing things into might be spying on you.

M$ and their 738 parters really value your privacy, so if you're typing things into Excel...

copypasting the words "trans" and "talking"

What applications were running on your computer while you did this? Any of them could be recording clipboard history; it requires no special privilege.

Heck, I wouldn't be surprised if Windows itself was recording this and sent it to daddy M$ to train LLMs and maybe sell it as a little multi-billion side hustle.

transgender videos about "How to change your voice" start popping up in my feed. Please know I have zero interest in transgender politics/culture/anything, it is not something I have ever searched for or engaged in online.

Maybe Google knows something you don't? JK.

A more plausible explanation is that Google knows that you're in the Fediverse (ever Googled it?) which has a far above average concentration of queer people.

What is also plausible is that someone living with you (i.e. your family) or a friend is trans and you're obviously associated with them.

Google doesn't recommend queer content because they think you're queer but because it's what their data-defined statistical algorithms (""AI"") predicts you are likely to be interested in and therefore watch ads for. If you know a queer person or are often in contact with them, you are simply quite a bit more likely to be interested in queer people than the average and therefore more likely to click on queer content.

Possible that Youtube is reading my clipboard? Reading my keystrokes?

Youtube itself? Near impossible.

Other applications? Possible but likelihood unknown.

Listening to an album via VLC, while Youtube is open in my browser. Suddenly, more tracks from that album start showing up in my suggested feed. Possible Youtube is reading the titles of other apps current open on my machine? (VLC changes its active title to the name of whatever file is currently open)

Again, Youtube itself directly isn't doing anything like this. If that album is related to what you were listening to on YT or is even simply also popular with people who listed to the same things on YT as you do or are just generally similar to your person; that's all it takes for YT to attempt to show it to you.

Also note again that any application on your Windows or Linux PC can read the window titles of any other application or even simply scan your media library or other files.

Discord does this for instance for their rich presence function for instance and I would again not be surprised if there was a little multi-billion side-hustle going on.

I use Youtube all the time as my personal version of Spotify.

If you're not reliant on YT's recommendations, I'd recommend you to download the songs you want to listen to and listen to them on a local player.

Atemu ,
@Atemu@lemmy.ml avatar

Then for a day and a half after I was working on that spreadsheet, it showed up at the top of the suggested videos.

Again, which applications had access to your clipboard and user files at that time? If any of the applications running on your computer was stealing your data and selling it for financial gain, Google would likely be buying it and obviously using it against you.

You also have to consider side-channels. Were you or your friends talking about that spreadsheet project via Discord or some other known abuser? Did you talk about it with a person in your room while daddy Google or Amazon were listening? (Alexa in the room, Google assistant on your phone etc.)

in short: years of nothing, nothing, nothing, TWO DAYS OF TRANS VIDEO SUGGESTIONS, and then since, nothing, nothing, nothing.

This might simply be expectation bias. You may have been shown such suggestions in the same pattern before and simply didn't notice because, contrary to the present, the topic wasn't on your mind and simply forgot about it because you're being shown irrelevant suggested topics all the time.

Even after reading a lot of people telling me that it is just The Algo^TM^ at work, that incident seems so razor specific to activity I was simply doing on my computer at the same time Youtube was open rather than anything that could be related to my personal interests.

That's how "The Algo^TM^" works. Google gathers data on you directly through its applications, from 3rd parties selling data they stole from you and indirectly through the same process from people you associate with.
It's even possible that some data broker simply made up the fact that you're trans. Google could have then assumed it's true because you associate with trans people here. I could very well see that happen in an enshittified system such as Google.

Atemu ,
@Atemu@lemmy.ml avatar

The process for this is that you want to set your prefix to the /boot partition in the (hd1, gpt1) syntax (use ls) and then load the "normal" module. From then on, you should have regular GRUB again and should be able to boot your OS to properly fix GRUB.

Atemu ,
@Atemu@lemmy.ml avatar

It's too early to tell; you must investigate further.

Redlib: Open-source, privacy-focused frontend for Reddit without Reddit's ads, trackers, and bloat. A fork of Libreddit. ( safereddit.com )

The purpose of this post is not to endorse the use of Reddit ( https://shields.tosdr.org/en_194.svg), but rather to inform users of a privacy-friendly approach in case they need to utilize the platform....

Standard notes: what about don’t put all your eggs in one basket rule?

If the owner of the standard notes will now be a proton, doesn't that contradict this principle? I have a proton email account but I don't want it linked to my standard notes account. I don't strongly trust companies that offer packaged services like google or Microsoft....

Atemu ,
@Atemu@lemmy.ml avatar

You activated my trap card!

It's entierly based on the excellent org-mode for Emacs.

Atemu ,
@Atemu@lemmy.ml avatar

XZ is a slog to compress and decompress but compresses a bit smaller than zstd.

zstd is quite quick to compress, very quick to decompress, scales to many cores (vanilla xz is single-core only) and scales a lot further in the quicker end of the compression speed <-> file size trade-off spectrum while using the same format.

Atemu ,
@Atemu@lemmy.ml avatar

Edge is so privileged you can't remove it... well, you kinda just can't remove it..

That will have to change with the DMA becuase otherwise M$ will get ...a really big slap on the wrist or something.

Atemu ,
@Atemu@lemmy.ml avatar

internet chromesplorer

I'm stealing that.

How the xz backdoor highlights a major flaw in Nix ( shadeyg56.vercel.app )

The main issue is the handling of security updates within the Nixpkgs ecosystem, which relies on Nix's CI system, Hydra, to test and build packages. Due to the extensive number of packages in the Nixpkgs repository, the process can be slow, causing delays in the release of updates. As an example, the updated xz 5.4.6 package...

Atemu ,
@Atemu@lemmy.ml avatar

xz is necessarily in the stdenv. Patching it means rebuilding the world, no matter what you optimise.

Atemu ,
@Atemu@lemmy.ml avatar

This has nothing to do with "unstable" or the specific channel. It could have happened on the stable channel too; depending on the timing.

Atemu ,
@Atemu@lemmy.ml avatar

This blog post misses entirely that this has nothing to do with the unstable channel. It just happened to only affect unstable this time because it gets updates first. If we had found out about the xz backdoor two months later (totally possible; we were really lucky this time), this would have affected a stable channel in exactly the same way. (It'd be slightly worse actually because that'd be a potentially breaking change too but I digress.)

I see two way to "fix" this:

  • Throw a shitton of money at builders. I could see this getting staging-next rebuild times down to just 1-2 days which I'd say is almost acceptable. This could even be a temporary thing to reduce cost; quickly renting an extremely large on-demand fleet from some cloud provider for a day whenever a critical world rebuild needs to be done which shouldn't be too often.
  • Implement pure grafting for important security patches through a second overlay-like mechanism.

Email service that integrates well with Thunderbird?

I hope I'm not annoying you kind folks too much with my ongoing Tutamail woes, but, in the long slow process of divorcing myself from them (and returning to Thunderbird), I'm looking for an email host/provider that integrates well with TB, meaning that it can sync mail, contacts, calendars, and tasks between the Linux desktop...

Atemu ,
@Atemu@lemmy.ml avatar

Oh, indeed! They're under different orgs; that confused me.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • All magazines