

Ah, the grand circle of enshittification.
Ah, the grand circle of enshittification.
You’ve fallen for one of the classic blunders!
TPM was known to be a DRM Trojan horse in 2004. Then everyone forgot about that fact.
Sure, pushing Linux is just a new angle, but don’t think for a second that TPM has any purpose other than making your own computer trust a cabal of corporations over you, the owner. And if there is a critical mass of TPM standardized hardware, such that a “trusted” environment is the standard, it will lock you out of major use cases on all “untrusted” systems, including Linux.
And that deserves a lot of outrage.
Tech execs when the shortage hits: I just had a brilliant idea! Let’s just give untrained junior vibe-coding engineers the power of senior engineers, and even more AI tools. Problem solved forever, bonus please!
Oh, disagreeing with the post, huh? Looks like we found the AI troll, get 'em everyone!
I’m sure you are not one of the problem hosts, but his will harm the renters more because they’re the ones already subject to the bigger power imbalance - by definition not near their home and relying on Airbnb to ensure a safe place to stay - and Airbnb is reputed to be pro-host against renters.
For example, there was a trip to Europe where a host physically threatened us in writing, Airbnb kept transferring us around rather than offer any solutions, we left for our safety, the host claimed we didn’t cancel and owed the full stay, Airbnb took the host’s side without evidence despite our evidence of their threat in writing, we did a chargeback, and Airbnb disputed it for 4 months in apparent bad faith.
Anecdotal, but a case study why black-holing renters’ contacts seems more damaging.
Attention is invisible until you take the time to acknowledge it. People will never treat it as a resource of the same value as these companies, because they don’t even recognize it as something being taken away from them (despite that it is actually the most precious resource - our literal lives), and that disparity will always be profitable.
OpenAI recently updated ChatGPT to be able to reproduce images in a specific style, and a lot of people posted Ghibli-style versions of things. So all of a sudden, it’s a big deal.
The future is great!
They’re still a corporate entity, and they still want access to markets to make money.
The great taste of Ovaltine, of course!
“Free TV” means “TV paid for with your time and attention.”
Know what else pays you for your time and attention? Your job. We can quibble about how hard work it is to watch ads, but that is what’s happening: you’re just working, bartering and using up irreplaceable portions of your life with inevitable unavoidable ads, when you use these free TV services.
Yep. “My draconian DRM loosened the straight jacket a little.”
Yayyy.
Thanks, I didn’t see this, there was a different embedded FAQ that didn’t have the specific Q & A below.
But, if anything, it seems to confirm the ad itself is just legitimately clicked from the user’s IP address and hidden from the user, and that there is code execution protection, but not that there is any privacy protection? It’s still very ambiguous.
How does AdNauseam “click Ads”?
AdNauseam ‘clicks’ Ads by issuing an HTTP request to the URL to which they lead. In current versions the is done via an XMLHttpRequest (or AJAX request) issued in a background process. This lightweight request signals a ‘click’ on the server responsible for the Ad, but does so without opening any additional windows or pages on your computer. Further it allows AdNauseam to safely receive and discard the resulting response data, rather than executing it in the browser, thus preventing a range of potential security problems (ransomware, rogue Javascript or Flash code, XSS-attacks, etc.) caused by malfunctioning or malicious Ads. Although it is completely safe, AdNauseam’s clicking behaviour can be de-activated in the settings panel.
Yeah, I can’t find an answer whether the “click” is behind some obfuscation, or if the “click every ad” is the obfuscation step itself by attempting to poison the data. The latter may work but yes, may actually increase tracking. Wish that answer wasn’t so hard to find on their site.
The woman left the house before 13News arrived. She returned just after noon accompanied by a lawyer. The group of ten or so investigators left a few minutes later.
So the FBI were in there, the woman left and came back with a lawyer, and then almost immediately the FBI left. Boy, that doesn’t sound at all like they were conducting an illegal search.
“Whoops, we pushed to prod and have no backups. Sorrryyyy!”
I mean, when you collapse that logic you’re effectively saying random is the same thing as non-deterministic. But they’re different things, because even if an infinitesimally exact moment in time may “always” produce the same result, because the arrow of time only points in one direction, no such deterministic result can ever be replicated, and if the result cannot be replicated, then what is the difference from random?
Yup, the entire culture of Google has nearly changed. It used to be coder- and innovation-driven, and open-source was a natural thing to support. Make more money by growing the pie, creating markets with new tech.
Now it seems it’s middle managers and MBAs calling the shots, and their strategy is generic business zero-sum mindset - lock down, restrict, extract. They still see the PR value in open-source, but that’s it.
Just becoming 1990s Microsoft or 1980s IBM.