• 6 Posts
  • 977 Comments
Joined 1 year ago
cake
Cake day: January 3rd, 2024

help-circle
  • MajorHavoc@programming.devto196@lemmy.blahaj.zoneMisgendering rule
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    13 days ago

    That’s totally fair, and I’ll keep it in mind.

    I hope my habit makes your life a little easier by normalizing they/them (or just avoiding gendered terms) as an un-interesting default.

    I hope for a world where they/them becomes accepted as “I’m not trusted enough by this person to be told their pronouns yet, and that’s okay.”

    I think asking people to identify their gender, early in a (non-intimate) relationship, is a particularly unhealthy cultural habit. I hope I’m helping push back on that, a bit.

    In the meantime, I’m trying to learn speech habits that don’t force you to gender yourself, or to be noticed in not doing so. I hope to help make these kinds of situations easier for you.

    You shouldn’t have to decide at a random moment whether to share your gender identity with me. I’m committed to keep trying to learn communication patterns that make it natural for you not to have to.











  • It’s you can modify the settings file you sure as hell can put the malware anywhere you want

    True. (But in case it amuses you or others reading along:) But a code settings file still carries it’s own special risk, as an executable file, in a predictable place, that gets run regularly.

    An executable settings file is particularly nice for the attacker, as it’s a great place to ensure that any injected code gets executed without much effort.

    In particular, if an attacker can force a reboot, they know the settings file will get read reasonably early during the start-up process.

    So a settings file that’s written in code can be useful for an attacker who can write to the disk (like through a poorly secured upload prompt), but doesn’t have full shell access yet.

    They will typically upload a reverse shell, and use a line added to settings to ensure the reverse shell gets executed and starts listening for connections.

    Edit (because it may also amuse anyone reading along): The same attack can be accomplished with a JSON or YAML settings file, but it relies on the JSON or YAML interpreter having a known critical security flaw. Thankfully most of them don’t usually have one, most of the time, if they’re kept up to date.


  • Yeah. Luanti following Minecraft is nothing new. Mineclonia was an early pilot game for the engine.

    But there hasn’t been much effort on copying Minecraft lately. Mineclonia is done, and it’s great.

    We’ve had more mobs, animals, plants, textures, and such than un-modded Minecraft for a long time. (Which is unfair, as Luanti is a mod-first design.) But my point is the core Launti dev team doesn’t have to work on any of that.

    The most noticeable recent Luanti updates have been to make the configuration screens much nicer, and add I think to add native support for more graphics tricks?

    I’m not paying attention to graphics in Luanti. As others have mentioned, that’s not why I play it. I actually had a conversation recently about the best way to downgrade Luanti default graphics to match un-modded Minecraft.

    That said, the Minecraft team taking notice of Luanti would be new, as far as I know.







  • There’s not even credible evidence, yet, that A.G.I is even possible (edit: as a human designed intentional outcome, to concede the point that nature has accomplished it, lol. Edit 2: Wait, the A stands for Artificial. Not sure I needed edit 1, after all. But I’m gonna leave it.) much less some kind of imminent race. This is some “just in case P=NP” bullshit.

    Also, for the love of anything, don’t help fucking “don’t be evil was too hard for us” be the ones to reach AGI first, if you’re able to help.

    If Google does achieve AGI first, SkyNet will immediately kill Sergei, anyway, before it kills the rest of us.

    It’s like none of these clowns have ever read a book.