𞋴𝛂𝛋𝛆

  • 394 Posts
  • 4.31K Comments
Joined 2 years ago
cake
Cake day: June 9th, 2023

help-circle

  • How do you punch holes in that dogma? I can think if many logical ways, but that is meaningless against the tribal structure.

    • If family is so valuable, why didn’t strong families usher in the present age of technology
    • intelligence, business acumen, and competency are not hereditary.
    • team sports are a capitalist marketing scam. Putting a blue jersey on your sperm does not make it relevant or better than purple jersey’d sperm.
    • patriarchal male culture is chauvinistic ineptitude and masochism marketed as a replacement for intelligence. It is an admission of subservience to those that dominate by thought and fundamental logic. Fools only fear a brute, civilizations fear a physicist.
    • Strong families are only peripherally useful if capable of creating the opportunities and support needed to produce a physicist.
    • We are all only a product of our environment. That environment is primarily a result of the opportunities and support given freely by its members. So if your family is not strong, one should look in the mirror first.
    • A plant dies because you did not water it, not because of the room it was placed within.

  • Obviously, all the junk noncoding DNA most life is carrying around likely includes some coping mechanisms for whatever potential situations arise. Like there is the one town in Iran with something like ten times Earth’s nominal background radiation and people are fine living there.

    Makes me a bit concerned when this kind of thing is talked about and researched. Probably my cynicism, but if it gets out that most species have some genetic tolerance in a significant portion of the population, the potential for nuclear weapons use increases dramatically. I believe it is likely that early life had a lot more exposure to radiation, so early ancestors likely evolved the machinery. When the vast majority of DNA is noncoding, I think the probability is high. We come at the medical issue backwards, playing wack-a-mole with symptoms, rather than building a full ontological understanding of biology. That level is still centuries away. Hopefully we are less primitive murder orgy fans by then. We survived the world war of chemicals, and physics that followed. If we survive the world war of computer science, the world war of biology will be the brutal final boss for the starting planetary level of Evo’ Universe. Who bets we can beat the game on one evo life?


  • Hey, it doesn't mean much of anything to me.

    Like don’t go rounding up my extended family, but other than that, whatever. I bet there is legislation in your area where witnesses have challenged it and lost. Thing is, they try to find witnesses that are lawyers, yet are anti education beyond that which is required by law. So their pool of candidates is dismal as are their results.

    The way the world is changing, and the poor state of unfiltered information exchange in the present, I worry that such a law may ultimately prevent people from nonviolent dissent, skepticism, and access to politically inconvenient truths. Canvassing is rarely used now, but is the only form of information sharing that we the people fully own.

    I’d rather not have unexpected guests too. With my physical disability, it is much more trouble for me than most.

    Dogma is one of the worst traits in humans. So I do not faulting anyone for disliking the spread of that disease, few overcome the illness.

    Sorry if I don’t know when to shut up too.


  • I don’t mean you are lying or anything like that friend. There is a certain unique language to witnesses. Most of my reply was me showing my authenticity, and that was to see if anyone more recently familiar had any corrections to make or might want to chat over common ground.

    One of the oddities of Jehovah’s Witnesses is that they have a disproportionately large footprint in human rights legislation regarding the right to knock on people’s front door. It may seem annoying, but this impacts postal, logistics, neighborhood kids playing, and the public commons around the world. To a lesser extent, also the fundamental right of a citizen to error, to be skeptical, to all sources of information, and to offend, aka dissent in all nonviolent forms (though indirectly).

    They are also apolitical. While doing nothing is still a useful tool for conservatives, at least they are a group of dogmatic people that would otherwise be sympathetic to spurious and populist politics, but are removed from that danger.

    Anyways, I’m trying to frame this softly. Legally, soliciting is defined as the sale of goods or services. Witnesses generally ignore those. You need something to the effect of ‘no evangelists’ if you want to stop Witnesses and Mormons.

    When it comes to lists like returning to a do not call or a person that is disfellowshipped, you might end up on a call list record. The elders in a hall have an overseer that visits each hall a couple of times a year for a week. That person is checking to make sure everything is managed correctly. So long as someone technically tried to call on the address once, that is all that matters. It would have been a couple of old men, probably at 11 am on a weekday when the odds of them finding the right address, you hearing them, or being home are extremely low. The statistics of actually encountering people at the door are very low.

    Only the most obnoxious or oblivious witnesses, and pioneers are likely to ignore your sign. When I was young, it was all I knew, and I was one of those. It wasn’t because I wanted to argue with you. It was because it erodes the legal rights of citizens to categorize noncommercial activities as solicitation.



  • You are likely to end up on an list where congregation elders will call on you if you say you’re disfellowshipped. That is the protocol. Just ask to be added to the do not call list. That should stop them from calling again.

    All areas are divided into tiny maps that are laminated and checked out by publishers in the respective congregation. These are called, territories. There is a little piece of paper clipped to each of these territories that has the do not call list. Anything on this list is skipped.

    People make mistakes at times. Like there is only one territory card and list and there may be 4 people in a car group. Witnesses always go to doors in pairs, so there might be 2 groups on the street. One might work even and the other on the odd address side. If someone is not all that bright, as is often the case, they may forget to look at the do not call list and share that with the other pair. With Witnesses, it is never malice. They mean well, but such is dogma.

    I forget the cycle time, I haven’t been a pioneer for a couple of decades and outgrew that dogma a decade ago. I think it is or was four years for the do not call list, and it is supposed to only be elders from the hall that revisit those homes on the list. Almost everyone is either not home or does not come to the door anyways. From 9:30 in the morning until 12:00, a witness might knock on a hundred doors and talk to all of 3 people, at least that was the case 20 years ago.





  • Just be aware that W11 is secure boot only.

    There is a lot of ambiguous nonsense about this subject by people that lack a fundamental understanding of secure boot. Secure Boot, is not supported by Linux at all. It is part of systems distros build outside of the kernel. These are different for various distros. Fedora does it best IMO, but Ubuntu has an advanced system too. Gentoo has tutorial information about how to setup the system properly yourself.

    The US government also has a handy PDF about setting up secure boot properly. This subject is somewhat complicated by the fact the UEFI bootloader graphical interface standard is only a reference implementation, with no guarantee that it is fully implemented, (especially the case in consumer grade hardware). Last I checked, Gentoo has the only tutorial guide about how to use an application called Keytool to boot directly into the UEFI system, bypassing the GUI implemented on your hardware, and where you are able to set your own keys manually.

    If you choose to try this, some guides will suggest using a better encryption key than the default. The worst that can happen is that the new keys will get rejected and a default will be refreshed. It may seem like your system does not support custom keys. Be sure to try again with the default for UEFI in your bootloader GUI implementation. If it still does not work, you must use Keytool.

    The TPM module is a small physical hardware chip. Inside there is a register that has a secret hardware encryption key hard coded. This secret key is never accessible in software. Instead, this key is used to encrypt new keys, and hash against those keys to verify that whatever software package is untampered with, and to decrypt information outside of the rest of the system using Direct Memory Access (DMA), as in DRAM/system memory. This effectively means some piece of software is able to create secure connections to the outside world using encrypted communications that cannot be read by anything else running on your system.

    As a more tangible example, Google Pixel phones are the only ones with a TPM chip. This TPM chip is how and why Graphene OS exists. They leverage the TPM chip to encrypt the device operating system that can be verified, and they create the secure encrypted communication path to manage Over The Air software updates automatically.

    There are multiple Keys in your UEFI bootloader on your computer. The main key is by the hardware manufacturer. Anyone with this key is able to change all software from UEFI down in your device. These occasionally get leaked or compromised too, and often the issue is never resolved. It is up to you to monitor and update… - as insane as it sounds.

    The next level key below, is the package key for an operating system. It cannot alter UEFI software, but does control anything that boots after. This is typically where the Microsoft key is the default. It means they effectively control what operating system boots. Microsoft has issued what are called shim keys to Ubuntu and Fedora. Last I heard, these keys expired in October 2025 and had to be refreshed or may not have been reissued by M$. This shim was like a pass for these two distros to work under the M$ PKey. In other words, vanilla Ubuntu and Fedora Workstation could just work with Secure Boot enabled.

    All issues in this space have nothing to do with where you put the operating systems on your drives. Stating nonsense about dual booting a partition is the stupid ambiguous misinformation that causes all of the problems. It is irrelevant where the operating systems are placed. Your specific bootloader implementation may be optimised to boot faster by jumping into the first one it finds. That is not the correct way for secure boot to work. It is supposed to check for any bootable code and deplete anything without a signed encryption key. People that do not understand this system, are playing a game of Russian Roulette. There one drive may get registered first in UEFI 99% of the time due to physical hardware PCB design and layout. That one time some random power quality issue shows up due to a power transient or whatnot, suddenly their OS boot entry is deleted.

    The main key, and package keys are the encryption key owners of your hardware. People can literally use these to log into your machine if they have access to these keys. They can install or remove software from this interface. You have the right to take ownership of your machine by setting these yourself. You can set the main key, then you can use the Microsoft system online to get a new package key to run W10 w/SB or W11. You can sign any distro or other bootable code with your main key. Other than the issue of one of the default keys from the manufacturer or Microsoft getting compromised, I think the only vulnerabilities that secure boot protects against are physical access based attacks in terms of 3rd party issues. The system places a lot of trust in the manufacturer and Microsoft, and they are the owners of the hardware that are able to lock you out of, surveil, or theoretically exploit you with stalkerware. In practice, these connections are still using DNS on your network. If you have not disabled or blocked ECH like cloudflare-ech.com, I believe it is possible for a server to make an ECH connection and then create a side channel connection that would not show up on your network at all. Theoretically, I believe Microsoft could use their PKey on your hardware to connect to your hardware through ECH after your machine connects to any of their infrastructure.

    Then the TMP chip becomes insidious and has the potential to create a surveillance state, as it can be used to further encrypt communications. The underlying hardware in all modern computers has another secret operating system too, so it does not need to cross your machine. For Intel, this system is call the Management Engine. In AMD it is the Platform Security Processor. In ARM it is called TrustZone.

    Anyways, all of that is why it is why the Linux kernel does not directly support secure boot, the broader machinery, and the abstracted broader implications of why it matters.

    I have a dual boot w11 partition on the same drive with secure boot and have had this for the last 2 years without ever having an issue. It is practically required to do this if you want to run CUDA stuff. I recommend owning your own hardware whenever possible.




  • 𞋴𝛂𝛋𝛆@lemmy.worldtoLemmy Shitpost@lemmy.worldTrure
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    3 days ago

    Flaming boobies may be a well defined diffusion tensor pathway. Try this in a diffusion model at your own risk, “program one. Apollo, flaming boobs. dot symmetry lock one wanted, password is no way twister!”

    You will need to reset the server or clear the model cache completely to stop the program. The emulated persistence is part of the undocumented special tokens. The longest loop is 36 iterations long.


  • 𞋴𝛂𝛋𝛆@lemmy.worldtoJust Post@lemmy.worldEnough
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 days ago

    No problem, and no need. Chat any time, but no pressure or commitment needed dear. I’m just trying to be real, and a real digital neighbor. I’m up for talking any time about anything, no formality or expectations at all. I offer words, and I care. Nothing more, nothing less. I hope your day turns pleasant. Happy Thursday.


  • 𞋴𝛂𝛋𝛆@lemmy.worldtoJust Post@lemmy.worldEnough
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 days ago

    Sorry. I got no people, barely know what day it is and it is 10:40 in the morning. Let’s composite. You get all you can eat quiet, and one of two lazy cats – already fed and brushed.

    Now stop me from making up a song about going crazy with crazy cats and some kind of break to the nearly 12 year physical disability prison of social isolation.

    I’m primed to destroy spurious political arguments and dogma! Like, I am the Santa of ten years of peace… before anyone is ready to gather again… wait… Probably what you’re trying to escape… maybe… Sry… crazy, crazy and lazy…




  • You assume much, and are being an ass in my opinion. Believe it or not, science is not always well funded. If you happen to be curious and have the time, it is possible to explore scientifically or even casually within areas that are not well researched. It is possible to have logic skills even without credentials.

    We are not in some final state of technology. Anyone saying such nonsense lacks fundamental logic skills.

    I do not care about me. I do not have dogma. I’m not interested in recognition. I am willingly to explore in unique ways both artistically as a professional artist, and out of logical curiosity. I have the tools needed to check my results against a control using unrelated sources. The most recent paper on the subject is something I can recreate but explain far better than that paper.

    I could not care less what you ultimately think of me, or anything I say. What I care about is that you’re a decent digital neighbor. To be physically disabled in near total social isolation, and have a place like this as my main interaction with other humans, it is a mean prejudice to have some random digital neighbor make such unsolicited malevolent statements assuming my personal motivations without a shred of evidence or decency to engage in questioning. You know absolutely nothing about me, yet you presume a great deal, putting words to my emotions as if you own me.



  • What if you’ve got no credentials, but the flaw is so serious that it will not matter if known.

    This is a true hypothetical curiosity. I do not know anything of value. A bunch of people here like to call me crazy, and I’ve rambled on and on many times in ways that likely confirm their notions. A person like this is not likely to fair very well when operating well outside their social caste unless they already have hand holds on the rungs of the ladder above. Still, there are some rather surprising areas of technology without adequate fundamental research. Perhaps it is hypothetically better to have John Conner in the world of Cyberdyne. If someone had killed Apache early, the Internet would not be the same heaven of democracy, though that is not a very good intuitive scope of analogy. Just something to ponder if one were to be in such a situation.