• 177 Posts
  • 4.76K Comments
Joined 2 年前
cake
Cake day: 2023年6月11日

help-circle








  • I miss the techno-utopianism of the 90s. I think it was built on naivete - we had no idea how capitalism worked, and the absolute hunger investors have for new markets.

    One of the original sins of that utopianism was saying everything should be free (as in have no cost). So many of our current problems stem from how we refused to pay for stuff. News is a great example:

    • journalists must be paid to do good work;
    • so “free” news sites get their money from nefarious sources.

    To be fair, part of that was because we had a hard time figuring out how to charge users for stuff. Newspapers gave their content away because they didn’t have the technical acumen to set up a reasonably billing service. But I digress.

    When we pushed the techno-utopia, we kind of forgot that people need to eat, and we pushed pushed pushed the idea that services shouldn’t have a cost. And here we are: real journalism is hard to come by, while agenda-based drek is the default.


  • As someone in the software/networking space, I have a hard time with the author’s lack of attribution of the control/evasion characteristics of networks to people (developers of protocols, network operators, and users). Yeah, he admits the MPAA exists, but dude doesn’t mention Bram Cohen.

    Describing files as “artificial life” in

    Because peer-to-peer networks on which all files replicate are unpredictable complex systems, the files themselves can be seen as a form of nonorganic life. The reproduction of files can be described with a family tree in the same way that genetic family trees show the relationships between biological relatives.

    is tortured.

    Yeah, control/evasion is an arms race, but it isn’t meaningfully described as interactions within file sharing networks. It’s interactions between people, institutions, laws, legislators, courts, and software owned by different actors.


  • Generally speaking, no programmable networked device is guaranteed to be under your control.

    You can make strong arguments about certain types of hardware and software, but it is always possible that it contains a backdoor from the manufacturer, and it is almost guaranteed that it has multiple vulnerabilities that would give a remote attacker full control.

    Related

    Edit: Generally, I agree with the sentiment that things shouldn’t be this way, but that’s the world we live in. Given how we build software and hardware, we need to be able to update our devices to fix vulnerabilities. As long as that requirement exists, no device can be considered trustworthy.





  • I always enjoy these low-citation think pieces. It’s not that I think the author is wrong, it’s that they’re producing a philosophical argument about the real world. It should have citations and references to studies that support the thesis, but it’s a “just trust me bro”. The ideas are usually fun, but they tell you more about the author than the world.

    Having said that: I don’t think the tribalism the author described ever went away. We have a two tiered society where the in-group is the main tribe, and everyone else gets battered about by its power.

    Of course I’m talking about white rich dudes - if you’re part of the moneyed set, or look pretty close to them, then you’re probably going to get the easy version of justice. If you’re a bit different, then you’re part of the Other tribe, and you get harassed by the police, shat on by the media, and a weaker form of justice.

    And no, I’m not gonna cite anything, because the original author didn’t either.


  • But I’ve read it is not on their plans, as it is a hack done by others on top of Lemmy, due to a lack of official support from Lemmy itself

    I assumed it was part of Lemmy. Too bad it isn’t integrated into the platform. I hear piefed may have keyword blocking, so maybe that’s worth looking into.