Chat På Svenska, developed by OpenAI, is a powerful language model based on the GPT-4 architecture. It has been designed to understand and generate human-like text, making it an invaluable tool across various domains. This comprehensive guide will delve into the capabilities, applications, limitations, and future potential of...
ChatGPT Svenska Online, developed by OpenAI, is a powerful language model based on the GPT-4 architecture. It has been designed to understand and generate human-like text, making it an invaluable tool across various domains. This comprehensive guide will delve into the capabilities, applications, limitations, and future...
Hi all, the private school I work at has a tonne of old windows 7/8 era desktops in a student library. The place really needs upgrades but they never seem to prioritise replacing these machines. Ive installed Linux on some older laptops of mine and was wondering if you all think it would be worth throwing a light Linux distro on...
As long as you can secure them it should be fine, and as long as you can deal with the user account issues. You’ll either need to join them to your Windows domain or explain to people why they can’t use their normal username and password. You’ll probably find the kids understand it better than the teachers.
Using Ublock picker (not zapper) you can block/allow elements per domain and save/revert your choices. But overall, like I already said, I agree with you that umatrix offered a more granular and easy approach. It would be nice to see that implemented in Ublock. I nonetheless understand why it’s not the case since it would benefit only few users and may scared most of the others.
Hopefully umatrix will work for you for a long time. For me it was not and that’s how I discovered Ublock and adapt to its “limitations”. On a daily basis it helps me browse the internet like umatrix did. It’s just sad that umatrix was not forked.
I have to use Windows at work. Fortunately I’m a domain admin. I’ll be disabling this shit with conventional methods, and also write a scheduled task script to whack the SQLite DB…or whatever it takes to nuke it from orbit.
For home users, there are tools like NTLite that let you create custom installation images for Windows. Hopefully those will be able to remove it completely.
W11 even enterprise users are all tied into autopilot, Intune MDM, and/or a microsoft account
The “win 11 business editions 23h2” iso that I got from visualstudio.com yesterday, did no more than the usual amount of crap to make it difficult to find the “join a domain instead”, allowing me to make a local user.
I’ve seen many instances of some software having DRM that significantly degrades the performance of the software, or worse, the performance of the entire OS due to heavy background tasks. Prime examples include Denuvo and all those Adobe background processes. Why can’t they just simply use the TPM or the other 5 security...
Perhaps this is a matter of nomenclature, but I wouldn’t have thought that enforcing a ban is part of what anti-cheat software is meant to do. Sure, the anti-cheat is what alerts the game server, and then the server bans either the account or the actual machine. But the OP’s question was about anti-cheat and DRM software that impacts system performance. Someone that’s been banned from a game will not have in-game performance issues, because they’re not able to play the game at all.
I don’t think my omission of a TPM-based ban makes my answer “not entirely true”. I stand by my statement that TPMs are not suitable for the anti-cheat or DRM functionality when a game is running, and would not solve any performance issues if they were.
With that out of the way, yes you’re right that the TPM can be used for other, ancillary purposes. The typical use is to securely store certificates uniquely issued to a machine, such that the bearer of the certificate must be the certificate’s rightful owner. This is sometimes used to authenticate to corporate VPNs or Windows AD domains. But these certificates can be replaced, which makes them useless for enforcing a ban on a particular machine.
But TPMs also have a built-in, static certificate from when they were manufactured, which can only be challenged/responded using tokens from that manufacturer. If a game maker wants to coordinate with various TPM or mobo manufacturers to achieve that level of security, they’re certainly welcome to do so. But it also alienates users who don’t have or refuse to own such hardware, exactly as you’ve described. It’s a business decision, what they choose to do. Expedited manual review for broken TPM users is still fraught with issues, since there’s now an incentive to brick your own TPM and get a second chance at cheating.
There’s no free lunch in building secure systems, and that’s why anti-cheat makers will always face the uphill battle.
I’m having to register to Lemmy directly now, when I’m used to posting from KBin’s instance. But now the errors is getting so bothersome that I can’t even surf around currently on it. The 50x error comes up after everytime I post somewhere, like make a thread....
There is no such thing. There are a ton of smaller players besides MS and Google. Just as an example: I’ve been a migadu.com customer for years, paying $19/year for a couple of very important domains.
you were unable to grow (the mirror instances)
I was. It was so successful that there were people complaining about it, because they felt they were feeling tricked by it.
If they can’t even be arsed enough to create a login in order to make a community
You are missing one thing. The topic-specific instances are not open for registration. I do not want it to be a home of users, I want it to be the home of communities. This is based on the idea that your identity should not be tied to the domain.
It’s not because I like basketball that I’d ever want to have an @nba.space account. It’s not because you like to self host that your identity should be reduced to a selfhosted.forum domain, etc.
This is the gist of the “Federation and Identity” post. The things that I am working on will hopefully make it clearer, but for now suffice to say that the reason that people can not create communities on their own is because they are closed for registration and this is by design.
There is no such thing. There are a ton of smaller players besides MS and Google. Just as an example: I’ve been a migadu.com customer for years, paying $19/year for a couple of very important domains.
Heh, I just joined Migadu this week. But that aside, maybe duopoly is the wrong word. But last I checked there’s two major players and then a bunch of minnows and if you tried to spin up a self hosted email today, your emails would likely get bounced.
You are missing one thing. The topic-specific instances are not open for registration. I do not want it to be a home of users, I want it to be the home of communities. This is based on the idea that your identity should not be tied to the domain.
They go hand in hand. But let’s see how that changes with the third-party login work the Lemmy developers are working on.
It’s not because I like basketball that I’d ever want to have an @nba.space account. It’s not because you like to self host that your identity should be reduced to a selfhosted.forum domain, etc.
Indeed, but I liked self hosting enough to make an account on libretechni.ca even if I don’t use the account for much.
People don’t go to a pub to talk around specific topics and interests
Never been to a pub? 😂
Sorry, we are not going to agree on this. Fragmenting groups for the sake of it serves no purpose other than keeping some misguided notion of “ownership”.
Different pubs have different customers and atmospheres, despite both selling beer.
Third-party login is not going to change the fact that Lemmy servers (like every other server on Activity pub nowadays) connect the user identity to the server domain. It will maybe save people from creating yet another password, but that is about it.
Never been to a pub?
Have you been to any pub where the conversation goes around one specific topic and there are moderators to make sure the conversation stays within its guidelines? I surely haven’t.
domain based blocking systems are nice for a base level of ad removal, they do nothing if the ads are coming from the same domain. sponsorblock is nice, but it’s the work of volunteers to remove those ads - if youtubes userbase were splintered over thousands of apps it wouldn’t be feasable.
i don’t know when i have seen just text-based ads in the last 10 years. those are an non-issue, even for me. the issues are scripts, user profiling and tracking.
the big difference is: the browser gives webpages/apps a standardized environment where the user has the last word regarding what runs on it or not (if you are not using chromium anyway). in apps, the user doesn’t have that luxury, especially regarding tracking and profiling.
So my company decided to migrate office suite and email etc to Microsoft365. Whatever. But for 2FA login they decided to disable the option to choose “any authenticator” and force Microsoft Authenticator on the (private) phones of both employees and volunteers. Is there any valid reason why they would do this, like it’s...
reasons why restricting users to MS Authenticator would be preferable
As a security professional:
Under most situations, it is equally as good as any other 2FA app.
Within the Microsoft ecosystem, it provides additional security features above and beyond simple 2FA.
If your workplace is leaning heavily on the Microsoft ecosystem, especially their cloud offerings like Azure, then restricting employees to the Microsoft app is a no-brainer, and actually quite reasonable.
For example, if they happen to have a hybrid domain with an on-prem domain controller syncing with Azure (forgive me for using obsolete terms, I’m a greybeard), then they can control all access to all company assets, including 2FA. If an employee leaves the company, they can also disable the Microsoft app at a moment’s notice by disabling the employee’s Microsoft account. Because everything is hooked into Azure, it sends push notifications down to all company assets - like the Microsoft 2FA app - to unhook all of the company’s credentials and prevent employee access after the fact.
I moved off a Synology NAS to a self-managed machine and one thing I still struggle to replace is something like a synology drive. Here are my requirements:...
I don’t have a full answer to snapshots right now, but I can confirm Nextcloud has VFS support on Windows. I’ve been working on a project to move myself over to it from Syno drive. Client wise, the two have fairly similar features with one exception - Nextcloud generates one Explorer sidebar object per connection, which I think Synology handles as shortcuts in the one directory. If prefer if NC did the later or allowed me to choose, but I’m happier with what I got for now.
As for the snapshotting, you should be able to snapshot the underlying FS/DB at the same time, but I haven’t poked deeply at that. Files I believe are plain (I will disassemble my nextcloud server to confirm this tonight and update my comment), but some do preserve version history so I want to be sure before I give you final confirmation. The Nextcloud root data directory is broken up by internal user ID, which is an immutable field (you cannot change your username even in LDAP), probably because of this filesystem.
One thing that may interest you is the external storage feature, which I’ve been working on migrating a large data set I have to:
can be configured per-user or system-wide
password can be per-user, system-wide, or re-use the login password on the fly
data is stored raw on an external file server - supports a bunch of protocols, off hand SMB, S3, WebDAV, FTP
shows up as a normal-ish folder in the base user folder
can template names, such as including your username as part of the share name
Nextcloud does not independently contribute versioning data to the backend file server, so the only version control is what your backing server natively implements
I use LDAP user auth to my nextcloud, with two external shares to my NAS using a pass-through session password (the NAS is AD joined to the same domain as Nextcloud uses for LDAPS). I don’t know if/how the “store password in database” option is encrypted, but if anyone knows I would be curious, because using session passwords prevents the user from sharing the folder to at least a federated destination (I tried with my friend’s NC server, haven’t tried with a local user yet but I assume the same limitations apply). If that’s your vibe, then this is a feature XD.
One of my two external storage mounts is a “common” share with multiple users accessing the same directory, and the second share is \nas.example.com\home\nextcloud. Internally, these I believe is handled by PHP spawning smbclient subprocesses, so if you have lots of remote files and don’t want to nuke your Nextcloud, you will probably need to increase the PHP child limits (that too me too long to solve lol)
That funny sub-mount name above handles an edge case where Nextcloud/DAV can’t handle directories with certain characters - notably the # that Synology uses to expose their #recycle and #snapshot structures. This means that remote mount to SMB has a limitation at the moment where you can’t mount the base share of a Synology NAS that has this feature enabled. I tried a server-side Nextcloud plugin to try to filter this out before it exposed to DAV, but it was glitchy. Unsure if this was because I just had too many files for it to handle thanks to the way Synology snapshots are exposed or if it actually was something else - either way I worked around the problem for now by not ever mounting a base share of my Synology NAS. Other snapshot exposure methods may be affected - I have a ZFS TrueNAS Core, so maybe I’ll throw that at it and see if I can break Nextcloud again :P
Edit addon: OP just so I answer your real question when I get to this again this evening - when you said that Nextcloud might not meet your needs, was your concern specifically the server-side data format? I assume from the rest of your questions that you’re concerned with data resilience and the ability to get your data back without any vendor tools - that it will just be there when you need it.
Without knowing how, not really. If it’s a massive multi-device botnet, like Mirai, for example, that’s millions of indvidual devices across millions of addresses, so it isn’t so simple as just blocking a domain. Trying to block all of them might well just block legitimate users.
Request limits also wouldn’t work if it’s millions of devices making a few requests at once, and an overall limit would have a similar locking-out effect as blocking everything. Especially if the DDoS is taking up most/all of that limit.
I often read suggestions to use something like Tailscale (…) safer than opening a port for WireGuard (WG)
I guess someone is trying really hard to upsell Tailscale there. But anyways it all comes down to how you configure things, Tailscale might come with more sensible defaults and/or help inexperienced user to get things working in a safe way. It also makes it easier to deal with the dynamic address at home, reconnects and whatnot.
Specifically about Wireguard, don’t be afraid to expose its port because if someone tries to connect and they don’t authenticate with the right key the server will silently drop the packets. An attacker won’t even know there’s something listening on that port / it will be invisible to typical IP scans / will ignore any piece of traffic that isn’t properly encrypted with your keys.
f my VPS is compromised, wouldn’t the attacker still be able to access my local network? How does using an extra layer (the VPS) make it safer?
The extra layer does a couple of things, the most important might be hiding your home network IP address because your domains will resolve the VPS public IP and then the VPS will tunnel the traffic to your network. Since your home IP isn’t public nobody can DDoS your home network directly nor track your approximate location from the IP. Most VPS providers have some security checks on incoming traffic, like DDoS detection, automatically rate limit requests from some geographies and other security measures that your ISP doesn’t care about.
Besides that, it depends on how you setup things.
You should NOT have a WG tunnel from the home network to the VPS with fully unrestricted access to everything. There should be firewall rules in place, at your home router / local server side, to restrict what the VPS can access. First configure the router / local VPN peer to drop all incoming traffic from the VPN interface, then add exceptions as needed. Imagine you’re hosting a website on the local machine 10.0.0.50, incoming traffic from the VPN interface should only be allowed to reach 10.0.0.50 port 80 and nothing else. This makes it all much more secure then just blunt access to your network and if the VPN gets compromised you’ll still be mostly protected.
I was confused as these two person are on different sub-domains of bsky.social (url after the @ symbol). Does this mean they are on different instance? AFAIK most mastodon server I see have different domain (specifically, different combination of top level domain and second level domian).
EDIT: I see, theur user name is the subdomain, and things before @ is their display name. Not the most conventional system, but it makes sense.
Allegedly. Also he registered the domains in his personal name and directly connected his bank accounts to the bitcoin transaction out of the system.
Probably most lemmy users are engaging in better opsec than this guy is. And it took them years to bust the guy. Just goes to show you that crime pays but botany doesn’t.
Is it just me or are many independent search engines down? Duckduckgo, my go to engine, qwant, ecosia, startpage… All down? The only hint I got was on the qwant page…...
I was thinking about this and imagined the federated servers handling the index db, search algorithms, and search requests, but instead leverage each users browser/compute to do the actual web crawling/scraping/indexing; the server simply performing CRUD operations on the processed data from clients to index db. This approach would target the core reason why search engines fail (cost of scraping and processing billions of sites), reduce the costs to host a search server, and spread the expense across the user base.
It also may have the added benefit of hindering surveillance capitalism due to a sea of junk queries from every client, especially if it were making crawler requests from the same browser (obviously needs to be isolated from the users own data, extensions, queries, etc). The federated servers would also probably need to operate as lighthouses that orchestrate the domains and IP ranges to crawl, and efficiently distribute the workload to client machines.
DATE:
May 22, 2024 at 12:00PM
.
TITLE:
No gender bias in voter reactions to political flip-flopping, study finds
.
URL: https://www.psypost.org/no-gender-bias-in-voter-reactions-to-political-flip-flopping-study-finds/
<p>A recent study published in the <a href="https://doi.org/10.1017/XPS.2024.4"><em>Journal of Experimental Political Science</em></a> investigates the impact of political repositioning on candidate evaluations, focusing on whether gender influences these perceptions. Conducted in Flanders, the research finds that politicians who frequently change their policy stances are viewed less favorably by the public, regardless of gender.</p>
<p>The motivation behind this study stems from the dual expectations placed on political parties. On one hand, parties are expected to maintain clear, stable policy positions, which fosters trust and ideological clarity. On the other hand, parties need to be responsive and adaptable to changing public opinions and circumstances.</p>
<p>Previous research has shown that changing policy stances, known as repositioning, can damage a politician’s reputation. However, it remained unclear if this reputational cost is gendered. Given that female politicians are often perceived as more honest and reliable, the study hypothesized that women might face harsher judgment for changing their positions, potentially violating these positive stereotypes.</p>
<p>“I became interested in the consequences of party repositioning for party reputations because there seems to be tension between two core elements of political representation,” said study author <a href="http://www.mauritsmeijers.eu" target="_blank" rel="noopener">Maurits J. Meijers</a>, an assistant professor of political science at Radboud University in Nijmegen.</p>
<p>“On the one hand, we want parties to have clearly identifiable policy profiles. We want to know what parties stand for and we want parties to be committed to their ideological beliefs. This would require parties to be steadfast in their policy positioning.”</p>
<p>“At the same time, we want parties to be responsive to public opinion. Wlezien and Soroka’s <a href="https://www.cambridge.org/core/books/degrees-of-democracy/CCFD6A2271BA1E5C7C9D02ADB3E4A409" target="_blank" rel="noopener">thermostatic model of representation</a> posits that parties should adapt their positioning in line with public opinion. Moreover, we want parties to be flexible enough to adjust their positions when political or economic circumstances change. This would require parties to have considerable leeway in their policy positioning.”</p>
<p>“My project ‘Credible’ or ‘Capricious’? The Reputational Cost of Party Policy Change funded by the Dutch Research Council addresses how citizens evaluate this trade-off between stable and credible positioning vs. flexibility.”</p>
<p>“The present study addresses this question from the perspective of gendered candidate evaluations. We know from research on gendered evaluations of politicians that female politicians are considered to be more sincere and honest. Political psychology work on repositioning has shown that when politicians change their positions people believe these politicians to be less sincere and honest.”</p>
<p>The participants were recruited from a Flemish panel of users of the “Election Compass,” a voting advice application. The final sample included 6,957 respondents, although it was initially intended to be 4,000, with quotas for age, gender, and education to ensure representativeness.</p>
<p>The experiment had a 2×2 factorial design, manipulating two variables: the gender of the candidate (male or female) and the frequency of their policy position changes (frequent or infrequent). Participants were shown a simulated news report about a candidate’s performance, including a photo and first name to indicate gender, and information about their tendency to change positions on key issues such as childcare, climate policy, and immigration policy.</p>
<p>The repositioning scenario indicated that the candidate frequently changed positions on three issues: childcare, climate policy, and immigration policy. These issues were selected to cover a range of stereotypically feminine and masculine domains. Participants rated the candidates on overall evaluation, perceived trustworthiness, honesty, decisiveness, competence, and voting intention.</p>
<p>The study revealed that candidates who frequently changed their policy positions were evaluated less positively than those who did so infrequently. This negative perception extended to trustworthiness and voting intentions. Candidates who frequently repositioned were viewed as less honest, decisive, and competent.</p>
<p>“My study – a vignette survey experiment conducted in Flanders, Belgium – found that politicians who frequently change their positions are trusted less and are punished electorally,” Meijers told PsyPost. “Flip flopping politicians are also seen as less honest and competent. The largest effect was for decisiveness: flipflopping politicians are perceived to be less decisive.”</p>
<p>Contrary to the initial hypothesis, the data showed no significant difference in the negative impact of repositioning based on the candidate’s gender. Both male and female candidates who frequently changed positions were evaluated similarly, suggesting that gender stereotypes did not significantly influence these evaluations in the context of Flanders.</p>
<p>“I was surprised to see the lack of a gendered effect,” Meijers said. “Especially in light of <a href="https://link.springer.com/article/10.1007/s11109-017-9423-7" target="_blank" rel="noopener">previous evidence</a> of the effects of stereotype violations provided by Erin Cassese and Mirya Holman.”</p>
<p>“It is possible, however, that the negative effects of stereotype violations for female politicians were cancelled out by stereotype violations for male politicians. Male politicians are stereotypically seen as more decisive, and repositioning politicians were punished most for decisiveness. That said, I did not see gender differences in the evaluations of any of the traits.”</p>
<p>Meijers conducted several robustness checks, including post-stratification weights to address sample representativeness and control for attentiveness. These checks confirmed the initial findings, reinforcing that frequent repositioning carries a reputational cost, but this cost does not vary significantly between male and female candidates.</p>
<p>But the study includes some caveats to consider. For instance, it was conducted in Flanders, a region with stringent gender quotas and relatively low levels of gender stereotyping in politics. These contextual factors may limit the generalizability of the findings to other regions with different political dynamics and levels of gender stereotyping.</p>
<p>Future research could address these limitations by replicating the study in different political contexts, including regions with higher levels of gender stereotyping and different electoral systems. Further studies could also explore the impact of repositioning on specific policy issues perceived as stereotypically masculine or feminine, as well as investigate how explicit activation of gender stereotypes during campaigns influences voter evaluations.</p>
<p>“In the medium-term, there are still a couple of studies from the Dutch Science Council project in the pipeline,” Meijers said. “With Ruth Dassonneville (University of Montreal), I have conducted a study in which individual characteristics explain whether citizens believe repositioning to be legitimate in a representative democracy. With Mariken van der Velden (Free University Amsterdam), I have studied how voters respond to compromises made during coalition negotiations. Lastly, I have conducted a survey experiment in three countries to see how issue ownership and affective polarization affect citizens’ evaluations of position changes.”</p>
<p>“In the longer term, I want to continue this line of research, which studies how the political behaviour of political elites affect citizens’ trust in and commitment to democracy. For instance, I am currently working on a project to see how citizens perceive lying politicians and how this affects their views on democracy.”</p>
<p>The study, “<a href="https://www.cambridge.org/core/journals/journal-of-experimental-political-science/article/way-she-moves-political-repositioning-and-gender-stereotypes/D4A8F1403538830E0070D9AB68A8DBA8">The Way She Moves: Political Repositioning and Gender Stereotypes</a>,” was published online on April 25, 2024.</p>
Hosting a public wishlist
I’m involved with an org that needs to set up a public wishlist for supplies for a project. The rough requirements are as follows:...
Exploring the Capabilities of ChatGPT: A Comprehensive Guide (chatgptsvenska.org)
Chat På Svenska, developed by OpenAI, is a powerful language model based on the GPT-4 architecture. It has been designed to understand and generate human-like text, making it an invaluable tool across various domains. This comprehensive guide will delve into the capabilities, applications, limitations, and future potential of...
Exploring the Capabilities of ChatGPT: A Comprehensive Guide (chatgptsvenska.org)
ChatGPT Svenska Online, developed by OpenAI, is a powerful language model based on the GPT-4 architecture. It has been designed to understand and generate human-like text, making it an invaluable tool across various domains. This comprehensive guide will delve into the capabilities, applications, limitations, and future...
Linux on old School Machines?
Hi all, the private school I work at has a tonne of old windows 7/8 era desktops in a student library. The place really needs upgrades but they never seem to prioritise replacing these machines. Ive installed Linux on some older laptops of mine and was wondering if you all think it would be worth throwing a light Linux distro on...
What’s the best ad blocker for you? - Firefox Add-ons Blog (addons.mozilla.org)
Windows Recall demands an extraordinary level of trust that Microsoft hasn’t earned | Op-ed: The risks to Recall are way too high for security to be secondary (arstechnica.com)
Microsoft has blocked the bypass that allowed you to create a local account during Windows 11 setup by typing in a blocked email address (www.tomshardware.com)
Why does DRM consume vast system resources even though we have TPM, Pluton, etc.
I’ve seen many instances of some software having DRM that significantly degrades the performance of the software, or worse, the performance of the entire OS due to heavy background tasks. Prime examples include Denuvo and all those Adobe background processes. Why can’t they just simply use the TPM or the other 5 security...
Can someone take over KBin?
I’m having to register to Lemmy directly now, when I’m used to posting from KBin’s instance. But now the errors is getting so bothersome that I can’t even surf around currently on it. The 50x error comes up after everytime I post somewhere, like make a thread....
Phanpy: probably the best mastodon minimal webclient (phanpy.social)
Readme of the project:...
Manifest V2 phase-out begins (blog.chromium.org)
Can I refuse MS Authenticator?
So my company decided to migrate office suite and email etc to Microsoft365. Whatever. But for 2FA login they decided to disable the option to choose “any authenticator” and force Microsoft Authenticator on the (private) phones of both employees and volunteers. Is there any valid reason why they would do this, like it’s...
Self-hosted alternative to synology drive?
I moved off a Synology NAS to a self-managed machine and one thing I still struggle to replace is something like a synology drive. Here are my requirements:...
Internet Archive is continuing to face DDoS attacks after several days, says “this attack has been sustained, impactful, targeted, adaptive, and importantly, mean” (www.neowin.net)
deleted_by_author
Why VPN tunnels are safer than opening a port on my router?
Hi!...
Mushroom ID (mander.xyz)
2024: The Year Linux Dethrones Windows on the Desktop – Are You Ready? (lemmy.ca)
NTSync coming in Kernel 6.11 for better Wine/Proton game performance and porting....
He Trained Cops to Fight Crypto Crime—and Allegedly Ran a $100M Dark-Web Drug Market (www.wired.com)
Search engines down? (discuss.tchncs.de)
Is it just me or are many independent search engines down? Duckduckgo, my go to engine, qwant, ecosia, startpage… All down? The only hint I got was on the qwant page…...