@sendpaws@navi@Suiseiseki@KaiserKitty GNU Hurd could potentially be used to make something reasonable, though it'd need a lot of work and some of its design (which is noted by the project members themselves) is non-ideal.
Fuchsia meanwhile is a corposcum user-abusing project that not only spoils its own potential but inexplicably sabotages its own foundations with incomprehensible technical choices.
They also introduce authentication problems as it is mostly not used in conjunction with key-addressing.
Effectively, user-configured petnames (ref: Zooko's Triangle) and key addressing as Yggdrassil does is the only sane way to communicate at the application level (yes the implication is that there's no sane way to use IPv4 as it cannot encode a sufficient key).
The keys need not be encoded in IPv6, the underlying transport layer may be abstracted. But applications should not concern themselves with routing details (unless they are specifically overlay network programs, of course).
@lunareclipse@skye@Reiddragon@aperture > too bad it’s actually awful for privacy to use that because websites use that option as another data point for fingerprinting instead of accessibility
I already went over a number of ways to avoid that issue the other day, such as simple downloading literally all the assets.
> is a single binary data point really that much compared to say, window size?
It's just a single bit and it can be defeated by a number of ways.
Limiting to total number of bits of entropy one can obtain (that aren't noise/randomized/OR'd) should be done, of course.
Tor doesn't actually do anything for identification on that level beyond the IP and some network characteristics. Tor Browser does considerably more on top.
> and what's really cool is websites can use this even without JS
Indeed, disabling that also removes a lot of identification opportunities.
@Suiseiseki > Based on Cloudflare's observed traffic between September - November 2024, 41% of successful logins across websites protected by Cloudflare involve compromised passwords.
100%, since they observed them.
Sure they've got some indirection scheme, but it amounts to creating a rainbow table instead of a direct mapping.
Largely the same applies to utilitarianism, which differs very little from consequentialism in its being inapplicable to standalone used, save that it is even more so.
> in increasing degrees of brainrot extremism, they do not consider "people i don't like" to be "people," so that calculus assigns suffering to negligible. it is only evil if the world state score decreases and i can just classify people i don't like as furniture.
That means that whatever other ethical/moral framework they're using to define the axioms & conditions is faulty or purposely comes to these conclusions. Assuming they've bothered to even consciously use such a framework instead of going with whatever impulse they have.
> which, is what historical communist extremists have done (lenin, stalin.)
Those were just fascists with a red coat of paint. Opportunists that took on the trappings of a different movement to fool others.
Hi, I'm Lispi, Lisp (Technomancer) Wizard (to eventually be).You might know me from @lispi314@mastodon.top I like Free Software, #Emacs and resilient computing a lot.I also like anime girls, animes with cute girls doing cute things and artwork with them too. Cute stories are good too.Some Pins:Software and Assumed Privilege, common problems: https://mastodon.top/@lispi314/111253066257920146Writing Privacy-preserving software & services 101: https://mastodon.top/@lispi314/110849018589421824#Kopimism #FreeSoftware #CommonLisp