@grunfink thank you for maintaining the manpages in addition to snac itself. i love documented software!
Notices by jn (big endian energy) (jn@boopsnoot.de)
-
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Sunday, 01-Mar-2026 05:42:10 JST
jn (big endian energy)
-
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Sunday, 22-Feb-2026 11:03:26 JST
jn (big endian energy)
RE: https://vis.social/@infobeautiful/116109430224379547
@eloy look, the reverse Itanium graph!
-
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Tuesday, 20-Jan-2026 01:22:50 JST
jn (big endian energy)
...oO(it's called snac because it runs on gebakjes)
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Sunday, 11-Jan-2026 09:02:45 JST
jn (big endian energy)
OH: Hackers: The Musical
(please make it happen)
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Monday, 29-Dec-2025 01:00:33 JST
jn (big endian energy)
@merlin @jana quoting the UNIX paper (Ritchie and Thompson, 1974) for inspiration:
> There is a ‘‘background’’ process that runs at the lowest possible priority; it is used to soak up any idle CPU time. It has been used to produce a million-digit approximation to the constant e, and other semi-infinite problems.In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Saturday, 27-Dec-2025 05:43:44 JST
jn (big endian energy)
@dalias mpv + youtube-dl/yt-dlp works ok, in my experience
(just `mpv https://twitch,tv/foo`)In conversation from boopsnoot.de permalink Attachments
-
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Thursday, 25-Dec-2025 02:39:51 JST
jn (big endian energy)
@a1ba linux 4.20 was cool
In conversation from gnusocial.jp permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Monday, 10-Nov-2025 20:55:01 JST
jn (big endian energy)
Gzip was invented in 1890 by Gezippe Compressioni, when he tried to squeeze 15 shirts and eight pairs of trousers into his suitcase.
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Monday, 10-Nov-2025 20:49:45 JST
jn (big endian energy)
@tillo @whitequark as far as i understand it, it should work with arbitrarily complex/secure algorithms (as long as the algorithm is known), because you can reduce the problem to one unknown byte at a time, so 256 * 256 checksum calculations at worst
In conversation from gnusocial.jp permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Monday, 10-Nov-2025 20:49:44 JST
jn (big endian energy)
@tillo @whitequark I thought about it again and came to the conclusion that the content could be recovered even if the checksum algorithm was unknown, due to how flash tends to work: Clear one bit at a time rather than one byte - if the checksum changes, it was a 1.
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Monday, 10-Nov-2025 00:22:26 JST
jn (big endian energy)
@domi i miss when chatbots were just markov pets you put in an IRC channel
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Friday, 07-Nov-2025 21:53:04 JST
jn (big endian energy)
@whitequark i think yes:
1. successively zero 0..(N-1) bytes so that 1..N bytes are unknown, save the checksums by their number of unknown bytes
2. for every k in 1..N unknown bytes, try up to 256 values for the new unknown byte until you match the corresponding checksum[k]. this byte is now known
3. solvedIn conversation from gnusocial.jp permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Friday, 07-Nov-2025 21:43:51 JST
jn (big endian energy)
@whitequark "at any point" meaning at any point in time, between other operations (zeroing a byte), but the checksum is always computed over the whole block?
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Wednesday, 05-Nov-2025 16:41:04 JST
jn (big endian energy)
@domi what the hell is dependa*bot^2?
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Sunday, 21-Sep-2025 10:40:26 JST
jn (big endian energy)
@bkuhn da hilft nur: üben, üben, üben :)
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Tuesday, 16-Sep-2025 09:07:38 JST
jn (big endian energy)
i read the name "Zbigniew" on my feed, and my first thought was "RISC-V extension"
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Wednesday, 27-Aug-2025 03:48:04 JST
jn (big endian energy)
@lanodan ooh, good one. i already had nethack but not rogue
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Wednesday, 27-Aug-2025 03:40:53 JST
jn (big endian energy)
what are the top 10 programs that any unix host should have?
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Friday, 15-Aug-2025 04:31:36 JST
jn (big endian energy)
@linus similarly, if programs put other runtime data in .cache, that's bad, because it violates the contract of a cache that you outlined.
i wouldn't put it past, let's say, browsers to do something silly like that
In conversation from boopsnoot.de permalink -
Embed this notice
jn (big endian energy) (jn@boopsnoot.de)'s status on Sunday, 10-Aug-2025 21:50:27 JST
jn (big endian energy)
spotted at WHY2025
In conversation from boopsnoot.de permalink Attachments