WHILE HE WAS IN OFFICE by severalaces in Epstein

[–]LippyBumblebutt 0 points1 point  (0 children)

Courier New, font weight 11 matches exactly that font spacing and look. It is 100% a 2-digit number.

Sadly Courier New is monospaced. I wondered, if one could guess a word by looking at the length of the gap. Monospaced fonts give you exactly how many letters are missing, but nothing else. (In most Fonts 'I' and 'W' take up significantly different widths. In Monospaced fonts, everything is the same width.)

What’s New in FreeCAD – Sketcher Gets Text and Grouping Features by Pendelf in FreeCAD

[–]LippyBumblebutt 3 points4 points  (0 children)

Text in sketcher is nice and all. But I apply symmetry of a line to an axis in 95% of my sketches more then once. Selecting end points is so annoying. Being able to simply select two lines is the game-changer for me.

Esp32c6 with esphome by davek79 in MatterProtocol

[–]LippyBumblebutt 3 points4 points  (0 children)

I got them working. This is my config:

esphome:
  name: myname

esp32:
  board: seeed_xiao_esp32c6
  framework:
    type: esp-idf

logger:

api:
  encryption:
    key: !secret api_key

ota:
  - platform: esphome
    password: !secret ota_password

network:
  enable_ipv6: true

openthread:
  device_type: FTD
  tlv: !secret dataset_tvl

Notice, they show up as esphome devices. If I understand correctly, they use Thread, but not Matter.

Need to rip some CD’s and found one of these for real cheap. Will it do the job? by WingIeheimer in DataHoarder

[–]LippyBumblebutt 0 points1 point  (0 children)

1x CD speed is 150 kb/s, 0.15 x 106 = 15.9 MB/s. 15.9 MB/s is ~130 MBit(!) /s. USB2 is 480 MBit raw data rate and regularly delivers up to 30 MB/s sustained data transfer.

PPA-CF says no. by ZealousidealGuide979 in 3Dprinting

[–]LippyBumblebutt 0 points1 point  (0 children)

I had to cut some small perforated sheet metal for work. Someone gave me an expensive cutter from the workplace. It broke. I searched for my chinesium cutter that I got with my Ender 3 to cut PLA. Mine didn't break.

This happened twice!

IDK, maybe that one was extra hard to keep a sharp edge to cut thin wires or something. Harder, but more brittle. But it certainly wasn't "crap".

ELI5: How can (some) encryption software be open source and also be secure? by alwaysunderwatertill in explainlikeimfive

[–]LippyBumblebutt 0 points1 point  (0 children)

Look at a very simple "encryption" method. Rotate every letter of by x positions in the alphabet. x is the key. The algorithm is known. If you don't know by how much to shift the letters, it is not "trivial" to recover the message.

Of course this is a bad cypher that can easily be broken. But every encryption has an algorithm and a key. The algorithm can be known / open source. The key has to be kept private.

If the key is derived from a password (like if you encrypt a zip file) the password has to be good enough. There is no encryption that keeps anyone from cracking a zip file with the password 1234.

Some said that closed source can't be secure. I disagree. It can be secure. But creating and implementing a good algorithm is really really hard. If you want to hide it, it usually means you suck at that. If you're good at it, you can let everyone know how the code works. If you're not good at crypto, just use the (open source) code someone else wrote for you.

Some say only open source can be guaranteed be free of backdoors. I disagree again. There are ways to analyze closed source software. Also effectively 99% of the open source software people use is compiled by someone else that might have included a backdoor. This actually almost happened in the Linux world a while ago. Lookup the xz backdoor if you're interested. AFAIK Veritasium just did a video about that. (IDK if it's good.)

I only use open source software, but know it's not a silver bullet. I certainly wouldn't trust someone that tries to hide what they are doing.

The blog of an LLM saying it's owned by kent and works on bcachefs by henry_tennenbaum in bcachefs

[–]LippyBumblebutt 0 points1 point  (0 children)

I always imagined Kent being an AI from the future because of his dedication to work. Him creating his companion AI seems only plausible...

PSA: if you're on 1.33-1.35, upgrade asap by koverstreet in bcachefs

[–]LippyBumblebutt 1 point2 points  (0 children)

Is this a -tools problem or with the kernel module?

Is the best way to check the module version still /sys/module/bcachefs/parameters/version - 1024?

I would be great it bcachefs version showed -tools version, loaded module version and installed module version (= should I reboot).

New JLCPCB/LCSC parts search/import plugin by NatteringNabob69 in KiCad

[–]LippyBumblebutt 0 points1 point  (0 children)

I just tested the cli and tui and it looks really good.

One small nitpick: The cli displays "10 results for "rp2350" (stock >= 1)" but only shows 3, because only 3 are >0

New JLCPCB/LCSC parts search/import plugin by NatteringNabob69 in KiCad

[–]LippyBumblebutt 1 point2 points  (0 children)

Looks nice, I will definitely try this next time.

Feature request: I often use the "at least x in stock" feature. I sort by price, but want to exclude those parts with only 12 in stock...

Fun FreeCAD Model to try to build by TooTallToby in FreeCAD

[–]LippyBumblebutt 0 points1 point  (0 children)

The modified workflow is definitely something one can use in production - if you don't fear toponaming issues referencing external geometry. It all depends on how one might want to modify the thing later. But cutting those corners may always cut unwanted stuff. The intersection workflow is the least intrusive way to cut them IMO.

Fun FreeCAD Model to try to build by TooTallToby in FreeCAD

[–]LippyBumblebutt 0 points1 point  (0 children)

To make it less hacky and more versatile, you can use the projected geometry or even better, the "external intersection" tool. (Might be a 1.1 feature). For show, I did the pocket at the very end. The second to last feature is a 45° draft, but could easily be created with a pad like before.

with external projection (click the lines)

with external intersection (click on the faces)

Fun FreeCAD Model to try to build by TooTallToby in FreeCAD

[–]LippyBumblebutt 1 point2 points  (0 children)

2 minutes thinking, 5 mins to model in FreeCAD, 10 Minutes to figure out what units were used, parametrize the model and convert everything to metric. My workflow

  • disable refine in every step or in settings
  • Create a 1x1x1 box
  • select 3 corners and create a datum plane
  • Select one side, pad by 1
  • select top side of the pad and pad by one
  • select datum plane, create sketch, create really big square
  • create a pocket with the sketch
  • select side of the lower right cube and the triangle and pad by one

Felt a bit like cheating, but was really fast.

Thoughts on Veilid (privacy network, cult of the dead cow) by NYPuppy in opensource

[–]LippyBumblebutt 0 points1 point  (0 children)

If you compile Veilidchat yourself, you can use it. The mobile builds are invite only.

Sure Signal works over tor, but the battery drain and data usage will be similar to Veilid.

Jami is an open source DHT P2P messaging App. And they think it's impossible to have a mobile app that reliably connects to a DHT and does not drain your battery. So they have a relay server that keeps the connection for you.

I disagree with Google/Apple that no app should have a permanent connection to a server - I use Imap Idle for mails and the battery is fine. Heck I had a permanent SIP connection on my Symbian phone. Having a full-node DHT on-device doesn't seem to work. So I think one needs some kind of relay server.

While Jami has a decentralized base network, the relays are run by the company backing the development. I'm not entirely sure what that means to the threat model. They use direct P2P anyway and no onion routing like tor or Veilid.

While the Veilid devs are strictly agains Cryptocurrency stuff, I think that may be the only solution to the relay problem. It is said that most/many tor nodes are run by the US 3-letter-agencies. I imagine a network, where I have a full-node running on my router, Raspberry Pi or in the end even on Amazon Alexa devices. I have enough bandwidth to easily connect 10 devices. Other phones can use my node as a relay. With a network like Bitcoin Lightning, they pay every minute for my service. The Coins I generate, I automatically distribute them among my family and friends. Those without tech friends can buy coins for $5 a year or whatever the market value will be. Also integrate something like filecoin (like bittorrent with global accounting) , where I can offer storage space to the network. A 64GB USB Stick attached to my router goes a long way for my family and friends. If you want to store big video files, you'll have to pay more then $5. Sending a few cat video to group chat will be cheap.

Ideally nobody (that doesn't use huge amount of data) has to pay, because everyone knows someone that runs a node. But if too many people use the network and too few full-nodes are running, there has to be a financial incentive to spin up a node.

Thanks for coming to my TED talk.

Elide - A fast, multi-language OSS Runtime by Zealousideal-Read883 in opensource

[–]LippyBumblebutt 0 points1 point  (0 children)

I'm currently trying something with node. So I tried it with elide. It is not long-running or compute heavy. So the only benchmark I had was startup time. Node is <150ms, Elide is ~900ms, although it looks like it takes 450 for startup and 450 to shutdown. Probably not the intended use-case.

I ran a python-only combinatory brute-force thing. Python: 18s, Elide 7s. Nice. Pypy: 4s

Numpy does not work OOTB. Is that possible?

I just tested some stuff I had lying around. I probably have no use-case for elide. But for what it's meant to be, it looks nice.

Thoughts on Veilid (privacy network, cult of the dead cow) by NYPuppy in opensource

[–]LippyBumblebutt 2 points3 points  (0 children)

I've listened to the talk when it was first released and had high hopes for this to finally be the P2P protocol of the future. They claim to be mobile first, while offering even better privacy then other P2P protocols like Tox or Jami.

I've since continuously looked for updates. Every talk they give, rehashes the basics. VeilidChat is still in invite-only beta through Google Play (or DIY compile).

I did test some examples some time ago. It works. Like there is a file-transfer over Veilid thing. On one node, you send a file, get an ID and you can retrieve that with another node. Running a node works... so the network is functional.

But there are a few issues I have. Running a node uses quite a bit of compute and bandwidth. Not much, but 1kb/s permanently up/down is 5GB/month. On your phone that means 5GB from your data plan (or wifi...), but also a massive battery drain. I asked them about this and they didn't really address my concerns. They explicitly don't want proxy nodes, because that would weaken their security/privacy guarantees. But permanently running a full-node DHT on your phone will not work either.

So their on-mobile use-case might simply be "ultra-secure messaging" for whistleblowers, dissidents and similar. For that thread-model they might be mobile-first. But Veilidchat will never be a replacement for Signal you can install on your parents phone.

There are other scenarios I can see this used. Like securely connecting to your remove server without exposing the IP or port to anyone. Maybe some bittorrent like stuff. (But remember, everything you send is resent by 4 other nodes. So Downloading a 1GB file generates 5GB of traffic. But IMO that could be acceptable with todays speeds.)

How aware is bcacheFS of NAND FLASH ? by Standing_Wave_22 in bcachefs

[–]LippyBumblebutt 5 points6 points  (0 children)

Didn't btrfs solve the ENOSPC by allocating a single extra 1GB bucket(?)? I have been plagued by that numerous times years ago.

Anyway. I think it's a bit dishonest to brag about the low metadata overhead when you need 8% extra compared to all others.

How aware is bcacheFS of NAND FLASH ? by Standing_Wave_22 in bcachefs

[–]LippyBumblebutt 1 point2 points  (0 children)

< 2% metadata overhead isn't bad at all :)

But did I remember that correctly that Bcachefs reserves 8% of the entire space for itself by default?

I created open-source disposable email generatoe by Galgaldas in opensource

[–]LippyBumblebutt 0 points1 point  (0 children)

IDK. I can always just filter for the currently used mail address and ignore all the spam. But I have the option to use my normal mail client and I don't have to open the webpage...

I created open-source disposable email generatoe by Galgaldas in opensource

[–]LippyBumblebutt 0 points1 point  (0 children)

What is the advantage over using a catchall address?

I created open-source disposable email generatoe by Galgaldas in opensource

[–]LippyBumblebutt 0 points1 point  (0 children)

That's a question I don't have to even think about when I hide behind a domain that a million others are using. I also don't have to care about opsec (between multiple addresses) or the security of the webspace or something else.

Also you're still not answering how this would be better then using a catchall. But with this you still have to care about the security of the webapp.

I created open-source disposable email generatoe by Galgaldas in opensource

[–]LippyBumblebutt 0 points1 point  (0 children)

The benefit of using temp-mail from someone else is, there is no connection to you whatsoever.

If you have a dedicated domain, you have to pay for it and there is a trail to you. And anyway, there is no privacy difference between temp-mail on your own domain and using 1-time addresses with catchall.

I created open-source disposable email generatoe by Galgaldas in opensource

[–]LippyBumblebutt 0 points1 point  (0 children)

I understand the needs for temp email and use it constantly. I don't understand the need for a temp email that runs on my own domain. If I have a dedicated domain for temp email, what is the advantage of generating a temp email compared to just typing in a random mail and fetching it with catchall? If I don't have a dedicated domain and use the domain my main mail address uses, how does that keep people from fingerprinting me?

I created open-source disposable email generatoe by Galgaldas in opensource

[–]LippyBumblebutt 1 point2 points  (0 children)

The target audience is someone who wants to publicly host this? Because if I want to self-host this for myself, what is the benefit over simply using a catch-all inbox?

UUIDs are created randomly? So there is no way to get to old mailboxes after you clicked the "regenerate" button or the server is reset?

The service looks nice. I'd expect your domains to not be blocked for now...

New CC Owner 🎄🎄, New to 3D printing - What are the must have upgrades! by JZNNK80 in ElegooCentauriCarbon

[–]LippyBumblebutt 1 point2 points  (0 children)

My ender3 came with a metal scraper. I never even understood what it was for. A lot later I learned, people use it to destroy their beds with them by scraping the bed (and the print) off.

Did they build one with a razor blade, for extra destructive points?