Beep Boop Bip
Name
Email
Subject   (new thread)
Message
BB Code
File
File URL
Embed   Help
Password  (for post and file deletion)
  • Supported file types are: BMP, CSS, EPUB, FLAC, FLV, GIF, JPG, OGG, PDF, PNG, PSD, RAR, TORRENT, TXT, WEBM, ZIP
  • Maximum file size allowed is 10000 KB.
  • Images greater than 260x260 pixels will be thumbnailed.
  • Currently 849 unique user posts.
  • board catalog

File 16054637432.jpg - (438.18KB , 850x616 , punch.jpg )
2100 No. 2100 hide watch expand quickreply [Reply] [Edit]
I found a scary, but interesting toy.
Java Graphical Authorship Attribution Program
https://github.com/evllabs/JGAAP
4 posts and 1 image omitted. Click Reply to view.
>> No. 2105 [Edit]
>>2104
Some Drexel students tried making something that could "anonymize" text input, but it doesn't use machine learning.
https://github.com/psal/anonymouth
>> No. 2106 [Edit]
>>2105
Hm it doesn't seem like it automatically does the anonymization yet. As of now it seems to just highlight the distinguishing features which the user can manually edit.
>> No. 2357 [Edit]
>>2104
Maybe something like this:
https://steganography.live/

Take your input sentence, "modulate" it with a random sentence to get a semantically equivalent but "encoded" version of the input.
>> No. 2358 [Edit]
File 162682265275.png - (93.33KB , 2590x982 , trial.png )
2358
>>2357
neat

File 141324529758.jpg - (57.45KB , 300x300 , threadmill.jpg )
1012 No. 1012 hide watch expand quickreply [Reply] [Edit]
what do you think, /tc/?
25 posts and 1 image omitted. Click Reply to view.
>> No. 2354 [Edit]
These sorts of counterintuitive puzzles are great at forcing you to understand physics. Another one I came across which I'm still trying to puzzle out:

https://www.youtube.com/watch?v=k-trDF8Yldc

Which manifests in the "sailing downwind faster than the wind" thing demonstrated by Blackbird: https://en.wikipedia.org/wiki/Blackbird_(land_yacht)
>> No. 2355 [Edit]
It won't, because the wings will crash into the treadmill.
>> No. 2356 [Edit]
>>2354
Ok after some thinking I think I understand this now. There are two main questions to address: why the top wheel counterintuitively spins anti-clockwise despite a force directed from left to right, and why the entire contraption moves to the right faster than the ruler.

The key thing to first observe is that the bottom two wheels aren't uniform in radius. They have an inner and an outer radius (due to the nature of the cotton spoon) which is perhaps more clearly seen in this diagram [1]. This already gives a hint of why it can move to the right faster than the applied force, due to a "gear ratio" effect. However, while the calculations are useful for verifying this quantitatively, it still doesn't give a good intuitive answer, nor does it explain why the top wheel spins anti-clockwise.

The best answer I've seen is courtesy of a post on reddit [2] which I'll quote here for completeness

> For the car to move right, the little wheels must turn clockwise, and the big wheel must turn counter-clockwise. This would give you the impression that the ruler must go left to turn the wheel counter-clockwise. That is true, relative to the car.

>Looking at the construction, one immediately suspects that the size of the wheels is somehow involved. But that isn't quite it. Actually, it is because the big wheel touches the ground wheels on an axle, not the part of the wheel that touches the ground. This creates a situation where the speed the outside of the little wheels move faster (in terms of linear velocity) than the outside of the big wheel.

>So, shifting out point of view to the car, you have a wheel to the ruler, and wheels to the ground, and the wheels are geared such that both surfaces move in the same direction, but the ground moves faster, relative to the car

>So imagine now that the car has a motor, and the ruler is just resting on top. As the car moves right, the ground moves left relative to the car. The ruler moves left relative to the car, but slower than the ground. Th
Message too long. Click here to view the full text.
>> No. 2375 [Edit]
>>2356
This explanation also naturally extends to the "downwind faster than the wind" vehicle Blackbird. It's the same principle, where you derive energy from the relative difference in speed between the air (the ruler) and the ground. There should be no doubt that this is possible in the simple gear example, or you can also think of a lever if you like a static equivalent of how you can increase speed (at the expense of decreased force).

But with a propellor in the vehicle, now the linkage becomes a bit more subtle. You have to consider the propellor not just as a flat disk, but consider the actual blades of the propellor itself which take a helical path. Then the issue of gear ratio is manifested between the forward motion of the vehicle and pitch of the propellor. The fact that the wheels turn the propellor in the direction against the wind, means that vehicle can travel faster than the wind (with respect to the ground) while still maintaining the property that a single propellor blade – importantly accounting for the helical path – is traveling slower than the air surrounding it. The parallels to the simple 3-wheel cart should be clear.

File 162477715775.jpg - (378.19KB , 1262x892 , 5f9191ebe357b8b4b6a2fedfca0fefe4.jpg )
2330 No. 2330 hide watch expand quickreply [Reply] [Edit]
Let's talk about web hosting and what that involves. I'm interested in diy solutions, especially for security. Cloudflare is now ubiquitous, but is it really necessary, or are there things web masters can do to protect their website themself?

I've seen some onion sites which have a password prompt to access. A simple pop-up that requests the user type in a given username and password. Is a simple solution like that good enough to defend against ddos attack?
4 posts and 2 images omitted. Click Reply to view.
>> No. 2335 [Edit]
File siff.pdf - (200.01KB )

2335
>>2334
No, not unless you fundamentally redesign the architecture of the internet. See linked paper for how to prevent ddos by redesigning connections using a capabilities-based security model.
>>2334
Even if you have the best in class hardware for processing inbound packets, you're still bottlenecked by the link between you and your ISP. And most ISPs are not prepared to handle a huge spike in traffic and will blackhole you until the traffic decreases.

If you want to serve live-content immune to DDOS, at a fundamental level you need to work around the single point of failure. Either you add enough redundancy or indirection through geo-distributed servers (á la cloudflare), or you can try to get fancy with some sort of p2p-esque scheme. But I'm less familiar with the p2p solutions in this area, and you're basically trading off ease of content updates (trivial if a single server, hard when needing to deal with distributed systems that you don't even own) with robustness against ddos attack.
>> No. 2336 [Edit]
>>2332
>And a static IP
You can work around this with a dyndns type setup. And in practice your assigned ip usually remains fixed unless your reboot the modem so it shouldn't be too much of a hassle. Definitely not a commercial-grade solution though.
>> No. 2337 [Edit]
>>2335
>See linked paper
The solution proposed in this article requires the involvement of ISPs, at least to update routers. So is a purely software-based solution that would put the computing burden of authentication on users impossible because of the physical infrastructure of the internet?

Could the address of a website not be obfuscated in some way, and periodically changed, so that the only way to find it and send packets to it, would be for the client to run a program that solves a complicated math problem or something?
>> No. 2338 [Edit]
File savage-traceback-sigcomm00.pdf - (124.17KB )

2338
>>2337
> requires the involvement of ISPs, at least to update routers
Yeah hence why I mentioned it requires basically redesigning the architecture of the internet.
>So is a purely software-based solution
I think what you mean is whether there exists a solution that can be implemented on top of the existing routing architecture, involving only changes to the endpoints? If so, my intuition is that this is not possible because by design the way routing works on the Internet is that a client can send packets to an server without that server having prior knowledge that the client exists. And in fact, since a client can spoof the source IP the server fundamentally _can't_ be sure of the client's identity. (Note: good ISPs will have ingress IP checks and nullroute spoofed packets, but all it takes is one non-conforming ISP to allow for this).

You might be interested in the attached paper which shows that even solving a strictly simpler problem: reconstructing the path that a packet takes throughout the network (thereby preventing spoofed source IPs) is still very difficult. The authors use a very elegant packet tagging scheme and go to great efforts to maintain compatibility with the existing IP packet formats. But the fundamental limitation is that it requires a significant fraction of ISPs to adopt it, and given that packet routing is mostly done in hardware these days it will require huge costs to replace all this hardware as well. (More generally, you'll see this chicken and egg situation is the single biggest issue with bringing academic research in networking security into practice. They usually only work if there's mass adoption, but no one will be the first to adopt it due to costs).


>Could the address of a website not be obfuscated in some way, and periodically changed, so that the only way to find it and send packets to it, would be for the client to run a program that solves a complicated math problem or something?

Once you deobfuscate it on one client, you can share that deobfuscated address between all clients. The asymme
Message too long. Click here to view the full text.

File 161811634729.jpg - (7.33MB , 1600x2300 , eefdb99c068cdc0d245e8a15f77d2223.jpg )
2260 No. 2260 hide watch expand quickreply [Reply] [Edit]
Surprised this doesn't exist yet.

So what do you think the future of AI is? Do you think eventually, we'll be able to give an AI general instructions and have it program something based on that? Like "write a play station 5 emulator" and then it would actually be able do it? Would that be a good or bad thing?
8 posts and 3 images omitted. Click Reply to view.
>> No. 2270 [Edit]
>>2268
You could go under the assumption that there is some algorithm in the future that can have the AI adapt to situations very quickly. If the AI is tasked to doing something, it'll find any option to keep doing it. If the AI is trained to attack or learns on its own that this is an option, it may be possible. For now, reinforcement learning is incredibly slow and stupid, so it isn't possible for an AI to learn this on its own. That being said, someone could train attacking humans as an option or there is a better or extremely improved method for reinforcement learning and the AI is capable of learning in real-time. I doubt this will be possible in an extremely long time, but who knows what the future holds.
>> No. 2277 [Edit]
File 161971840653.jpg - (931.07KB , 1295x1800 , abadf7967af906d16d0cbc37cb66ce30.jpg )
2277
Here's a related question: do you think humans will interact with their computer via ai in the future? Voice commands do exist now, but they aren't that smart. In the future, could a person say out loud
"open up directory x" and the ai would be able to do that for them? Or maybe even "copy file y in folder x". If the ai isn't sure of something, maybe it could even ask follow up questions.
>> No. 2278 [Edit]
>>2277
I suspect this will be possible (in fact it's an easier task than general AI since the set of things you can do with a given application is limited). But for experienced users, interacting directly with the computer is always going to be quicker than providing mouse commands: i.e. I can drag/drop a file to the trashcan faster than it takes me to say the words.

It might be more useful for running complex queries though: "trim this video to the first 10 seconds and create a gif from that" is a lot easier than trying to remember the right command.
>> No. 2328 [Edit]
AI isn't really I, so I don't think it will be able to create emulators. However, as it advances and things are able to become more and more connected via the internet and the internet and computer processing becomes more powerful I see that it will become quite prominent in many ways. AI is not really able to think for itself but to be programmed to act in certain ways based on certain information and certain patterns, that could be incredibly powerful in middle management and we are already seeing this to a degree, programs can just order supplies, approve loans or whatever based on patterns they have been programmed to act on and as information is able to move more easily they will have more information to act on and be able to connect to more systems and be able to compute more information too as the computing power advances. Large swathes of the middle management will be out of the job.

But what worries me is the ability it will have to control populations. One could for example, create a program that is able to compute so fast and able to gather so much information that it could essentially gather the details of the entire lives of a population and then run them though algorithms and take actions based on that. It could examine every social media account and analyse the political views of everybody, if you wrong think it could bombard you with advertisements for media that would correct you or with fake accounts to hurl angry abuse at you, it could throw any post you make into the void never to be read, it could gather you and every like minded individual into watchlists or even into lists of third class citizens who are unable to access certain things or have lower priority for that access. It could simply remove every comment it does not like that is ever made, even in private conversations and stop any opposing voice even being heard.

One might think this would not happen in the west but I can easily see it. Social media already has the right to block opposing the views and they do, governments also are increasingly under pressure to stop mass shootings, a way for an AI to do this would be with a program that reads every comment ever made and every purchase and movement and runs that through an algorithm to determine the risk factor of an individual and then takes action on that accordingly(this could also be used
Message too long. Click here to view the full text.

File 141791535180.jpg - (46.33KB , 500x500 , image4r43.jpg )
1200 No. 1200 hide watch expand quickreply [Reply] [Edit]
intel vs amd which processor is best?
6 posts and 2 images omitted. Click Reply to view.
>> No. 1215 [Edit]
>>1211
>I've never once in my life heard someone refer to a GPU or APU as just a "processor".

which clearly means nobody elsewhere in the world has or ever will, as you've been everywhere in the world, all the same time, and are the authoritative expert on the subject.

>You knew damn well what he was talking about.

I never said I didn't.

>You were just playing devil's advocate for a purpose I'm not entirely clear of. To appear "knowledgeable" by making the distinction, maybe?
Perhaps I'm just arguing for the sake of arguing. On the internet. Because I have absolutely nothing more productive to do at this very moment.
And arguments are the only type of conversation I am capable of doing with another person.
>> No. 1216 [Edit]
>>1215
I'll give you credit for the honesty.
>> No. 1855 [Edit]
Honestly I wouldn't notice the difference if everything worked right but subjectively speaking I choose Intel forever, just because I always had issues/subpar performance with AMD/ATI back in the day.
Also their hurr durr epyk gayming branding is fucking embarrassing. I'd never put something called Bulldozer or Ryzen in my computer.
>> No. 2300 [Edit]
>>1855
Interesting how quickly things change. Intel has been sleeping at the wheel for the past two years with their "tick-tock" being more of a "tick-tick-tick". Of course Apple has hit it out of the park with their arm-based processor. One might optimistically hope this could lead to the resurgence of different isas (maybe riscv?) but we're probably more realistically going to see arm-based processors start shaving off marketshare from x64 ones. Amazon already has graviton as part of their ec2 lineup, and hopefully the momentum from apple's processor transition will lead to better tooling for cross compilations and platform agnostic primitives.

File 161580064478.jpg - (75.71KB , 1280x960 , IDK.jpg )
2209 No. 2209 hide watch expand quickreply [Reply] [Edit]
tfw I'm posting from an e90 communicator. idk how to update internet (I tried everyhing, trust me) and this chan is one of the few sites which my phone is able to surf.
5 posts omitted. Click Reply to view.
>> No. 2222 [Edit]
OP here again: I'm a dumb person with many projects but few results and trying to update this shit was a funny hobby in the quarantine, however my results are still zero. Any advice? I tried also to install DOSBox but it doesn't work
>> No. 2223 [Edit]
>>2222
Get a better machine.
>> No. 2224 [Edit]
>>2223
Lmao like? Old computers just for remaining in nostalgic vibes?
>> No. 2299 [Edit]
>>2222
Write a proxy to do the HTTPS negotiation and serve back old school HTML w/images, If you do this right you should be able to navigate to most websites and get an experience at least as good as lynx + images.

File 141335966799.png - (45.42KB , 590x340 , OS_logos.png )
1115 No. 1115 hide watch expand quickreply [Reply] [Edit]
What is your preferred operating system and why? If you use linux also mention the name of the distro.
10 posts omitted. Click Reply to view.
>> No. 1180 [Edit]
>>1178
Only 1 of the games I regularly play are linux compatible and I'm not interested in Super Tux Kart or wasting an hour configuring wine to have the game run at 15 frames per second.
>> No. 1182 [Edit]
Debian stable, nowadays. I used to use Arch, but systemd and various other shit came along with a steady downturn in general, so I jumped ship to one of the only remaining (at the time) options in Debian. Howewer, a few months after that, Debian made the decision to eventually switch to systemd as well, so I'm not sure where to run once the current stable release becomes obsolete.
>> No. 1190 [Edit]
>>1176
Realistically you don't encounter many OS level bugs these days unless you're doing something weird, yes.
I have an idealized image from what I've heard of live-hackable Lisp and Smalltalk machines of a system where the source for everything is easy to bring up and understand and modify. Obviously not even OpenBSD fits that bill, anything that simple would be a toy OS unfit for normal use. But it's nice to daydream about, I suppose.
>> No. 2279 [Edit]
File 161973280122.png - (12.28KB , 400x400 , d9fa905af1a22c93eab503a5a760a262.png )
2279
This is a really interesting project. I wonder why it hasn't caught on more.
>Like other device driver interfaces used in Operating Systems today, UDI defines an architecture and a set of APIs for use between the driver and the surrounding system. This allows drivers and OSes to be developed independently. UDI goes a step further and provides APIs that are OS-neutral and platform-neutral, allowing multiple OSes and platforms to use the exact same driver.
http://www.project-udi.org/

File 151772797413.png - (95.00KB , 1024x512 , Ways-To-Browse-The-Internet-Privately.png )
1641 No. 1641 hide watch expand quickreply [Reply] [Edit]
So I got my first copyright notice from my ISP today, and it warned this was my second infraction. Checked and saw two other emails I never noticed from them. So now I think it's about time I get on a VPN, as the peer blocker I've been using till now seems worthless.
Can you guys recommend any? I've tried tunnel bear and hide.me with their free versions and thought hide.me was pretty decent and it allows torrenting. Can you guys recommend any others that wont break the bank, or steal/sell my info?
4 posts omitted. Click Reply to view.
>> No. 2241 [Edit]
>>2240
What's the difference between that and 2-clause BSD?
>> No. 2242 [Edit]
>>2241
The 2 clause BSD has no copyleft. Derivative works or even direct copies don't have to include the part of the license which allows for free usage(which isn't clearly defined in the 2 clause BSD). The only thing you have to include is the attribution to the original writer(copyright notice), the conditions, and the warranty, but not the part which lets you do whatever you want to it within some parameters.

This license also doesn't require the name of any copyright holder.

Post edited on 2nd Apr 2021, 3:22pm
>> No. 2243 [Edit]
>>2242
>don't have to include the part of the license which allows for free usage
To clarify by free you mean libre or gratis? The 2-BSD states

> Redistribution and use in source and binary forms, with or without modification
which seems to cover the libre part for source distributions.

If you mean gratis, then your license mentions "and/or sell copies of the Software" and allows binary distribution, which would prevent that.
>> No. 2244 [Edit]
>>2243
No, I don't mean gratis. Free as defined as
>deal in the Software without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell
Somebody could sell their version for money, but the person who bought it would be able to do all of the above with their copy after buying it. Binary distributions can still be copied and sold. Somebody could also de-compile binary software and/or otherwise modify it in some way.

The bsd license does not require this part
>Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
To be included in derivatives and copies of the software. You only have to leave Copyright <YEAR> <COPYRIGHT HOLDER>, the list, and the warranty.

File 129287735459.jpg - (155.19KB , 800x450 , Outersolarsystem-probes-4407.jpg )
968 No. 968 hide watch expand quickreply [Reply] [Edit]
http://www.associatedcontent.com/article/6136806/voyager_1_launched_in_1977_on_verge.html

This kind of blew my mind, the fact that something we built is out so far, even if it's just a probe from the 70's. I know it's slightly old news, but considering how long Voyager 1's been out there I don't think a week makes much of a difference.
8 posts and 5 images omitted. Click Reply to view.
>> No. 1902 [Edit]
File 157072925648.jpg - (111.74KB , 1024x615 , article-0-11EF84AB000005DC-804_1024x615_large.jpg )
1902
If they are
> in another super-cluster
we will never know

> in another galaxy
we won't know for a long long looong time from now and it's probably irrelevant for us today

> in our galaxy and we detect them in the near future
we are totally fucked, as their first radio signals will reach us thousand years after they have broadcasted them, meaning they have a technological lead of their distance divided by lightspeed minus the few years we use radio signals

> in our galaxy and they detect us first
things will be interesting, as this is the only scenario contact to aliens could be as it is depicted in media with the slight difference that we are actually the far superior civilication

> in our galaxy and we receive their first radio signals from a distance that, devided by lightspeed, is approximately the time we use radio signals ourselves
prepare for interstellar war!
Message too long. Click here to view the full text.
>> No. 1903 [Edit]
>>1891
https://blogs.scientificamerican.com/observations/im-convinced-we-found-evidence-of-life-on-mars-in-the-1970s/
>> No. 2206 [Edit]
File 161368218365.png - (505.26KB , 1280x720 , Screenshot_2021-02-19 NASA Live Official Stream of.png )
2206
Perseverance have just successfully landed in Mars.
>> No. 2207 [Edit]
>>1889
It's a statistical impossibility. Not just a little one like how it's statistically impossible that you will win the lottery, bigger than that. Much, much bigger. The chances are something like 1 in 10^100

File 161180558963.jpg - (179.12KB , 1600x1200 , jbcs.jpg )
2196 No. 2196 hide watch quickreply [Reply] [Edit]
some of the heyuris are building a new imageboard from scratch

what are good features to include?
>> No. 2197 [Edit]
They're Ruskies, so I don't care.
>> No. 2198 [Edit]
>>2196
An imageboard doesn't need "features." Tinyboard/Vichan basically nailed it. The edit feature available on TC is perhaps the only real improvement that upstream tinyboard is missing.
>> No. 2204 [Edit]
All you need is text + file upload. Other stuff is bloat that you can tack on later.
In regards to coding one, HTML5+CSS has actually helped quite nicely. Use custom HTML tags and CSS selectors and things will be much easier.
>> No. 2205 [Edit]
Gurochan is back and it's being hosted or something like that by the same Russians as heyuri, kolyma network. I found this cease and desist letter they sent to "guroboard", since kolyma apparently now owns the tradmark gurochan. Don't know if this is real, but it's weird.

https://2ちゃん.net/src/866.txt

Oh, apparently it's real. Imagine if tohno trademarked tohnochan
https://img.gurochan.ga/dis/res/11127.html

Post edited on 13th Feb 2021, 11:54am

File 135734470139.gif - (24.00KB , 301x322 , lolifox.gif )
418 No. 418 hide watch expand quickreply [Reply] [Edit] [Last 50 posts]
Let's turn this thread into a browser war!
76 posts and 11 images omitted. Click Reply to view.
>> No. 2200 [Edit]
>>2199
Far too much of the stuff I need sporadically requires js for me to disable it automatically. I used to have it disabled, and once had to wait 6 hours to make a financial transaction because some security authorization component on a website needed it and that not working tripped a wire or something.
>> No. 2201 [Edit]
Firefox ESR has been pretty bad for a long time now, but I'd still rather use it than Chromium. One thing that concerns me about switching to one of the forks is whether they get timely security updates.
>>1654
For downloading large files, there's megadl, which is part of Megatools.
>>2199
I do. Disabling JS breaks many websites, which is a pain. >>/ot/33997 and >>/ot/37266 have been pretty useful, even though some functionality is still missing or partially broken with them. The public Invidious instances in particular tend to be somewhat flaky, which is why I hesitate to link people to them.
>>2200
Couldn't you disable it for general web browsing and only enable it for financial stuff? You could set up separate browser profiles for this.
>> No. 2202 [Edit]
>>2201
I use pale moon and switching pale moon profiles is a pain and requires restarting the browser or screwing around in ways that break its interaction with other apps.

Post edited on 7th Feb 2021, 9:45pm
>> No. 2203 [Edit]
>>2201
Cool I didn't know about teddit. There's also "old.reddit.com" which they still seem to keep alive: it preserves the older layout and works mostly fine with JS disabled. Although they've been caught doing shady stuff before [1] so I should probably switch to that.

>Couldn't you disable it for general web browsing and only enable it for financial stuff
Not him but I think he was saying that he didn't even know that the site required JS to avoid tripping the fraud detector or whatever, so he didn't think to enable it. I've noticed this a lot – sites just break in random ways, and if I hadn't used them before disabling JS then I wouldn't even have realized that some dropdown or feature was supposed to exist. It'd be nice if all sites at least supported the noscript tag to let you know that some features are missing.

[1] https://smitop.com/post/reddit-whiteops/

View catalog

Delete post []
Password  
Report post
Reason  
[0] [1] [2] [3] [4] [5] [6] [7]


[Home] [Manage]



[ Rules ] [ an / foe / ma / mp3 / vg / vn ] [ cr / fig / navi ] [ mai / ot / so / tat ] [ arc / ddl / irc / lol / ns / pic ] [ home ]