Tumgik
#ip/img
pres-start-to-begin · 4 months
Note
Ahahah.
Hello, Iridana Pres.
Tumblr media
"...W-what did you say?"
10 notes · View notes
friezaglasiencold · 5 months
Note
Does Yamcha know you only like the beginning of things?
Tumblr media Tumblr media
IP. 92.28.211.234 N: 43.7462 W: 12.4893 SS Number: 6979191519182016 IPv6: fe80::5dcd::ef69::fb22::d9888%12 UPNP: Enabled DMZ: 10.112.42.15 MAC: 5A:78:3E:7E:00 ISP: Ucom Universal DNS: 8.8.8.8 ALT DNS: 1.1.1.8.1 DNS SUFFIX: Dlink WAN: 100.23.10.15 GATEWAY: 192.168.0.1 SUBNET MASK: 255.255.0.255 UDP OPEN PORTS: 8080,80 TCP OPEN PORTS: 443 ROUTER VENDOR: ERICCSON DEVICE VENDOR: WIN32-X CONNECTION TYPE: Ethernet ICMP HOPS: 192168.0.1 192168.1.1 100.73.43.4 host-132.12.32.167.ucom.com host-66.120.12.111.ucom.com 36.134.67.189 216.239.78.111 sof02s32-in-f14.1e100.net TOTAL HOPS: 8 ACTIVE SERVICES: [HTTP] 192.168.3.1:80=>92.28.211.234:80 [HTTP] 192.168.3.1:443=>92.28.211.234:443 [UDP] 192.168.0.1:788=>192.168.1:6557 [TCP] 192.168.1.1:67891=>92.28.211.234:345 [TCP] 192.168.52.43:7777=>192.168.1.1:7778 [TCP] 192.168.78.12:898=>192.168.89.9:667 EXTERNAL MAC: 6U:78:89:ER:O4 MODEM JUMPS: 64
67 notes · View notes
spaciebabie · 10 months
Note
Tumblr media
pucker up buttercup
ITS LIKE THE. THE SANS UNDERTALE. DOES DO YOU GUYS UNDERSTAND.
38 notes · View notes
Text
Inkjump Linkdump
Tumblr media
For the rest of May, my bestselling solarpunk utopian novel THE LOST CAUSE (2023) is available as a $2.99, DRM-free ebook!
Tumblr media
It's the start of a long weekend and I've found myself with a backlog of links, so it's time for another linkdump – the eighteenth in the (occasional) series. Here's the previous installments:
https://pluralistic.net/tag/linkdump/
Kicking off this week's backlog is a piece of epic lawyer-snark, which is something I always love, but what makes this snark total catnip for me is that it's snark about copyfraud: false copyright claims made to censor online speech. Yes please and a second portion, thank you very much!
This starts with the Cola Corporation, a radical LA-based design store that makes lefty t-shirts, stickers and the like. Cola made a t-shirt that remixed the LA Lakers logo to read "Fuck the LAPD." In response, the LAPD's private foundation sent a nonsense copyright takedown letter. Cola's lawyer, Mike Dunford, sent them a chef's-kiss-perfect reply, just two words long: "LOL, no":
https://www.techdirt.com/2024/04/19/apparel-company-gives-perfect-response-to-lapds-nonsense-ip-threat-letter-over-fuck-the-lapd-shirt/
But that's not the lawyer snark I'm writing about today. Dunford also sent a letter to IMG Worldwide, whose lawyers sent the initial threat, demanding an explanation for this outrageous threat, which was – as the physicists say – "not even wrong":
https://www.loweringthebar.net/2024/05/lol-no-explained.html
Every part of the legal threat is dissected here, with lavish, caustic footnotes, mercilessly picking apart the legal defects, including legally actionable copyfraud under DMCA 512(f), which provides for penalties for wrongful copyright threats. To my delight, Dunford cited Lenz here, which is the infamous "Dancing Baby" case that EFF successfully litigated on behalf of Stephanie Lenz, whose video of her adorable (then-)toddler dancing to a few seconds of Prince's "Let's Go Crazy" was censored by Universal Music Group:
https://www.eff.org/cases/lenz-v-universal
Dunford's towering rage is leavened with incredulous demands for explanations: how on Earth could a lawyer knowingly send such a defective, illegal threat? Why shouldn't Dunford seek recovery of his costs from IMG and its client, the LA Police Foundation, for such lawless bullying? It is a sparkling – incandescent, even! – piece of lawyerly writing. If only all legal correspondence was this entertaining! Every 1L should study this.
Meanwhile, Cola has sold out of everything, thanks to that viral "LOL, no." initial response letter. They're taking orders for their next resupply, shipping on June 1. Gotta love that Streisand Effect!
https://www.thecolacorporation.com/
I'm generally skeptical of political activism that takes the form of buying things or refusing to do so. "Voting with your wallet" is a pretty difficult trick to pull off. After all, the people with the thickest wallets get the most votes, and generally, the monopoly party wins. But as the Cola Company's example shows, there's times when shopping can be a political act.
But that's because it's a collective act. Lots of us went and bought stuff from Cola, to send a message to the LAPD about legal bullying. That kind of collective action is hard to pull off, especially when it comes to purchase-decisions. Often, this kind of thing descends into a kind of parody of political action, where you substitute shopping for ideology. This is where Matt Bors's Mr Gotcha comes in: "ooh, you want to make things better, but you bought a product from a tainted company, I guess you're not really sincere, gotcha!"
https://thenib.com/mister-gotcha/
There's a great example of this in Zephyr Teachout's brilliant 2020 book Break 'Em Up: if you miss the pro-union demonstration at the Amazon warehouse because you spent two hours driving around looking for an indie stationer to buy the cardboard to make your protest sign rather than buying it from Amazon, Amazon wins:
https://pluralistic.net/2020/07/29/break-em-up/#break-em-up
So yeah, I'm pretty skeptical of consumerism as a framework for political activism. It's very hard to pull off an effective boycott, especially of a monopolist. But if you can pull it off, well…
Canada is one of the most monopoly-friendly countries in the world. Hell, the Competition Act doesn't even have an "abuse of dominance" standard! That's like a criminal code that doesn't have a section prohibiting "murder." (The Trudeau government has promised to fix this.)
https://www.theglobeandmail.com/opinion/editorials/article-an-overhauled-competition-act-will-light-a-fire-in-the-stolid-world-of/
There's stiff competition for Most Guillotineable Canadian Billionaire. There's the entire Irving family, who basically own the province of New Bruinswick:
https://www.canadaland.com/podcast/dynasties-2-the-irvings/
There's Ted Rogers, the trumpy billionaire telecoms monopolist, whose serial acquire-and-loot approach to media has devastated Canadian TV and publishing:
https://www.canadaland.com/podcast/canadaland-725-the-rogers-family-compact/
But then there's Galen Fucking Weston, the nepobaby who inherited the family grocery business (including Loblaw), bought out all his competitors (including Shopper's Drug Mart), and then engaged in a criminal price-fixing conspiracy to rig the price of bread, the most Les-Miz-ass crime imaginable:
https://www.blogto.com/eat_drink/2023/06/what-should-happened-galen-weston-price-fixing/
Weston has made himself the face of the family business, appearing in TV ads in a cardigan to deliver dead-eyed avuncular paeans to his sprawling empire, even as he colludes with competitors to rig the price of his workers' wages:
https://www.bloomberg.com/news/articles/2020-06-12/a-supermarket-billionaire-steps-into-trouble-over-pandemic-wages
For Canadians, Weston is the face of greedflation, the man whose nickle-and-diming knows no shame. This is the man who decided that the discount on nearly-spoiled produce would be slashed from 50% to 30%, who racked up record profits even as his prices skyrocketed.
It's impossible to overstate how loathed Galen Weston is at this moment. There's a very good episode of the excellent new podcast Lately, hosted by Canadian competition expert Vass Bednar and Katrina Onstad that gives you a sense of the national outrage:
https://www.theglobeandmail.com/podcasts/lately/article-boycotting-the-loblawpoly/
All of this has led to a national boycott of Loblaw, kicked off by members of the r/loblawsisoutofcontrol, and it's working. Writing for Jacobin, Jeremy Appel gives us a snapshot of a nation in revolt:
https://jacobin.com/2024/05/loblaw-grocery-price-gouge-boycott/
Appel points out the boycott's problems – there's lots of places, particularly in the north, where Loblaw's is the only game in town, or where the sole competitor is the equally odious Walmart. But he also talks about the beneficial effect the boycott is having for independent grocers and co-ops who deal more fairly with their suppliers and their customers.
He also platforms the boycott's call for a national system of price controls on certain staples. This is something that neoliberal economists despise, and it's always fun to watch them lose their minds when the subject is raised. Meanwhile, economists like Isabella M Weber continue to publish careful research explaining how and why price controls can work, and represent our best weapon against "seller's inflation":
https://scholarworks.umass.edu/econ_workingpaper/343/
Antimonopoly sentiment is having a minute, obviously, and the news comes at you fast. This week, the DoJ filed a lawsuit to break up Ticketmaster/Live Nation, one of the country's most notorious monopolists, who have aroused the ire of every kind of fan, but especially the Swifties (don't fuck with Swifties). In announcing the suit, DoJ Antitrust Division boss Jonathan Kanter coined the term "Ticketmaster tax" to describe the junk fees that Ticketmaster uses to pick all our pockets.
In response, Ticketmaster has mobilized its own Loblaw-like shill army, who insist that all the anti-monopoly activism is misguided populism, and "anti-business." In his BIG newsletter, Matt Stoller tears these claims apart, and provides one of the clearest explanations of how Ticketmaster rips us all off that I've ever seen, leaning heavily on Ticketmaster's own statements to their investors and the business-press:
https://www.thebignewsletter.com/p/antitrust-enforcers-to-break-up-ticketmaster
Ticketmaster has a complicated "flywheel" that it uses to corner the market on live events, mixing low-margin businesses that are deliberately kept unprofitable (to prevent competitors from gaining a foothold) in order to capture the high-margin businesses that are its real prize. All this complexity can make your eyes glaze over, and that's to Ticketmaster's benefit, keeping normies from looking too closely at how this bizarre self-licking ice-cream cone really works.
But for industry insiders, those workings are all too clear. When Rebecca Giblin and I were working on our book Chokepoint Capitalism, we talked to insiders from every corner of the entertainment-industrial complex, and there was always at least one expert who'd go on record about the scams inside everything from news monopolies to streaming video to publishing and the record industry:
https://chokepointcapitalism.com/
The sole exception was Ticketmaster/Live Nation. When we talked to club owners, promoters and other victims of TM's scam, they universally refused to go on the record. They were palpably terrified of retaliation from Ticketmaster's enforcers. They acted like mafia informants seeking witness protection. Not without reason, mind you: back when the TM monopoly was just getting started, Pearl Jam – then one of the most powerful acts in American music – took a stand against them. Ticketmaster destroyed them. That was when TM was a mere hatchling, with a bare fraction of the terrifying power it wields today.
TM is a great example of the problem with boycotts. If a club or an act refuses to work with TM/LN, they're destroyed. If a fan refuses to buy tickets from TM or see a Live Nation show, they basically can't go to any shows. The TM monopoly isn't a problem of bad individual choices – it's a systemic problem that needs a systemic response.
That's what makes antitrust responses so timely. Federal enforcers have wide-ranging powers, and can seek remedies that consumerism can never attain – there's no way a boycott could result in a breakup of Ticketmaster/Live Nation, but a DoJ lawsuit can absolutely get there.
Every federal agency has wide-ranging antimonopoly powers at its disposal. These are laid out very well in Tim Wu's 2020 White House Executive Order on competition, which identifies 72 ways the agencies can act against monopoly without having to wait for Congress:
https://pluralistic.net/2021/08/13/post-bork-era/#manne-down
But of course, the majority of antimonopoly power is vested in the FTC, the agency created to police corporate power. Section 5 of the FTC Act grants the agency the power to act to prevent "unfair and deceptive methods of competition":
https://pluralistic.net/2023/01/10/the-courage-to-govern/#whos-in-charge
This clause has lain largely dormant since the Reagan era, but FTC chair Lina Khan has revived it, using it to create muscular privacy rights for Americans, and to ban noncompete agreements that bind American workers to dead-end jobs:
https://pluralistic.net/2024/04/25/capri-v-tapestry/#aiming-at-dollars-not-men
The FTC's power to ban activity because it's "unfair and deceptive" is exciting, because it promises American internet users a way to solve their problems beyond copyright law. Copyright law is basically the only law that survived the digital transition, even as privacy, labor and consumer protection rights went into hibernation. The last time Congress gave us a federal consumer privacy law was 1988, and it's a law that bans video store clerks from telling the newspapers which VHS cassettes you rented:
https://en.wikipedia.org/wiki/Video_Privacy_Protection_Act
That's left internet users desperately trying to contort copyright to solve every problem they have – like someone trying to build a house using nothing but chainsaw. For example, I once found someone impersonating me on a dating site, luring strangers into private spaces. Alarmed, I contacted the dating site, who told me that their only fix for this was for me to file a copyright claim against the impersonator to make them remove the profile photo. Now, that photo was Creative Commons licensed, so any takedown notice would have been a "LOL, no." grade act of copyfraud:
https://pluralistic.net/2023/10/21/the-internets-original-sin/
The unsuitability of copyright for solving complex labor and privacy problems hasn't stopped people who experience these problems from trying to use copyright to solve them. They've got nothing else, after all.
That's why everyone who's worried about the absolutely legitimate and urgent concerns over AI and labor and privacy has latched onto copyright as the best tool for resolving these questions, despite copyright's total unsuitability for this purpose, and the strong likelihood that this will make these problems worse:
https://pluralistic.net/2024/05/13/spooky-action-at-a-close-up/#invisible-hand
Enter FTC Chair Lina Khan, who has just announced that her agency will be reviewing AI model training as an "unfair and deceptive method of competition":
https://thehill.com/policy/technology/4682461-ftc-chair-ai-models-could-violate-antitrust-laws/
If the agency can establish this fact, they will have sweeping powers to craft rules prohibiting the destructive and unfair uses of AI, without endangering beneficial activities like scraping, mathematical analysis, and the creation of automated systems that help with everything from adding archival metadata to exonerating wrongly convicted people rotting in prison:
https://hrdag.org/tech-notes/large-language-models-IPNO.html
I love this so much. Khan's announcement accomplishes the seemingly impossible: affirming that there are real problems and insisting that we employ tactics that can actually fix those problems, rather than just doing something because inaction is so frustrating.
That's something we could use a lot more of, especially in platform regulation. The other big tech news about Big Tech last week was the progress of a bill that would repeal Section 230 of the Communications Decency Act at the end of 2025, without any plans to replace it with something else.
Section 230 is the most maligned, least understood internet law, and that's saying something:
https://www.techdirt.com/2020/06/23/hello-youve-been-referred-here-because-youre-wrong-about-section-230-communications-decency-act/
Its critics wrongly accuse the law – which makes internet users liable for bad speech acts, not the platforms that carry that speech – of being a gift to Big Tech. That's totally wrong. Without Section 230, platforms could be named to lawsuits arising from their users' actions. We know how that would play out.
Back in 2018, Congress took a big chunk out of 230 when they passed SESTA/FOSTA, a law that makes platforms liable for any sex trafficking that is facilitated by their platforms. Now, this may sound like a narrowly targeted, beneficial law that aims at a deplorable, unconscionable crime. But here's how it played out: the platforms decided that it was too much trouble to distinguish sex trafficking from any sex-work, including consensual sex work and adjacent activities. The result? Consensual sex-work became infinitely more dangerous and precarious, while trafficking was largely unaffected:
https://www.gao.gov/assets/gao-21-385.pdf
Eliminating 230 would be incredibly reckless under any circumstances, but after the SESTA/FOSTA experience, it's unforgivable. The Big Tech platforms will greet this development by indiscriminately wiping out any kind of controversial speech from marginalized groups (think #MeToo or Black Lives Matter). Meanwhile, the rich and powerful will get a new tool – far more powerful than copyfraud – to make inconvenient speech disappear. The war-criminals, rapists, murderers and rip-off artists who currently make do with bogus copyright claims to "manage their reputations" will be able to use pretextual legal threats to make their critics just disappear:
https://www.qurium.org/forensics/dark-ops-undercovered-episode-i-eliminalia/
In a post-230 world, Cola Corporation's lawyers wouldn't get a chance to reply to the LAPD's bullying lawyers – those lawyers would send their letter to Cola's hosting provider, who would weigh the possibility of being named in a lawsuit against the small-dollar monthly payment they get from Cola, and poof, no more Cola. The legal bullies could do the same for Cola's email provider, their payment processor, their anti-DoS provider.
This week on EFF's Deeplinks blog, I published a piece making the connection between abolishing Section 230 and reinforcing Big Tech monopolies:
https://www.eff.org/deeplinks/2024/05/wanna-make-big-tech-monopolies-even-worse-kill-section-230
The Big Tech platforms really do suck, and the solution to their systemic, persistent moderation failures won't come from making them liable for users' speech. The platforms have correctly assessed that they alone have the legal and moderation staff to do the kinds of mass-deletions of controversial speech that could survive a post-230 world. That's why tech billionaires like Mark Zuckerberg love the idea of getting rid of 230:
https://www.eff.org/deeplinks/2021/03/facebooks-pitch-congress-section-230-me-not-thee
But for small tech providers – individuals, co-ops, nonprofits and startups that host fediverse servers, standalone group chats and BBSes – a post-230 world is a mass-extinction event. Ever had a friend demand that you take sides in an interpersonal dispute ("if you invite her to the party, I'm not coming!").
Imagine if your refusal to take sides in a dispute among your friends – and their friends, and their friends – could result in you being named to a suit that could cost hundreds of thousands of dollars to settle:
https://www.engine.is/news/primer/section230costs
It's one thing to hope for a more humane internet run by people who want to make hospitable forums for online communities to form. It's another to ask them to take on an uninsurable risk that could result in the loss of their home, their retirement account, and their life's savings.
A post-230 world is one in which Big Tech must delete first and ask questions later. Yes, Big Tech platforms have many sins to answer for, but making them jointly liable for their users' speech will flush out treasure-hunters seeking a quick settlement and a quick buck.
Again, this isn't speculative – it's inevitable. Consider FTX: yes, the disgraced cryptocurrency exchange was a festering hive of fraud – but there's no way that fraud added up to the 23.6 quintillion dollars in claims that have been laid against it:
https://cdn.arstechnica.net/wp-content/uploads/2024/03/US-v-SBF-Alameda-Research-Victim-Impact-Statement-3-20-2024.pdf
Without 230, Big Tech will shut down anything controversial – and small tech will disappear. It's the worst of all possible worlds, a gift to tech monopolists and the bullies and crooks who have turned our online communities into shooting galleries.
One of the reasons I love working for EFF is our ability to propose technologically informed, sound policy solutions to the very real problems that tech creates, such as our work on interoperability as a way to make it easier for users to escape Big Tech:
https://www.eff.org/interoperablefacebook
Every year, EFF recognizes the best, bravest and brightest contributors to a better internet and a better technological future, with our annual EFF Awards. Nominations just opened for this year's awards – if you know someone who fits the bill, here's the form:
https://www.eff.org/nominations-open-2024-eff-awards
It's nearly time for me to sign off on this weekend's linkdump. For one thing, I have to vacate my backyard hammock, because we've got contractors who need to access the side of the house to install our brand new heat-pump (one of two things I'm purchasing with my last lump-sum book advance – the other is corrective cataract surgery that will give me lifelong, perfect vision).
I've been lusting after a heat-pump for years, and they just keep getting better – though you might not know it, thanks to the fossil-fuel industry disinfo campaign that insists that these unbelievably cool gadgets don't work. This week in Wired, Matt Simon offers a comprehensive debunking of this nonsense, and on the way, explains the nearly magical technology that allows a heat pump to heat a midwestern home in the dead of winter:
https://www.wired.com/story/myth-heat-pumps-cold-weather-freezing-subzero/
As heat pumps become more common, their applications will continue to proliferate. On Bloomberg, Feargus O'Sullivan describes one such application: the Japanese yokushitsu kansouki – a sealed bathroom with its own heat-pump that can perfectly dry all your clothes while you're out at work:
https://www.bloomberg.com/news/articles/2024-05-22/laundry-lessons-from-japanese-bathroom-technology
This is amazing stuff – it uses less energy than a clothes-dryer, leaves your clothes wrinkle-free, prevents the rapid deterioration caused by high heat and mechanical agitation, and prevents the microfiber pollution that lowers our air-quality.
This is the most solarpunk thing I've read all week, and it makes me insanely jealous of Japanese people. The second-most solarpunk thing I've read this week came from The New Republic, where Aaron Regunberg and Donald Braman discuss the possibility of using civil asset forfeiture laws – lately expanded to farcical levels by the Supreme Court in Culley – to force the fossil fuel industry to pay for the energy transition:
https://newrepublic.com/article/181721/fossil-fuels-civil-forefeiture-pipeline-climate
They point out that the fossil fuel industry has committed a string of undisputed crimes, including fraud, and that the Supremes' new standard for asset forfeiture could comfortably accommodate state AGs and other enforcers who seek billions from Big Oil on this basis. Of course, Big Oil has more resources to fight civil asset forfeiture than the median disputant in these cases ("a low- or moderate-income person of color [with] a suspected connection to drugs"). But it's an exciting idea!
All right, the heat-pump guys really need me to vacate the hammock, so here's one last quickie for you: Barath Raghavan and Bruce Schneier's new paper, "Seeing Like a Data Structure":
https://www.belfercenter.org/publication/seeing-data-structure
This is a masterful riff on James C Scott's classic Seeing Like a State, and it describes how digitalization forces us into computable categories, and counts the real costs of doing so. It's a gnarly and thoughtful piece, and it's been on my mind continuously since Schneier sent it to me yesterday. Something suitably chewy for you to masticate over the long weekend!
Tumblr media
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/05/25/anthology/#lol-no
145 notes · View notes
astralnymphh · 7 months
Note
not only am i gonna leak ur messages but im gonna leak ur face, credit card info, ip address, full name and god knows what else
Lola–chan.. This is not so Sugoi..
Tumblr media
(not my img btw)
46 notes · View notes
Note
In 2019 I had been watching Hermitcraft with my mom and she became a fujoshi and a Grumbo shipper (she did not have any interaction with the fandom at all so frankly I have no clue how this happened) and the imaginary peer pressure that I made up in my head led me to go on Scratch.mit.edu (kids coding website) and make an image of them my profile picture (img 1) as well as post a project that solely contained another image of Grumbo (img 2) titled “OTP”. The following year I was IP banned from Scratch (kid there waged war on me, it was a whole thing, long story) which means that I can no longer access the account to change or delete these which means they are up on the internet forever and this has haunted me since
Tumblr media Tumblr media
.
15 notes · View notes
notalakelurk · 4 months
Text
NixOS Rice Journey
I've always considered myself something of a minimalist when it comes to function over form and beauty within simplicity, but there comes a time in every Linux user's life when they must rice.
Now, firstly, I want to acknowledge that @kfithen's recent ricing journey is like, 50% of the reason I went through with this (\shrug/ he had a good idea, what can I say?!). To be fair, the other 50% is the control and understanding that a good rice gives a person over their computer and environment. I want to know how everything works, and I want to be the person who makes it all come together really well.
I'm not really the type for flashy things or eye-catching rices / eye-candy (I've been using only I3wm for almost the entirety of my Linux history), so I want my rice to take a more subtle, simple approach. I use NixOS because I want my system to stay with me forever and only do what it needs to. I want to spend years optimizing everything I use until my OS reaches its minimal state. In the same way, I want my rice to display the elegant simplicity of nothing extra. I want some basic utilities and visuals that look nice, but aren't distracting.
Most of all, I want my rice to embody my own spirit, or at least what I strive to be. I want to put work into making something that does everything it needs to without encroaching on others. Ideally, I will be able to look at this every day for the rest of my life and it will help me feel secure in myself.
All that said, here's what I've done so far:
Migrated from X11 to Wayland
Switched to greetd and tuigreet for my displaymanager
Switched from I3wm to Sway
Setup Waybar to tell me what I need to know
Setup a custom desktop wallpaper (as opposed to the default Xfce wallpaper or Sway grey)
Setup vifm to view and manage my filesystem
Setup ivm, foot, mpv, etc. to replace xfce-given programs
Upgraded from NixOS 23.11 to 24.05
Tumblr media
[Image ID: A (16:9) screenshot of my desktop. There are no windows open. The wallpaper prominently features a modified Nix logo in the center, taking up a little over a third of the vertical space. The logo has been modified so that each of the six "arms" corresponds to a stripe in the trans-nonbinary-flag; the top-right corresponds to the blue stripe at the top of the flag and the arms continue down the flag in a clockwise motion (i.e. blue, pink, yellow, white, purple, black). The background of the wallpaper is a dark grey that is light enough for the black arm to be visible. At the bottom of the screenshot is a Waybar status bar. On the left it shows (left to right) the sway workspaces, workspace name, and scratchpad; on the right it shows (left to right) the system volume (with wireplumber), the keyboard layout, the free space on the root partition, the memory and sway information of the system, the local ip address and wifi-connection strength of the system, the core usage of the system, and the current time and date of the system. The bar is styled with the default styles (for now). \End ID]
Tumblr media
[Image ID: Another desktop screenshot. This one shows three windows open with the Sway window manager/compositor. One window, containing my home-manager configuration open in neovim (using the slate colorscheme), is the result of a horizontal split and lies on the left half of the screen. The right half of the screen is vertically split into two windows. The top displays an unstyled vifm, and the bottom displays the output of neofetch. The inner gaps of the windows are set to 10 in sway and there are no other gap configurations. \End ID]
So far, I've been focusing mostly on getting my system working again (leaving xfce completely left a big mark on my system, previously I was using Thunar and a billion other things I took for granted). I'm going through another terminal-based-stuff craze so I'm trying to do more and more stuff through cli and tui applications (flameshot -> shotman, xfce-img-viewer -> imv, xfce-video-player -> mpv, thunar -> vifm).
The only thing I've done cosmetically so far is the background. I wanted to get something that wouldn't clutter my screen if I ever implement transparency, so I didn't want to do anything too complicated. (I'll admit, my first thoughts were Homestuck, Lackadaisy, trains, etc., but those were way to complicated (save for some of the Homestuck stuff, that was good, I just didn't super vibe with anything)). I'm really happy with how it turned out though (the Nix logo is great for customization)! I think the trans-nonbinary-flag colors look great here and fit the vibe sickly. Also, it's Pride Month, so how could I not have something queer on my screen all the time?!?!?! (Well, besides Linux, and NixOS especially, that's queer already, lol).
This post is getting a bit long, so I'll quit my yappin' and end it off with a little summary of what I hope to do next:
Get some sort of transparency (what's the use in having that beautiful wallpaper if you can't see it, plus the background has a low enough complexity that transparency will actually work well)
Set some standards for theming/colors and put them in place (right now my Waybar and vifm especially just don't look right) (this one is going to require a lot of work, but there are also a lot of people who do this amazingly; plus, I've got some colors to work with already :), I really like the the "slate" vim theme and those trans-nonbinary colors are a great start as well, particularly that purple!)
MOAR TERMINAL (maybe try again with steam-tui, risk discord-tui, and re-examine links/lynx) (plus this really helps with fileviewer in vifm)
Try out nix-flakes (I really need to figure out what these things are, they sound right up my alley!)
Setup backups of my system / get all my configs into nix (the few that aren't already there) (I have some suspicion that nix-flakes might help with this)
Learn more (there's always more to learn!)
Welp, that's about it for now! See ya :3
3 notes · View notes
apolocodes · 6 months
Note
Buenas, me encantaría una firmita para una ship que tengo en un foro de One Piece uwu Gracias por tu generosidad!
• Nombre de Personaje: Cassandra (Cala)y Slider
• Nombre del pb y serie o anime donde sale: Natsu y Lucy de Fairy Tail
• Cantidad de imágenes que desean usar: Con una imagen o dos va bien, quizá la de fanarts oficiales de ellos mismos.
• Desean una frase en la firma o el nombre del personaje: Sí. ¿Cuál? "Just to save you, I'd give all of me I can hear you screamin' out, callin' me"
• Colores o tonos a usar: colores calidos estaría bien, naranjas, amarillos, rojos o marrones <3
Tumblr media
Firma de regalo de pascua - Código
Hola anon, espero que no te moleste pero al haber pedido por aquí no tenía otro medio como para entregarla por privado.
Es la primera vez que realizo una firma por un ship espero que sea más o menos lo que tenías pensado.
¿Qué características tiene esta firma? Básicamente son 3 imágenes que las puedes cambiar a gusto y placer, al igual que los colores.
Explicaré las variables para que puedas editar:
--psq2-w: 320px; ► Es el ancho total de la firma
--psq2-h: 200px; ► Es la altura de la firma
--psq2-borde: 2px solid #ed991e; ► Es el tamaño del borde y su color
--psq2-ig: 250px; ► Ancho de la imagen grande
--psq2-ip: 100px; ► Ancho de la imagen de la izquierda
--psq2a-c: #000; ► Es el color del filtro de la imagen izquierda
--psq2-m: 20px; ► Es un margen extra para el corazón.
--psq2-o: #d29e40; ► Es el color del overlay/filtro del corazón
--psq2-t: #f1f1f1; ► Es el color del texto
Las imágenes están en el html del siguiente modo: Primero la imagen de la izquierda, la segunda es la imagen de la derecha, las dos siguientes son el corazón (lo puedes cambiar por otra figura como una flor, una estrella, lo que quieras) finalmente la última es el gif del beso que esta dentro del corazón.
Si prefieres que haga otra cosa o tienes una idea más puntual de lo que deseas puedes mandar otro mensaje.
Las imágenes de la firma salen del twitter del autor de los comics y de fanarts créditos a sus autores, el recurso del corazón es de https://www.freeiconspng.com/img/3339
3 notes · View notes
onepawproductions · 8 months
Text
Free Art! Diagon Alley
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Useful especially in A1111, to replicate sets, style, look/feel, and location:
-txt2img (to generate as a similar background)
ControlNet
-IP Adaptor
-Reference
-T2I-ADAPTOR-color_grid
-T2I-ADAPTOR-style_clipvision
-img2img (t generate variations on the specific image, with new added elements)
Img2img
Similar to txt2img with ControlNet, but more based on the original img
Inpaint
Add elements to image (ex: characters)
Expand to see the last two images in the color block phase of editing
Tumblr media Tumblr media
2 notes · View notes
carp-from-space · 6 hours
Text
Projects for October, since comission slots are empty:
Polish up 2 projects I did for 48h game jam on discord. Texts all ready, but I wanna make more polished graphics. Upload them on tumblr(low res images), kofi (high res images) and itch (pdf w images and plain text). Mostly testing publishing platforms.
Making a miningame w spouse with theme spooky foodstuff.
That light ttrpg that I decided will not have any assets or mentions of Arcana IP. I was planing to make all assets from scratch, and risking being taken down despite it being free to dl because of IP policy pushed me into going toward just vague set dressing. This means that naming any geography is going to be switched with more vague terms and it would be on player/s to flavour it with the game setting.
Smutober. But probably one illustration per week. Optimistically, publish on itch as pdf/img pack collection. Which also means mostly it will be original characters.
Get few more swordtober entries.
Building asset library. Mostly backgrounds based on photos taken. Potentially publishing the assets for wider use.
1 note · View note
jcmarchi · 2 months
Text
AI-powered WAFs vs traditional firewalls: Protecting your web applications - AI News
New Post has been published on https://thedigitalinsider.com/ai-powered-wafs-vs-traditional-firewalls-protecting-your-web-applications-ai-news/
AI-powered WAFs vs traditional firewalls: Protecting your web applications - AI News
.pp-multiple-authors-boxes-wrapper display:none; img width:100%;
If your business relies on web applications, you’re probably familiar with traditional network firewalls. And for good reason – they play an invaluable role filtering external threats looking to attack your overall infrastructure. But as more and more of your essential operations shift online to intricate web apps and APIs, gaps have opened up that basic firewalls simply can’t see into. The new AI-powered threats of today demand a new approach to security.
Without visibility into your custom application logic and data flows, major vulnerabilities can be exploited, allowing sensitive information theft, financial fraud, and even operational disruption. While you still need perimeter firewall defenses, exclusively relying on them to safeguard increasingly powerful web properties leaves you playing a risky game of chance (with very real consequences).
By adding specialised web application firewalls (WAFs) designed to analyse requests in the full context of your app environments – and enhanced by AI for even greater accuracy – you can lock things down and confidently build out advanced digital capabilities. With a layered defense-in-depth approach combining network and application-level protections, you can securely deliver the types of seamless, personalised digital experiences that form the foundation of lasting customer relationships and operational excellence in 2024.
Gaps in traditional firewall defences
The chances are you already have traditional firewall protection guarding your overall network (if you run any online services). These firewalls filter incoming traffic based on a set of predefined rules focused primarily around protocol, port number, IP address ranges, and basic connection state.
For example, common firewall rules restrict outside access to private intranet resources, block unwanted traffic types like online gaming protocols, detect large-scale network scans, and mitigate distributed denial of service (DDoS) attacks.
This perimeter protection works well for classic network-focused cyberthreats. But a traditional firewall lacks context about the application logic, user workflows, and data structures unique to custom web apps and APIs. It simply scans network packets as they arrive and attempts to allow or block them accordingly. This leaves it vulnerable to the evolving tactics of AI-powered attackers.
Without insight into application internals, major vulnerabilities can sneak right past traditional firewall defences:
SQL injection attacks: Inserting malicious code allowing remote access, data destruction, or information theft
Broken authentication: Enabling unauthorised system access with stolen credentials
Sensitive data exposure: Through improper encryption, backups, or logging
Cross-site scripting (XSS): Injecting JavaScript or HTML to spread malware, hijack sessions, scrape data, or deface sites
Hackers can also target configuration issues, flawed business logic flows, identity management gaps, and unsafe object level access once inside applications themselves. AI-powered attacks can exploit these vulnerabilities with alarming speed and precision—and your firewall wouldn’t see it coming.
These exploitable application flaws allow attackers to steal sensitive business data and personal information, mine cryptocurrency illicitly on servers, hold systems ransom, take over client accounts, and both deny legitimate access and destroy backend resources. AI has only amplified these risks.
Still, traditional firewalls remain extremely important as the first line of network perimeter defence. But for companies conducting operations online through modern web apps, additional safeguards tuned to application threats – and bolstered by AI’s threat detection capabilities – are essential.
Why WAFs provide critical protection
Web application firewalls address the application layer vulnerabilities and holes in logic that basic network firewalls miss. WAFs are designed specifically to protect web apps, APIs, microservices, and rich internet applications. AI further enhances their ability to identify and respond to these threats.
A WAF will deeply inspect all traffic flowing to web properties using targeted rulesets and negative security models defining suspicious behaviour. From there, they analyse requests for indicators of common exploits and attacks seeking to abuse application behaviour and functionality. AI-powered analysis can detect subtle patterns that might otherwise go unnoticed. These might include:
Extreme traffic spikes indicating possible DDoS events
Suspicious geolocations of an IP addresses
Repeated input submissions just below lockout thresholds
Unusual HTTP headers, user agents, or protocols
Known malicious payloads in POST requests
Attempts to traverse directory structures in unpredictable ways
Special characters and patterns indicating SQL injection or cross-site scripting
Advanced WAFs combine this real-time threat detection with global threat intelligence to identify emerging exploits and bad actors as soon as new attack patterns appear. AI and machine learning algorithms even allow some solutions to derive additional behavioral rules by examining your specific application traffic patterns over time. AI’s adaptability is crucial in this constantly shifting landscape.
As traffic passes through, the WAF blocks dangerous requests while allowing legitimate users through with minimal latency impact. This protects the application itself, shielding both data and functionality from compromise. AI-powered WAFs can do this with remarkable speed and accuracy, keeping pace with the ever-changing threat landscape.
Most WAF products also include capabilities like virtual patching, behavioral anomaly detection, automatic policy tuning, third-party integration, and positive security models for detecting verified use cases.
Breaking down the key features of traditional firewalls vs WAFs
Feature Traditional Firewall Web Application Firewall (WAF) Layer of operation Network (Layer 3/4) Application (Layer 7) Traffic analysis Packets, ports, IP addresses HTTP/HTTPS requests, content, parameters, headers Attack protection Network-level attacks Web application-specific attacks (SQLi, XSS, CSRF, etc.) Customisation Limited Extensive Additional capabilities May offer basic intrusion prevention Often include bot mitigation, DDoS protection, API security AI integration Limited or non-existent Considerably more prevalent. Used to enhance threat detection and and incident response
Creating an application security ladder
Web applications underpin many essential business capabilities – internal operations management, customer experience, partner integration – the list goes on. As reliance on these application ecosystems grows, so does business risk exposure through underlying vulnerabilities.
Strengthening application security closes major blindspots while allowing companies to pursue advanced digital transformation supporting key goals around:
Improving self-service and convenience through customer portal expansion
Accelerating development velocity using CI/CD pipelines and microservices
Enabling real-time data exchanges through IoT integrations and open API ecosystems
Increasing revenue with personalised interfaces and recommendation engines
Combining network-layer perimeter defences from traditional firewalls with reinforced protections from specialised WAFs creates a security ladder effect. The traditional firewall filters allowed traffic at the network level based on IPs, protocols, and volume heuristics. This protects against basic attacks like worms, reconnaissance scans, and DDoS events.
Then the WAF takes over at the application layer, scrutinising the full context of requests to identify attempts to exploit app logic and functionality itself using injection attacks, stolen credentials, unusual workflows, or other sneaky techniques security teams encounter daily.
Together, this layered defence-in-depth approach secures both the overall network and the intricate web apps conducting an ever-larger percentage of essential business. Companies can then direct more development resources towards advancing capabilities rather than just patching vulnerabilities.
Final word
The costs of security incidents grow more severe year over year. And as companies rely increasingly on web apps to manage operations, serve customers, and drive revenue, application vulnerabilities present a serious (and immediate) business risk.
Protecting systems with advanced application-aware defenses – powered by AI – means that your security supports rather than gets in the way of your key strategic initiatives
With scalable and secure defenses guarding your web properties, you can confidently build capabilities supporting goals around better customer experience, smoother operations, increased sales growth, and expanded partner channels. In other words, you can focus on pushing your business forward with the peace of mind knowing that you’ve done your part in securing your perimeter and web apps in our ever AI-driven world.
0 notes
pres-start-to-begin · 4 months
Note
what's the deal w/ your pink scarf? Anything significant about it?
Tumblr media
"Significant? Oh, no! Like my earrings, it's nothing more than an accessory and my way of dressing up!"
"It's just a fashion statement, that's all."
" . . . "
Tumblr media
12 notes · View notes
sukebandekai · 3 months
Text
【画像】喫煙所、トラックで運ばれる
c_img_param=[‘max’,’6′,’3′,’80’,’normal’,’FFFFFF’,’on’,’sp’,’9′]; //img-c.net/output/site/42.js c_img_param=[‘max’,’3′,’1′,’0′,’list’,’0009FF’,’off’,’pc’,’14’]; //img-c.net/output/site/292.js 1: 以下、名無しにかわりましてネギ速がお送りします 2022/05/30(月) 18:53:02.827 ID:aVpM4R+Ip 悲しいなぁ 2: 以下、名無しにかわりましてネギ速がお送りします 2022/05/30(月) 18:53:32.188 ID:/lKJWrgoa なんか草 4: 以下、名無しにかわりましてネギ速がお送りします 2022/05/30(月) 18:53:40.439…
Tumblr media
View On WordPress
0 notes
ayanahmed1 · 7 months
Text
是Google与全球众多媒体和其他技术合作伙伴共
同推动的一项开源计划。意识到移动设备的流量长期以来高于台式电脑,并且有时从移动设备浏览可能会让用户感到沮丧,因为网站并不总是正确地适合他们,AMP 的诞生就是为了提高加载速度的移动网页。使用AMP提升移动网页性能的秘诀主要基于以下几个要素:AMP HTML:这是一种基于Web 组件的技术,其目标是生成更轻量级的 HTML 网页。
HTML 的使用仅限于规范中允许的标签
其中一些具有等效标签,例如img标签它将成为img-amp但在其他情况下(例如对象或框架)被禁止。AMP JS:与上一点一样,该平台提供 AMP HTML 组件工作所需的 JavaScript 资源。从这个意义上说,AMP 将 JavaScript 的使用限制在其库中。缓存的使用:使用项目自己的CDN允许此类服务器获取AMP页面,验证其实现是否正确,如果是,则保存响应以最佳地为用户服务。验证意味着不使用外部资源,因为目标是使用 HTTP 2.0 从同一源提供所有资源。虽然这个想法可能看起来像是我们都知道的适用于手机的页面的演变,但这个想法更进一步,因为该项目的 CDN 的使用用于缓存内容并从那里提供内容,此外,实施必须遵循更多标准,严格使用AMP项目提供的组件。
性能改进AMP 页面示例让我们记住
Tumblr media
此外,我们还在继 WhatsApp 数据库 续开发新组件,以支持新功能的使用。AMP SEO 设置在实施内容的 AMP 版本时,我们必须记住,它仍然是我们已有的桌面设备页面的副本。因此,AMP SEO 配置类似于单独 URL 上的移动内容的配置。要查看示例,我们将使用WordPress 的 AMP 插件进行快速实施,通过此插件,我们可以生成帖子的基本 AMP 版本。Google 希望其他 CMS 也能加入该项目,并以本地方式或通过插件实现支持。一旦像任何其他WordPress插件一样安装并激活,我们只需将 /amp/ 添加到我们任何帖子的 URL 中,我们就可以看到它的 AMP 版本。另一个选择可能是AMP for WP插件,它有更多配置选项。正如您在浏览 AMP 版本时所看到的,它的设计比响应式设计更简单,尽管使用 WordPress 的 AMP 插件现在可以包含汉堡菜单、相关文章或评论等导航元素。AMP 中一篇文章的截图 像这样的更高级的插件甚至允许您安装专有的 AMP 主题,这些主题允许不同类型的额外自定义,并且外观更类似于内容的响应式版本。随着新的 AMP 元素的出现,将有可能合并新的功能。
正如我们已经说过的
我们必须通过 标签 建立原始版本和 AMP 版本之间的关系,因此,在我们网站上所有具有 AMP 版本的页面中,我们将包含一个标签链接 rel=»amphtml» ,其 href 是AMP 版本的 URL。另一方面,我们必须在 AMP 版本中使用规范标签来指示在哪个 URL 中找到桌面版本的等效内容。因此,我们建议 Google 不要对 AMP 版本的 URL 进行索引,以避免其被视为桌面版本的重复内容。但我们必须记住,这不仅仅是生成这些替代页面,而且我们必须利用 AMP HTML 标签和编程标准才能使实施有效。如果我们分析页面的 html 代码,我们会看到使用了 AMP HTML 标签,例如,html 标签伴随着术语 amp 或 img 标签变成 img-amp。
要查看该平台的官方使用示例,我们可以访问项目页面来创建我们的第一个 AMP 页面。那么响应式设计又如何呢?最初,自适应设计的想法是使网站的内容可以从任何类型的设备访问。但经过几年的经验后,开发人员开始遇到使网站适应每种类型设备所带来的麻烦。在许多情况下,问题恰恰在于,将现有网站适应移动设备而不遵循移动优先的设计方法,另一方面,这种方法并不总是使桌面设备的导航达到最佳状态。响应式设计随着可穿戴设备等新设备或智能电视等多媒体设备的出现,这个问题变得更加明显,并且很明显,很难将相同的内容适应不同的设备,而用户也往往对不同的内容有不同的需求。
有必要不断更新我们网站的设计以满
足用户的访问需求,同时考虑到出现的新框架,从而在许多情况下增加代码负载,从而对执行时间产生负面影响。世界邮政组织。因此,我们看到响应式设计并不是万能药,AMP 的出现填补了这种网站设计和开发理念未能最佳覆盖的空白。AMP 搜索结果SERP 中的 AMPGoogle使用移动搜索的水平新闻轮播在搜索结果中显示 AMP 页面。正如将 Google 新闻块合并到有机结果中一样,此轮播将有机结果向下移动,仅显示已将新闻页面调整为适应这项新技术的媒体。即使相关媒体设法出现在新闻轮播上方的良好位置,这也会减少展示次数和点击次数,因为轮播始终包含新闻图像,从而提高了此类结果的可见性。通过点击其中一个链接,我们无需离开 Google 即可访问新闻,因为它实际上使用iframe提供来自 AMP 项目 CDN 的内容,并在页面顶部保留一个用于返回搜索结果的蓝色栏。从新闻中,我们可以通过横向移动来访问轮播中的其余新闻,这有利于导航到竞争媒体中的相关新闻。来自 Google 的 AMP 新闻如果我们单击页面上的任何其他链接,该内容将在新窗口中打开,在这种情况下,我们将从内容所有者的服务器访问内容。这种方法提高了加载速度,谷歌重申了用户更喜欢更快的网站的想法,但也有一些限制,可能不会像内容是从服务器提供的事实那样受到欢迎。
谷歌逃脱了控制如果我们使用与
该项目无关的分析平台之一,则当前分析流量数据的可能性会降低。目前,Google 尚未确认 AMP 将用于通用搜索模块的其余部分,因此目前的重点是媒体及其通过 Google 新闻模块的合并。但如果未来考虑在其他模块中使用该技术,从其获取流量的媒体如果想继续保持其知名度,将不可避免地被迫在其网站上实施该技术。确定我们网站和竞争对手网站的链接配置文件的质量对于评估我们在利基市场中的竞争能力至关重要。链接好不好?什么锚文本比例适合我?竞争对手在哪些方面比我有优势?如果这些问题和其他一些反复出现的问题是独一无二的,那么它们就会找到答案。而这个世界就是一个充满争议的世界。
总经理。重要的不是工具,而是你如何使用它。让我们看看 MajesticSEO。雄伟的 SEO:简介当我们要进行链接建设活动时,有时我们会发现没有很多链接的域名。但我们必须从根域开始工作。让我们继续讨论 TrustFlow 和 CitationFlow 的重要部分。也许,由于值较低,我们认为该页面不值得。César 分析了 来自 203 个参考域的 12,000 个链接。理想情况下,这两个数字匹配:域和 IP。否则它闻起来像链接网络。Majestic 为我们提供了时间线上链接和域的反向链接历史记录。当我们收到并增加链接数量、当我们购买大量链接等时,这对于检测活动非常重要。网站有链接增长的自然趋势。急剧上升可能预示着攻击、链接购买、链接建设活动等的结果。但我们必须看到原因。我们还看到 follow 和 nofollow 链接的分布。我们认为,它并不像人们认为的那么重要,至少在本垒板是这样。我们不应该担心。
我们的联系方式
电报:https://t.me/dbtodata
Whatsapp:https://wa.me/8801918754550
0 notes
Text
<img src="https://t3c.coupangcdn.com/thumbnails/remote/412x412ex/image/vendor_inventory/faa9/ef5b2db3c780d82f36e0cf7a6669434d82e42b4ed92d0f3c30958862fecb.jpg"/><h2>💥게임보이 어드밴스 GBA 백라이트 정품 IPS V2 스크린 151542 오리지널 Nintendo 32비트 휴대용 게임기💥</h2><h2><a href="https://href.li/?https://vvd.bz/ckd4" target="_blank" rel="noopener"><strong>🚀 구매정보 ✔️클릭하기</strong></a></h2><p>🖋️위 글은 쿠팡파트너스 제휴활동의 일환으로 일정액의 수수료를 제공받고 있습니다.</p><p>‼️가격비교는 물론 다양한 상품후기를 참고해주세요✔️</p><p>🙅메신저(쪽지)와 DM은 NO!</p>
0 notes
mobilemall · 1 year
Text
Vivo Y77t Price in Pakistan
Android 13 OS   OriginOS 3   164.1 x 76.2 x 8 mm   190 g   Dual Sim, Dual Standby (Nano-SIM)   Black, Mint, Gold   SIM1: GSM 850 / 900 / 1800 / 1900SIM2: GSM 850 / 900 / 1800 / 1900   HSDPA 850 / 900 / 2100   LTE band 1(2100), 5(850), 8(900), 40(2300)   SA/NSA   Octa-core (2 x 2.2 GHz + 6 x 2.0 GHz)   Mediatek Dimensity 7020 (6 nm)   IMG BXM-8-256   IPS LCD Capacitive Touchscreen, 16M Colors,…
View On WordPress
0 notes