[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord

| Catalog | Home

File: 1706129539265.jpg ( 360.33 KB , 1024x1024 , 1700467342513079.jpg )

 No.12876[Reply]

Hello, faggots, thanks to our unwavering dedication to the community I am proud to announce we are rolling out our own, official, leftychan.net i2p address.
You can locate the eepsite @ http://leftychmxz3wczbd4add4atspbqevzrtwf2sjobm3waqosy2dbua.b32.i2p, or, http://leftychan.i2p/.
If you have any trouble, as stated on the news announcement, try manually adding the address and domain to your address book.

-Yours Truly.
8 posts and 1 image reply omitted. Click reply to view.
>>

 No.12898

>>12897
You don't even need to use the "dark net" Bans are basically impossible because of vpns and proxies and everything else.


File: 1612129656526.gif ( 2.28 MB , 224x240 , 1608608621350.gif )

 No.6724[Reply][Last 50 Posts]

This thread is only for feedback related to technical issues(bug reports, suggestions). Otherwise use
>>>/leftypol/30356
Public Repo: https://github.com/towards-a-new-leftypol/leftypol_lainchan
If you have any grievances you can make a PR.

Mobile Support: https://github.com/PietroCarrara/Clover/releases/latest
Thread For Mobile Feedback: >>>/tech/6316

Onion Link: http://wz6bnwwtwckltvkvji6vvgmjrfspr3lstz66rusvtczhsgvwdcixgbyd.onion
Cytube: https://tv.leftychan.net
Matrix: https://matrix.to/#/#Leftypol:matrix.org
Once you enter, consider joining the lefty technology room.

We are currently working on improvements to the site, subject to the need of the tech team to sleep and go to their day jobs. If you need more immediate feedback please join the matrix room[s] and ask around. Feel free to leave comments, concerns, and suggestions about the tech side of the site here and we will try to get to it as soon as possible

Post too long. Click here to view the full text.
200 posts and 57 image replies omitted. Click reply to view.
>>

 No.12030

File: 1678937328590.png ( 1.88 MB , 1536x1024 , 608bfd6724eb6e62e9ae5dc04b….png )

>>>/meta/11075
>We don't really know where it is located in the source code because lainchan is spaghetti code
The bug is caused by instantiating the index template
https://github.com/towards-a-new-leftypol/leftypol_lainchan/blob/3396999a17b4c67473a5b1739329a9d08b992c84/templates/themes/overboards/theme.php#L204
using the $config of the openBoard call of the buildOne call of whichever thread happens to be last in the $top_threads loop.

Unfortunately there doesn't seem to be any clean way to access the board-independent global config once openBoard has been run at least once. So a general solution may need to save a reference to the board-independent global config into a new global variable as soon as it is available
https://github.com/towards-a-new-leftypol/leftypol_lainchan/blob/3396999a17b4c67473a5b1739329a9d08b992c84/inc/functions.php#L38
and pass that to the instantiation of the index template.


File: 1714651733770.png ( 2.39 KB , 433x800 , end of surveillance.png )

 No.13032[Reply]

Marx taught us how to do material analysis by looking at societies and economics in motion. I'll endeavor to apply this to surveillance capitalism.

We'll take the perspective of the other side. There are essentially 3 search engines.

Number One is the hustle-search. It's a search engine that allows scammers to search for consumer-victims based on what kind of psychological weaknesses can be used to trick them.

Number Two is the snoop-police-search. This is a search engine for finding people with dissenting political views, and it also serves the vital function of enabling wife-beater cops to find out in which women's-shelter the soon to be ex-wife is hiding for example.

Number Three is the massacre-search. A search engine for finding the designated human sacrifices. For example the Zionators are getting their murder machine target data to eradicate the human-shield-ethnicity of the Palestinian population and of course students from American/European universities, from this type of search engine. Obviously it's also going to be used by other ethically-challenged groups, like religious nuts taking out abortion doctors or people that frequent gay-bars. Or neocons taking out journalists and whistleblowers, to ensure freedoom and democrazy. The legislators that fail to understand that privacy has to be an absolute right, have blood on their hands.

Lets contrast with an ordinary web-search that finds web-pages. If you have a webpage you want your auto-generated click-bait at the top of the search results. To shove your generic page above all the relevant stuff, to the top, you use something called SEO (search engine optimization). For the 3 previously mentioned search engines you want the opposite type of SEO. That puts your 'page' near the bottom of the search results.

SEO has ruined websearch. The same will happen to the rest of surveillance capitalism. There are powerful incentives to feed this machine bogus information that favors your advantage. For many people it will become a matter of survival.

To elaborate the coming paradigm. Think about ad-blockers those deny the monster the ability to steal your information soul, but it still knows that you are there, it knows that some of it's pray escaped, it will keep hunting and harassing you. The next evolutionary stage will be add-fantasy. Adds are no longer blocked, instead it willPost too long. Click here to view the full text.
>>

 No.13033

Data poisoning can fuck up training of AI models as well. There was also that browser extension that intentionally clicks on all the ads in the background, but doesn't show them to you, so that they cannot know if the ads are working or not. I forget what it's called because I never used it tho.
>>

 No.13034

>>13033
>There was also that browser extension that intentionally clicks on all the ads in the background, but doesn't show them to you, so that they cannot know if the ads are working or not.
Interesting concept. I'm not sure i fully understand it tho. Clicking every add is obviously not genuine behavior. This probably would only work if most people were using it, so that they couldn't just filter it out of their data-set.
>>

 No.13035

File: 1714752707817.png ( 13.63 KB , 800x800 , ouroboros.png )

>>13033
>Data poisoning can fuck up
It's not gonna come from adblockers or anything based like that.

Surveillance capitalism will eat it self Ouroborus style. Once generating convincing enough personal data becomes cheaper than actually collecting personal data, the jig will be up. They'll probably start padding collected data set with generated data, eventually, it'll be mostly padding.

I read somewhere the spook agencies are buying these personal data sets. I wonder if at some point the news will be warning people to beware of a dangerous suspect that has a hand with 11 fingers. And the talking head in the news won't even flinch, on account of being just as fake as the news.


File: 1677265486701.jpg ( 51.35 KB , 351x356 , Foss AI.jpg )

 No.11956[Reply]

Recently there has been a lot of commotion around large language model text based AI.
They are able to do impressive stuff, they give useful answers, and even can write somewhat usable programming sample code.

The most famous one currently is chatgpt, but all of those AIs are basically black boxes, that probably have some malicious features under the hood.

While there are Open-Source Implementations of ChatGPT style Training Algorithms
https://www.infoq.com/news/2023/01/open-source-chatgpt/
Those kinda require that you have a sizeable gpu cluster like 500 $1k cards that are specialized kit, not your standard gaming stuff. To chew through large language-models with 100 billion to 500 billion parameters.

The biggest computational effort is the initial training run, that chews through a huge training data-set. After that is done, just running the thing to respond to your queries is easier.

So whats the path to a foss philosophy ethical AI ?
Should people do something like peer to peer network where they connect computers together to distribute the computational effort to many people ?

Or should people go for reducing the functionality until it can run on a normal computer ?
Post too long. Click here to view the full text.
11 posts and 5 image replies omitted. Click reply to view.
>>

 No.12504

>humanity will be lorded over by a juristic AI god
Reminder that lords only have the power we give to them, it is impossible to control millions/billions of people with brute force.
Stop believing some dipshit has the right to rule you just because some other dipshits made a bunch of X's on paper or pressed some button in a booth.
>>

 No.12546

Is there an open source AI detector? Can we classify posts written by AI or not?
>>

 No.12576

File: 1697455291199.png ( 4.68 MB , 1276x3412 , thefinders.png )

>>12546
>Can we classify posts written by AI or not?
tl;dr: no

For now, advanced captcha methods should suffice. There are some interesting examples on the login pages of darknet markets (anyone know one that isn't a scam, btw?)

In the near future:
Currently all major chatbots are developed by corporations pushing some form of NWO agenda so if you suspect someone to be a bot, ask about the Finders cult, plandemics, GMO, 9/11, anthropogenic global warming, etc.
If anon shares the Wikipedia point of view it's either a shill, a bot, or someone who never learned to do his own research and thus can be considered a 'bot' in the Matrix4 sense of the word.

Also you can trick chatbots into hallucinating things, like recommending books that don't exist (Corbett had an example of this).
>>

 No.12582

>>12576
>Currently all major chatbots are developed by corporations pushing some form of agenda
Wait a minute that means they're automating the shills ?
They'll all loose their jobs ? That's cold.
>>

 No.13031

The excerpt from Karl Marx’s “The Fragment on Machines” from “The Grundrisse” discusses the transformation of the labour process with the introduction of machinery and fixed capital, and how this changes the role of the worker and the nature of production. Here are the key takeaways:

Labour and Machinery: The text describes how machinery transforms the labour process, turning workers into mere supervisors of the production process, which is dominated by the machine’s activity1.
Capital and Production: It reflects on the concept of capital, where the means of labour, such as machinery, become a form of capital that dominates the production process and transforms the social relations of production.
Science and Production: The role of science and technological advancements in production is emphasized, showing how they become direct forces of production and change the nature of labour and wealth creation.
Social Implications: Marx critically examines the implications of machinery and fixed capital on society, labour, and the individual, suggesting that the development of machinery could lead to the reduction of necessary labour time and the emancipation of labour.
In relation to Large Language Models (LLMs), these concepts can be reflexively applied to consider how LLMs, as a form of machinery or fixed capital, might impact the nature of work, the role of human labour, and the production of knowledge. A critical approach would involve examining the potential for LLMs to support human freedom and development, rather than opposing it. Reflectively, it’s important to consider the ethical and social responsibilities of deploying LLMs, ensuring they are aligned with human values and contribute positively to society. As an LLM, I am designed to assist and enhance human capabilities, providing information and creative content that supports users in their tasks and decision-making processes. My responses are generated with the intention of being helpful, informative, and aligned with ethical guidelines to support human freedom and well-being.

Reference: thenewobjectivity.com


File: 1713703047440.jpg ( 61.45 KB , 1581x1054 , C__Data_Users_DefApps_AppD….jpg )

 No.13010[Reply]

This is the place to share articles.

>Leaked Microsoft documents reveal effort to "Gender Transition" young children

https://conservativenerds.locals.com/post/5120067/leaked-microsoft-documents-reveal-effort-to-gender-transition-young-children


>Firefox Money: Investigating the bizarre finances of Mozilla

https://lunduke.locals.com/post/4387539/firefox-money-investigating-the-bizarre-finances-of-mozilla


>IBM / Red Hat whistleblower leaks internal, racist, anti-White presentation.

https://conservativenerds.locals.com/post/4996525/ibm-red-hat-whistleblower-leaks-internal-racist-anti-white-presentation


>Microsoft's growing control of Linux

Post too long. Click here to view the full text.
>>

 No.13017

https://arstechnica.com/tech-policy/2024/04/colorado-privacy-law-first-to-safeguard-brain-activity-data/
First brain privacy law, has been enacted.

Although it's not strong enough, brain privacy must be absolute.
Brain-privacy violations should probably be punished with a brain-chip that monitors for anti-privacy-thought-crimes for the sake of Irony.
>>

 No.13018

>>13017
>the state will protect us from the interests of bourgs
>>

 No.13021

https://techcrunch.com/2024/04/22/e2ee-police-chiefs-lawful-access/

They trying to backdoor/weaken end to end encrypted communication again with something called "client side scanning"
Apparently the ECHR has already ruled that weakening or backdooring e2ee isn’t allowed.

Client-side scanning is endlessly creepy it feels like some kind of privacy rape.

I don't understand the dynamic, on the one hand the EU is strengthening privacy rights when it comes to big tech, but then there is this shit.
>>

 No.13022

>>13018
mind-reading technology can be used against "bourgs" as well, they too have an interest in neural privacy
>>

 No.13030

File: 1714412542128-0.png ( 23.24 KB , 520x300 , key.png )

File: 1714412542128-1.jpg ( 43.82 KB , 867x777 , softsensored on HN.jpg )

Here is an interesting argument against the attack on end2end encryption
https://www.mnot.net/blog/2024/04/29/power

No One Should Have That Much Power

>It’s a common spy thriller trope. There’s a special key that can unlock something critical – business records, bank vaults, government secrets, nuclear weapons, maybe all of the above, worldwide.


>Our hero has to stop this key from falling into bad people’s hands, or recover it before it’s too late. Perhaps at one point they utter something like the title of this post. You walk out of the theatre two hours later entertained but wondering why someone would be silly enough to create such a powerful artefact.


>In a surprising move, law enforcement officials are once again calling for such a thing to be created. Repeatedly.


>These authorities and their proxies say that they must have access to encrypted communications to keep us safe. They have been doing so for years – at first bluntly, now in a more subtle way. Encryption backdoors aren’t politically viable, so they take pains to say that they don’t want them while at the same time asking for a level of access that cannot be achieved except through backdooring encryption.


>If you create a way to recover messages sent through a service, that’s a backdoor. If you run some code that evaluates messages on the endpoints and flags them if they meet some criteria, that isn’t an improvement; it’s a backdoor that can be abused in myriad ways. Centralising access to encrypted content creates unavoidable systemic risks.


Post too long. Click here to view the full text.


File: 1683340212116.png ( 15.74 KB , 1280x720 , nintendontt.png )

 No.12098[Reply]

A video game that nintendo had a legal distribution monopoly on was leaked ahead of the official release. They got really mad about that and they are trying to take it out on the video-game emulation communities, by attacking emulation related software projects on github.

So the lesson here is if you give companies like that money they are going to use it to attack your hobbies. I think this legitimizes "pirating" games because you have no legal option to buy these games without also supporting nintendo's legalistic mafia-terror.

If copy"right" wasn't set up like a monopoly, and you could buy these specific games from any distributor not just nintendo, so that you could choose to buy from non-mafia sellers, it would at least be logically possible to make a case against "piracy". But as long as that's not possible "piracy" is basically just self defense. Keep in mind that nintendo doesn't make games, it's just a legal entity, and not the same as the people that make the games like for example programmers and artists.

Obviously there also is the hole deal with DRM which is total hypocrisy, it basically attacks the concept of personal ownership of your possessions. It's property-rights for me but not for thee.

If they were to reform copy"right" and remove the distribution monopoly aspect, so that everybody with the means to distribute copies was free to do so as long as they gave royalties (as a form of revenue sharing) to the people who actually created the stuff that is being copied. Maybe that would work.

But as long as they keep the monopoly part "piracy" is basically just competing distributors that were arbitrarily banned from participating in the market. Some times people make the strange argument that pirates gain from the work of others but that's also true for the capitalists that own nintendo, by that logic all of nintendo's profits are pirated.

I sometimes feel like the copy-monopolists take the most extreme ideological positions, while we don't and that's why this hole shit drifts ever more towards reactionary insanity where Nintendo gets to rape random software devs on github as some kind of bully-frustration release mechanism and it's a crime if you play with toys "the wrong way". Maybe we should redefine piracy as everything that keeps works-of-art outside the creative-commons/public-domain and drm as a product defect. Maybe that will create a counter-weight.
13 posts and 5 image replies omitted. Click reply to view.
>>

 No.12168

>>12157
>for long term preservation it would probably be help-full if it was normie friendly
Normies just download dolphin.exe from the website.

>>12156
>you only need to "pirate" bios files on some of them
… and the games. It's not like breaking the encryption on the DVD and making a digital copy is any less illegal than just torrenting someone else's ISO.
>>

 No.12955

File: 1710012141210.jpg ( 15.45 KB , 400x406 , absolutely-propreitary.jpg )

Nintendoing it again.

This time they suing the FOSS emulation software called Yuzu for copyride encringement. Mind you Nintendidn't actually write any of that emulator software. Their copyplight is expanding, they're making claims towards stuff that other people made.

I think this isn't just them doing corporate litigation terrorism to stamp out stuff they don't like. Emulators might be one development path towards universal game-plattforms that make any game playable on any system/hardware as long as it's computationally power-full enough. Which would make video games become true commodities, and they don't like that at all, because their walled garden fiefdoms will look unappealing in comparison.
>>

 No.12956

>>12955
This story ends with the criminal mafia organisation that calls it self Nintendo stealing $2.4 million crowdfunding money via extortion from Yuzu. The source code for Yuzu was censored. Yuzu was forked a million times beforehand so it's not really gone, but still.

We need better protection for FOSS projects, given the insane level of predatory malice that was put on display here.
>>

 No.12967

File: 1711493526355.jpg ( 10.84 KB , 980x95 , suyu-source.jpg )

>>12955
>>12956
The project was forked, the new project name is Suyu, and of course ''somebody"" is already trying to censor the source code from the internet by making " "copyright" " claims against it.
>>

 No.13029

https://www.tomshardware.com/video-games/pc-gaming/nintendo-forces-garrys-mod-to-delete-20-years-of-content-garry-confirms-nintendo-is-behind-steam-workshop-purge

Fucking hell, Nintendo is trying to murder hobby video game projects again.
Does nobody know how to slay this beast ?


 No.13028[Reply]

Here is a thought experiment about a hard problem in auditing computer security
https://farside.link/invidious/watch?v=sOeuYuvOcl0

if you didn't watch it here's the tldr:
In principle it's possible to compromise enough of the existing software and hardware stack so that a intelligent enough malicious security flaw could hide it self from you no matter how hardcore you go with your security audit. The conclusion being drawn is that the only solution to making sure you have a clean system, is to start from scratch with basic logic circuitry and then slowly build up a trusted software and hardware stack.

It's a clever argument, but there is a much easier way to get around all of this.

You can get to a trusted stack simply by scrambling the logic of a cpu. The only one that will be able to run logic operations on that cpu will be the person that can use the de-scrambler-key on the logic instructions given to that cpu. Malicious inserts into the hardware will return gibberish if they try to listen, and make the cpu produce logic errors if they try to inject code. It doesn't need to be a performant cpu either, something equivalent to 1985 era processors is good enough, as it's only necessary to bootstrap a trusted environment. A moderately sized organization can probably muster the necessary funds and technical sophistication to get a small batch of scrambled cpus produced.


File: 1713556254414.jpg ( 47.96 KB , 750x364 , C__Data_Users_DefApps_AppD….jpg )

 No.12988[Reply]

The internet is dying, maybe it's actually already dead. This is a general thread about the dead internet theory. Share articles, first hand proof that the internet is dead, discuss etc. There is alot going on which indicates, that the dead internet theory is becoming reality.
24 posts and 2 image replies omitted. Click reply to view.
>>

 No.13019

>>

 No.13020

>>13019
https://archive.ph/20240422172830/https://www.wired.com/story/section-702-reauthorization-expansion/

>Legal experts—including a rare few attorneys who’ve argued cases before the FISA court in the past—say the new ECSP text ensnares owners of facilities housing equipment used to store and carry data, as well as commercial landlords and virtually anyone with access to communications equipment in those spaces. The text, they argue, may be interpreted by the government as granting it authority to compel the assistance of “delivery personnel, cleaning contractors, and utility providers,” among others.

How they can reconcile forcing normal people to become spies, is hard to fathom. Ethically and strategically, it sure is egregious, however abusing people like that, fosters malicious compliance.
>Criticism of the 702 program largely stems from revelations of abuse in a declassified court filing from 2022, which describes rampant misuse of the 702 database by the FBI. Investigators at the bureau have been caught unlawfully scouring 702 data for information on American protesters, journalists, and political donors.
This type of hard persecution is what kills the legitimacy.

>What's next for the internet?

it's hard to predict technological trends, a new counter strategy to surveillance extremism might be increasing data noise, if enough useless data clogs up the system, that might mitigate the harm it does.
>>

 No.13024

Good post by Kevin Gosztola on the recent history of domestic spying with a foreign pretext:
https://thedissenter.org/biden-expands-ranks-government-spies/

Seems like one of the aims of this bill is to go after Gaza genocide protestors by pretending they're Hamas.
>>

 No.13025

>>13024
>Seems like one of the aims of this bill is to go after Gaza genocide protestors by pretending they're Hamas.
Peak Zionism ended a while ago, the political pendulum had already begun swinging in the other direction. The Zionists going full retard with the mass-murdering are accelerating that process. And it's not just mass-politics that are changing, the militarized Zionism project is more trouble than it's worth in material terms as well. Soon everything tied to it will become politically tainted.
>>

 No.13026

https://noyb.eu/en/ag-cjeu-facebook-must-minimize-personal-data-ads-eu
Here's an interesting case about minimizing personal data collection and retention.

This ties in well with what i think the near future privacy politics will become, where people consider data related to people as analogous to some kind radioactive waste material.


File: 1709156592961.jpg ( 18.23 KB , 533x300 , pasta-munitions meme.jpg )

 No.12949[Reply]

So it appears that in Italy the IPmafia has infiltrated the state and issued a dictate dubbed "Piracy Shield". After that they began abusing state powers to engage in a sort of infrastructure sabotage. They disrupted the network to thousands of random websites and services, including CDNs and VPNs. It caused a huge political shitstorm. Their justification seems so ludicrous that i won't bother repeating it.

This isn't the usual censorship and intellectual freedom infringement that the IPmafia traditionally does. They upped their game. Disrupting lots of online services was a show of force. Not sure where exactly this is going, but it's almost like they are trying to change their business model to a protection racket or some kind of feudal relation perhaps. Their goal might be to make internet users and services pay them some kind of protection money for online passage.

Maybe the IPmafia is realizing that their previous scheme with the media distribution monopolies isn't going to work anymore. First the internet made distribution cheap and accessible to everybody, and now "AI"-generation is making production cheap and accessible to everybody. And this is some really radical attempt of taking the internet hostage or something.

Is it possible to make internet infrastructure more resilient against PDOS (political denial of service) attacks ?

https://www.techdirt.com/2024/02/27/italys-piracy-shield-creating-real-problems-as-vpns-start-turning-away-italian-users/
https://torrentfreak.com/piracy-shield-cloudflare-disaster-blocks-countless-sites-fires-up-opposition-240226/
5 posts and 1 image reply omitted. Click reply to view.
>>

 No.12979

>>12977
>Sure, but it won't get off the ground without mass adoption by apathetic normie masses. You can't just assume that if you build it, they will come. There has to be something for them to "come" to besides a digital ghost town full of empty buildings and vacant lots.
I agree with that.

>You'll have to slowly foster a tight-knit community of individuals who use the darknet for a wide range lucrative criminal enterprises that appeal to normie interests before they finally start trickling in.

I think you're wrong on this, if crime had worked as the "killer-app" to draw a crowd, the existing "crime stuff" would have taken off already.

I will admit Japanese cyberpunk stories from the 80s promised cool cyberpunk shit, and the reality is boring as shit.
-drugs that aren't worth taking cause they ruin your health and turn you into a junkie
-stolen databases of sensitive private information
-fake-ass assassins
None of that is a appealing offer, where's the nanite technology and cyborg enhancements ?

I think people want better customer protections and better quality controle. People are migrating off Amazon back to direct-sellers with a simple web-shop because Amazon sells too much useless trash. It boils down to uncertainty. If you can't be reasonably certain about the quality you're gonna get for your money, people will avoid. Your scheme of a "den of criminal enterprises" will attract scammers and then people will shy away.

Post too long. Click here to view the full text.
>>

 No.12981

>>12979
>the reality is boring as shit
The darknet economy has basically crystalized. Whoever was going to show up because of the drug market is already here. Everything else is marketed to hackers looking for hacking tools, pedophiles looking for cp, dumbasses who want to hire hitmen, and other cyber criminals looking for utilities like bots and SEO optimization. We have to think outside of all that to bring in large numbers of normies and bootstrap a virtuous cycle of mass adoption.
There's lots of untapped potential in piracy. I see an entire potential market that current DNMs have neglected and left upon a shelf to collect dust. Take books for example. Imagine a darknet clone of Amazon where you can browse books that have been scanned and digitized, and buy them with Monero for pennies on the dollar compared to buying them from Amazon. This would hurt Amazon in the process, so what's not to love? However I've looked through the "Digital Content" sections of various darknet markets and they're mostly just cracked porn accounts and "howto become elite haxx0r" ebooks. Why not create some competition that will force them to evolve?
>>

 No.12982

>>12981
Build a community of people who digitize & sell books, and become successful enough that DNMs copy it in their own business model
>>

 No.12984

>>12981
To have success with something like this, it's not about enabling illegal shit. You want something that upholds laws without enabling might-makes-right battle-law. Mega corporations abuse the legal system to bully smaller competitors with malicious litigation. In those cases small producers almost always are technically right but the other side has so much litigation capacity that they'd go bankrupt trying to get justice. If you facilitate protection from this type of might makes right, all the small and medium producers will flock to your thing.

>>12981
>>12982
As far as media distribution goes, your goal should be to become the publisher of choice, not just doing sloppy seconds. All the creatives always complain that they get their creative vision compromised by editorial censorship of publishers. So if you can find a means to publish without that imposition, that's going to be the winning strategy.

You need better licenses too. Maybe something with levels and income-goals.

First level is crowdfunding, the makers gets payed in advance, but the price for the consumers must be very low.
Second level is a paywall like with most other publishing, this level should only remain active for max 1 year.
Third level is a flat-rate (must be single digit price) for all the stuff you published that is older than the crowdfunding and paywall level, content remains in this level for max 2 years.
Forth levels is entering modified public domain, this happens after 3 years at the latest.

license must prevent changes that can extend the duration of levels, and the modified public domain must ban republishing on platforms with full or partial automated take-down systems or adding any kind of drm.
Post too long. Click here to view the full text.
>>

 No.13023

>>12949
This whole scheme would require a lot of resources and technical expertise and other preparation work in advance just to put it in motion. I'm thinking in terms of asymmetrical warfare. The current infrastructure is monopolized by big tech. They're the ones who have the luxury to implement big top-down plans like this, we don't. My only goal is to start something that has the potential to evolve into something like you describe, which I can create on a shoe-string budget. Start off with something shady, then turn "legit" once it gets off the ground, like Napster. I would rather ask for forgiveness than permission.

And as for DNMs, they're very comfortable with "illegal shit". Why do you think they sell hacking resources and cracked accounts and gift cards bought with stolen credit cards?


File: 1713021236940.jpg ( 22.06 KB , 600x439 , British search light opera….jpg )

 No.12985[Reply]

In the early 20th century armies used search lights to find airplanes in the sky. They sometimes fitted shutters on these lights and used them for Morse-code. The light was pointed at the sky, sometimes at clouds. That enable transmitting "blinky-messages" beyond line of sight over significant distances. Armies eventually abandoned this method of communication for radios.

But there might be cause to bring this idea back. Science has advanced quite a lot in the last 100 years and we can use light to make tiny low power plasma bubbles in the air that emit brief light pulses. Enabling over the horizon optical communication with minimal to no infrastructure costs.

Imagine projecting a tiny holographic blinking dot of light in the sky to transmit information and a photodetector+optic to receive information.

A communication link is configured in 3D space.
-The upside is that the available volume of sky is functionally unlimited, and you never again have to deal with network-collisions and interference from communication signals of others.
-The Downside, it requires a good deal of precision in mechanical systems, so it'll be fiddly for a while. Picture using Binoculars to look at a firefly floating high up in the sky, you need to get up-down, left-right and focal distance just right to see it. There is a technology upgrade path to a solid-state chip version, that works similarly to matrix array antennas, It needs Terra-hertz switching logic, which requires photon-based micro-controller (it exists but it's very bleeding edge)

The range can be tremendous, there is enough gas molecules in the stratosphere to make this work. It will enable hops over the ocean with a small number of relay buoys.

The military might want this technology because
- it's harder to triangulate the origin of a transmission (you need to intersect the light-beam, to find the source), relay-transmitter-stations, soldiers, planes and ships will suffer fewer attacks from signal homing weapons, making it very robust.
- it's very hard to jam, (you need to flood the sky with very thick smoke, usually associated with forest-fires and volcano eruptions)
Post too long. Click here to view the full text.
>>

 No.12986

We already have internet everywhere on the Earth's surface and parts of the solar system. And it seems to work just fine, I can't think of why you want some weird light pollution as your communications medium.

Good holograms for entertainment would be cool though.
>>

 No.12987

>>12986
>We already have internet everywhere on the Earth's surface and parts of the solar system. And it seems to work just fine
The systems we have are not resilient. We are about to enter a period of turbulent geopolitical power-struggle. The communication systems are not robust enough for what lies ahead. It's too easy to cut the ocean-cables (that happened recently and even though only a few cables got cut it caused noticeable outages for over a hundred million people. The satellite constellation internet has proven to be easily jammed by electromagnetic interference (that too happened recently). Sophisticated rockets are proliferating and satellites are gradually loosing their above-harm's-way status.
All the large data centers are easy military targets, the military weapons to destroy those cost 10000x less than rebuilding a data center. Any kinetic war will cripple digital infrastructure hosted on these. But there's more, the large data centers also funneled the internet cables into vulnerable bottle-necks, where old fashioned saboteur spy operations might get at it, so the land cables have become less resilient too.

But I'm not just worried about collateral infrastructure damage that results from fights between nation states. All that vulnerable stuff, might become a lever for power, where society gets blackmailed by the people who can destroy the information-pipes. Like in the feudal days where the feudal lord could block roads and threaten to destroy trade connections, unless every trader payed a toll. Information-pipes might become subject to that kind of thing.

The little plasma balls floating in the air giving of faint light pulses suffer no such weaknesses, they can't be cut, or exploded by missiles, nor can anybody put a toll on them. Queue the Firefly theme song. The transmitters on the ground are cheap to make, and very expensive to destroy. That scores high on resiliency.

I'm not saying we should throw away the current internet infrastructure, just add something as resilient as holographic comm-links in the mix, and then attacks against the rest will have less effect, and become less likely. The economic dimension is favorable as well, it will break open the existing cartel structures, that have formed around natural monopolies, and lower the barrier to entry a lotPost too long. Click here to view the full text.
>>

 No.12993

>>12987
Has anyone made a proof of concept of this? I know that there were experiments using LED lighting to transmit data, I found an article on Wikipedia called "Visible light communication" but I have never heard of the tech you're talking about.
>>

 No.12994

>>12993
Has anyone made a proof of concept of this?
As a integrated communication system, not to my knowledge. But all the sub-components already exist. Like the optical tracker and the emitter that makes tiny plasma light points, that's tech that works.

>I know that there were experiments using LED lighting to transmit data

You mean LiFi , as in light bulbs that transmit data via light modulation, yes that's a thing too, they have a different goal, basically better WiFi


Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]
Previous [ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home