• 0 Posts
  • 523 Comments
Joined 1 year ago
cake
Cake day: July 14th, 2023

help-circle






  • Because your friend would just be doing it out of curiosity, not as part of an investigation.

    It doesn’t matter why my friend wants to use my phone. If a friend wants to use my computer, I log out and sign into a guest account that doesn’t have access to my private documents. That’s not an option on my phone. It doesn’t matter if my friend has a legitimate reason to want to look at something on my phone. Maybe they want to see a picture I took last Friday - if they tell me that, I’ll just pull it up and share it with them.

    If my phone has something on it that can help the police and the police tell me what they’re looking for, I can check my phone myself and share specifically that information with them.

    If my phone doesn’t have that information, I can tell them that, too.

    This is the exact same as with my friends. The difference is that the police are much more likely to be antagonistic and much less likely to tell me what they want.

    If the police can’t articulate what they’re looking for or if they don’t trust me to tell me what it is, then I DEFINITELY don’t trust them to look at my phone themselves. And heck, that’s true of my friends, too.

    If I hand a police officer my phone unlocked, what’s stopping them from hooking it up to GrayKey or Cellebrite or some other similar tool, and dumping all the data from my phone without my knowledge - whether for legitimate or nefarious purposes? What stops them from doing this “out of curiosity?” This isn’t generally a risk with my friends, but it’s always a risk when dealing with the police.

    In the US, when there’s suspicion of police wrongdoing, the police investigate themselves (and either conclude that nobody did anything wrong or that only one person did something wrong but everyone else is fine). It’s so bad that it’s a meme (“We’ve investigated ourselves and found no evidence of any wrongdoing.”) But even if you don’t have the police investigating themselves in your country, it’s still the government doing that investigation. And nothing makes the government inherently trustworthy.

    As a private citizen of your country who was legitimately concerned that the police are retaining more data than necessary, could I visit the police station and ask them to give me supervised admin access to their computers (as well as the personal computers of anyone who might have had access to my device or to the data extracted from it), as well as full access to the station itself in case there are any unaccounted for computers, so that I can confirm that the police aren’t overstepping? If not, why not? It’s not like the police have anything to hide, right? And the sooner that the police cooperate and that information is shared with me, the sooner I can rest easy knowing I and my fellow citizens have not been victimized by the police.

    Hopefully you see how ridiculous it is for me to expect someone to just give me access to all of that information. That’s actually less ridiculous than a police officer asking me to hand them my unlocked phone.

    As a private citizen, I have to trust that police and government officials are doing their jobs properly. If they don’t, I can have my privacy invaded or be framed for a crime, with no method for recourse. And without any real accountability. I have to trust a police officer if I hand him my phone, and I’m the only one risking anything. In the opposite scenario, if I overstep while they’re supervising me reviewing their systems, they can hold me accountable immediately.


  • I’m a cop and I can tell you that, at least in my country, you’d have no reason to not unlock your phone if you haven’t done anything.

    I can understand that in some countries cops can be seen as criminals (and are behaving like criminals), but I don’t think a generality should be made.

    It sounds like you’re saying that you would assume that someone had done something illegal if they refused to unlock their phone for you. It’s a bit ironic that you then immediately say that people shouldn’t generalize about cops behaving as criminals.

    I don’t let my friends go through my phone. Cop or not, why would I let a stranger?



  • Now they demand internet accounts to use the features of the keyboard and mouse that I purchased.

    What are you talking about? Which keyboard, which mouse, which features, and which “internet accounts” are they requiring?

    Also, Logitech still distributes the older software and it still works for the mice that it used to work with. My MX Vertical works with Logitech Options or the new Logi Options+ software, for example.

    Did you try using that software with your new peripherals?

    You can find the list by device at https://support.logi.com/hc/en-us/articles/360024361233--Software assuming this isn’t from their gaming line or something. In that case, go here instead: https://support.logi.com/hc/en-us/categories/360001764393-Gaming

    Not only that, have to use wide-open-to-snooping Chrome to adjust the settings. You cannot adjust/use your mouse and keyboard if you just use Firefox.

    I highly doubt that the mouse and keyboard cannot be used without Chrome.

    Due to security concerns, Firefox did not implement the WebSerial API that’s most likely used to configure your mouse locally. Chrome did. It’s therefore completely reasonable that you would not be able to configure your mouse from Firefox.

    That API is also supported by Edge and probably by most Chromium-based browsers, like Brave, the “Ungoogled Chromium,” etc… If you have one installed and it doesn’t work, you can probably change your user agent to trick it into thinking you’re running Chrome as a workaround. Most likely they only tested with Chrome and therefore only say they support Chrome, but don’t actually use any Chrome-exclusive functionality.

    This only makes sense if they are planning (or are already) tracking my every move online to sell to advertisers or spooks.

    That’s a bit of a leap.

    If you use Firefox for browsing and only use this Chrome to run this tool to configure your keyboard and mouse, then even with cross-site cookies and so on unblocked, none of that will be visible from the other browser. So this makes you more isolated, not less. Having it in a browser app instead of a desktop app gives you more protection, not less.

    If a company can provide a browser app to do everything a desktop app could, then they can speed up development without having to use something like Electron to distribute their app. And there’s even less friction than Electron because their don’t have to check for updates / require users to install the latest version manually, because they can just always serve the most recent one from the site. As a user, you can probably install the tool locally if you want (it’s likely a PWA) but you don’t have to, meaning you get less software installed on (or worse, constantly running in the background) on your machine.


  • The Keychron K2 and K6 both look solid. Starting at $70 for a Bluetooth/wired mechanical keyboard, RGB backlighting, extra keycaps for Macs / OS toggles… there’s even a hot swappable variant for $10 more (or heck, on sale for $70), option for an aluminum frame… shame they don’t run on QMK.

    Oh - turns out they have several keyboards that do run QMK/VIA, like the K6 Pro.

    If I used staggered keyboards for anything other than gaming, or if I didn’t already have a wireless gaming keyboard, I’d be considering one.


  • I don’t know that a newer drive cloner will necessarily be faster. Personally, if I’d successfully used the one I already have and wasn’t concerned about it having been damaged (mainly due to heat or moisture) then I would use it instead. If it might be damaged or had given me issues, I’d get a new one.

    After replacing all of the drives there is something you’ll need to do to tell it to use their full capacity. From reading an answer to this post, it looks like what you’ll need to do is to select “Change RAID Mode,” then keep RAID 1 selected, keep the same disks, and then on the next screen move the slider to use the drives’ full capacities.


  • We already beat back the fascists, back in 2020 and 2012 and so on. When do you expect we’ll be able to check that one off?

    We elected Biden and even had a Democrat majority in both the Senate and House until 2022. Do you mind refreshing me on what they did to implement ranked choice voting?

    RCV is being banned by states quicker than it’s being adopted (and many of its opponents are Democrats) even though it wins by huge margins when people are allowed to vote for it. I’m skeptical of any argument against voting for parties with our best interests in minds until it’s implemented. I’ve been hearing the rhetoric that “this election is critical and if you vote third party, you’re throwing your vote away” since Gore vs Bush, and I don’t think it was new then, either. Lately it’s morphed into “a vote for a third party is a vote for Trump,” which isn’t even remotely how it works.

    If Democrats aren’t competently opposing the fascists, why should we keep supporting them?


  • upper capacity

    There may be an upper limit, but on Amazon there is a 72 TB version that would have to come with at least 18 TB drives. If 18 TB is fine, 20 TB is also probably fine, but I couldn’t find any reports by people saying they’d loaded 20 TB drives into theirs without issue.

    procedure

    You could also clone them yourself, but you’d want to put the NAS into read only mode or take it offline first.

    I think cloning drives is generally faster than rebuilding them in RAID, as well as easier on the drives, but my personal experience with RAID is very limited.

    Basically, what I’d do is:

    1. Take the NAS offline or make it read-only.
    2. Pull drive 0 from the array
    3. Clone it
    4. Replace drive 0 with your clone
    5. Pull drive 2 (from the other mirrored pair) from the array
    6. Clone it
    7. Replace drive 2 with your clone
    8. Clone drive 0 again, then replace drive 1 with your clone
    9. Clone drive 2 again, then replace drive 3 with your clone
    10. Put the NAS back online or make it read-write again.

    In terms of timing… I have a Sabrent offline cloning hub (about $50 on Amazon), and it copies data at 60 Mbps, meaning it’d take about 9 hours per clone. Startech makes a similar device ($96 on Amazon, that allegedly clones data at 466 Mbps (28 GB per minute), meaning each clone would take 2.5 hours… but people report it being just as slow as the Sabrent.

    Also, if you bought two offline cloning devices, you could do steps 1-3 and 4-6 simultaneously, and do the same again with steps 7-8.

    I’m not sure how long it would take RAID to rebuild a pulled drive, but my understanding is that it’s going to be fastest with RAID 1. And if you don’t want to make the NAS read-only while you clone the drives, it’s probably your only option, anyway.






  • There’s nothing about our neural architecture that has “3D” built into the information it can process.

    I think we are very much hardwired to innately understand 3d space in an intuitive level.

    Is that just based off of something more concrete than what feels right to you? If a neural network on a computer can interact with four dimensional data, why wouldn’t we be able to?

    It isn’t as automatic in three dimensions as you make it sound. Based off of the amount of learning and experimentation we do as infants, it seems reasonable to theorize that if a human were to be born in a fourth dimensional realm and to be implanted with some sort of sensory organ(s) that function in the fourth dimension, they would be able to gain an intuitive understanding of that world in the same way that they gain intuitive understandings of this one.


  • You can use AI for free on your own hardware.

    AI is committing mass theft of copyrighted information and data on a widespread scale, the only way they are going to be able to train their AI models and have been training their AI models are through free information that has been taken from users, people of the world, sold to them by third parties.

    By “mass theft of copyrighted information,” what do you mean? Who had the copyrighted information but no longer has it? Do you mean copyright infringement? If so, then you should look up “fair use” and keep reading until you understand why they think it’s applicable to their use case.

    And by “data that has been taken from users,” do you mean by users who agreed to terms of service allowing the use or sale of their information/contributions to the site, generally so they could use a site for free?

    Do you think that receiving a service has zero value, or that providing that service has zero value? If so, then why did all of those people use those zero value services in exchange for their information?