JPEG XL

Info

rules 57
github 35276
reddit 647

JPEG XL

tools 4225
website 1655
adoption 20712
image-compression-forum 0

General chat

welcome 3810
introduce-yourself 291
color 1414
photography 3435
other-codecs 23765
on-topic 24923
off-topic 22701

Voice Channels

General 2147

Archived

bot-spam 4380

off-topic

_wb_
2023-08-02 07:30:46
made a complaint https://github.com/GoogleCloudPlatform/gsutil/issues/1732
Fraetor
_wb_ why is `google-cloud-cli` such a huge package? it's the biggest debian package I have
2023-08-02 05:36:17
On the smallest GCP instances the iops aren't great[1], so if you create a fresh VM, and then run `sudo apt upgrade`, the `google-cloud-sdk` package can take around 20 minutes to update. Not a great look for people's first experience of cloud computing. [1]: They have a burstable system, so it is fine until you reach a certain level of usage, then slows to a crawl. Unfortunately the burst pool starts out empty on a fresh install.
spider-mario
2023-08-05 09:17:26
https://markshreeve-tributealbum.bandcamp.com/track/fractured
2023-08-08 11:55:01
elfeïn
2023-08-11 03:24:42
<@167023260574154752> i have a couple yubikeys but i'm not sure what to do
lonjil
2023-08-11 03:24:50
how old are they
2023-08-11 03:25:36
if they are quite old, they are kinda shit because the only widely supported thing in those is PGP, which sucks
elfeïn
2023-08-11 03:25:46
less than a year
lonjil
2023-08-11 03:25:53
perfect
2023-08-11 03:26:23
you can easily use them for SSH, some password managers instead of or in addition to a master password, and ofc WebAuthn
elfeïn
spider-mario
2023-08-11 03:26:30
bro this made me laugh just by reading the headline
lonjil you can easily use them for SSH, some password managers instead of or in addition to a master password, and ofc WebAuthn
2023-08-11 03:27:30
i'm interested in all of those, however, i don't know how to backup my key data securely
lonjil
2023-08-11 03:28:24
You cannot
2023-08-11 03:28:33
There's no way to get data off of a yubikey
2023-08-11 03:29:16
you need to ensure that both keys are set up properly for all your uses, and then store one in a secure location as a backup
w
2023-08-11 03:29:35
what password manager can use it without a master password?
2023-08-11 03:30:12
because bitwarden requires a password to decrypt so it's only used as a 2fa for accessing the server with the data
lonjil
2023-08-11 03:32:38
KeePassXC uses it for encryption and decryption, though actually I've never *tried* to have a zero length password, so I don't know if it would let you. I haven't tried because KeePassXC uses the old challenge response protocol instead of FIDO2, so there's no pin, only hitting the button.
2023-08-11 03:34:44
Ok, it does let you not have a password
w
2023-08-11 03:35:46
and it doesn't seem keepassxc has an option to use a server
elfeïn
lonjil There's no way to get data off of a yubikey
2023-08-11 03:35:55
can i put a certain key onto them?
lonjil
elfeïn can i put a certain key onto them?
2023-08-11 03:36:59
yes
2023-08-11 03:37:28
but keep in mind, yubis and similar devices have many different "applications" on them, which have different properties
2023-08-11 03:38:56
So the PGP applet will let you upload PGP keys to it, meaning you could upload the same PGP keys to multiple yubis, and I believe that the PIV smart card applet is similar.
elfeïn
2023-08-11 03:39:23
oh ok
lonjil
2023-08-11 03:39:24
Challenge Response allows you to set the secret seed.
2023-08-11 03:39:35
But I don't think FIDO2 has anything about setting your own key.
2023-08-11 03:40:00
There the idea is that the Yubi has its own secret master key, and generates application-specific keys on the fly.
2023-08-11 03:42:17
This is how OpenSSH's FIDO2 support works. Creating a yubi-backed SSH key just generates a bunch of random nonsense (which becomes your private key file), and when you want to use SSH to sign something, that random nonsense is sent to the yubi which generates the real private key, to sign stuff or to generate the public key.
2023-08-11 03:43:05
There is something called *resident* keys, but those are also generated on the Yubi, from whatever you send to it as above, but is stored so that you don't need to keep a copy of the original data.
2023-08-11 03:43:16
SSH supports both options.
2023-08-11 03:44:36
For website's that support WebAuthn, the original material that generates the private key is some combination of the URL (so websites can't pretend to be each other) plus some other data that the website thinks is important to the authentication process, like your user ID.
elfeïn
2023-08-11 03:45:25
oh ok
lonjil
2023-08-11 07:09:33
I just read that Apple's implementation of Passkeys explicitly does not support attestation, so I guess attestation will never be a viable requirement for passwordless auth.
spider-mario
2023-08-11 10:37:07
I wonder what the “densest” language is, in the sense of assigning meaning to the most sequences of sounds (possibly weighted by how often they would occur in other languages)
2023-08-11 10:37:37
the thought occurred to me when I heard people speaking a language I don’t understand but from time to time, I could still interpret a few fragments as if it were English
2023-08-11 10:37:51
it would be amusing if there was a language that made this easier
2023-08-11 10:38:27
where you can just produce a random string of sounds and it means “my grandpa ate a rock rebelliously tomorrow”
2023-08-11 10:39:36
basically https://stackoverflow.com/questions/11695110/why-is-this-program-valid-i-was-trying-to-create-a-syntax-error but for natural languages
w
2023-08-11 10:42:03
didn't someone try to do that, something like a very small vocabulary
2023-08-11 10:42:44
oh I was thinking of Toki pona which is just supposed to be easy
2023-08-11 10:44:06
But I also remember reading something like all the spoken languages average out to the same speed/information density because of the amount of data a person can process
2023-08-11 10:46:47
although if the intended use were to be not spoken to a human but instead a computer, that might be interesting
Nova Aurora
2023-08-12 12:57:37
https://en.m.wikipedia.org/wiki/Ithkuil
elfeïn
2023-08-12 01:36:07
thank you for sharing this
Traneptora
lonjil For website's that support WebAuthn, the original material that generates the private key is some combination of the URL (so websites can't pretend to be each other) plus some other data that the website thinks is important to the authentication process, like your user ID.
2023-08-12 01:52:40
> so websites can't prtend to be each other
2023-08-12 01:52:44
literally the point of TLS, right?
elfeïn
Traneptora > so websites can't prtend to be each other
2023-08-12 02:11:22
that's why i think having anything other than a signing/authentication key for communication with websites is overkill
2023-08-12 02:12:31
obv use TLS once handshake is completed
2023-08-12 02:16:37
now for p2p, i think having your own keypair is better
2023-08-12 02:17:29
since p2p could imply that there are no trusted authorities except those verifiable by multiple channels
2023-08-12 02:18:40
obligatory im not a professional cryptographer
Nova Aurora https://en.m.wikipedia.org/wiki/Ithkuil
2023-08-12 02:32:26
the writing system seems odd, but seeing it i'm now interested in exploring what writing would be like if developed by computers
VcSaJen
2023-08-12 06:03:20
webauthn is kinda confusing. Why would you need many keys, each for own site? Why would it be managed on some kind of device thing, instead of just exporting and importing armored gpg key? Thought is there, but it's utterly unusable in practice.
_wb_
spider-mario I wonder what the “densest” language is, in the sense of assigning meaning to the most sequences of sounds (possibly weighted by how often they would occur in other languages)
2023-08-12 06:37:31
It would be a very confusing language. Languages, like all forms of information coding, are always balancing two fundamentally contradictory things: compression and redundancy. In the case of languages, compression is mostly achieved by introducing new words that concisely describe something that would otherwise require many more words. Redundancy is achieved by using only a fraction of the code space (most pronounceable letter combinations are not actual words), by having grammar (imposing constraints and structure) and duplicating some pieces of information (like the French "ne... pas" or the combination of pronouns and conjugation). Without redundancy, it would be really easy to mishear something. Mishearing still occurs now even though all common languages are very redundant. If languages would be significantly less redundant (i.e. denser), I bet it wouldn't result in more efficient communication, just in more misunderstanding (which slows down communication a lot).
2023-08-12 06:38:50
I doubt any language is optimal in that regard, since languages are mostly evolved, not designed, so I would expect them to reach only local optima, not global ones.
2023-08-12 06:40:37
But I don't expect "maximum density" to be anywhere close to optimal, since it implies completely error-free communication channels which is not realistic at least for spoken languages.
lonjil
Traneptora literally the point of TLS, right?
2023-08-12 07:28:27
No. A phishing website can trick you into entering your password for another site, but this is impossible with webauthn. The domain name is used as part of the key material used to generate the private key used to authenticate you.
Traneptora
lonjil No. A phishing website can trick you into entering your password for another site, but this is impossible with webauthn. The domain name is used as part of the key material used to generate the private key used to authenticate you.
2023-08-12 07:34:28
how is this impossible?
2023-08-12 07:34:57
why does extra authentication prevent lookalike sites from tricking you into entering that credential
lonjil
Traneptora why does extra authentication prevent lookalike sites from tricking you into entering that credential
2023-08-12 07:46:11
Because you're not entering any credential
2023-08-12 07:48:03
The browser takes the raw bytes of the domain name in the URL, and sends them to your webauthn device (yubikey, or tpm, or a soft device), which uses that as a seed to get a subkey from the secret master key.
2023-08-12 07:49:44
The only thing you're ever entering is your pin code, which will be in a browser popup not in the website.
Traneptora
2023-08-12 07:50:40
hold up
2023-08-12 07:50:51
so you have to enter a password in a browser UI element
2023-08-12 07:51:04
why is this not just a password manager
lonjil
2023-08-12 07:53:19
That is actually another thing supported by the webauthn standard, generating a specific value to be sent back, rather than a key to sign with
2023-08-12 07:54:55
Though if anyone manages to ever get a hold of that value, they could log in
2023-08-12 07:55:27
With a non-exfiltratable key, that is impossible, since a different message would have to be signed each time.
2023-08-12 07:56:28
Also a pin is not a password :) Pins can be much shorter than passwords and still be secure, since you only have a few guesses until it locks itself.
2023-08-12 07:58:24
Actually, some password managers are planning to implement the device API of webauthn, so that they can act as soft auth devices
Traneptora
2023-08-12 07:58:29
a pin is absolutely a password
2023-08-12 07:58:58
it's a magic phrase that if you know grants you access
lonjil
2023-08-12 07:59:03
Sure
2023-08-12 08:00:39
Anyway, the point here is that webauthn is just a standard, that can be implemented in many ways.
spider-mario
_wb_ But I don't expect "maximum density" to be anywhere close to optimal, since it implies completely error-free communication channels which is not realistic at least for spoken languages.
2023-08-12 08:26:22
I definitely wouldn’t expect it to be, but it _would_ be entertaining
_wb_
2023-08-12 08:32:02
I guess you could construct something that gets close to optimally dense by making a prefix code (say over an alphabet of syllables, to ensure it's pronounceable) based on n-gram probability distributions.
lonjil
VcSaJen webauthn is kinda confusing. Why would you need many keys, each for own site? Why would it be managed on some kind of device thing, instead of just exporting and importing armored gpg key? Thought is there, but it's utterly unusable in practice.
2023-08-12 08:48:31
First of all, GPG in unusable, both in practice and in theory. If you used the same key across websites, its use could be correlated between websites, either by the website operators themselves trying to track you across the web, or by attackers. So it has a small privacy benefit. But the main benefit is domain separation (domain here used generically, not the DNS meaning). If the same key is used for many things, great care is needed to prevent confusion between different things. By baking the separation into the keys, it is much harder to fuck up and get the wrong thing signed. You do this with GPG too, with subkeys.
_wb_ I doubt any language is optimal in that regard, since languages are mostly evolved, not designed, so I would expect them to reach only local optima, not global ones.
2023-08-12 08:50:32
IIRC, languages that are denser tend to be spoken slower, while less dense languages tend to be spoken faster. So for spoken language, there may well exist an "optimal range" for human brains that we are already inside of with all natural languages.
lonjil Anyway, the point here is that webauthn is just a standard, that can be implemented in many ways.
2023-08-12 08:54:54
oh, and WebAuthn is just the web version of FIDO2, which is used for all sorts of stuff. I use it for SSH and to sign git commits. It's nice that my ssh private key is literally unstealable and I don't even need to remember a really good password to do it.
Foxtrot
2023-08-12 10:42:10
just something about TPM that was mentioned in <#803574970180829194> I use TPM stored key to access 1Password without always typing full password, with TPM it just wants PIN (from Windows Hello) I have problem with last part here: https://support.1password.com/windows-hello-security/ > If you use other applications that ask you to authorize with Windows Hello, make sure you trust them. Using the Trusted Platform Module with Windows Hello delegates the responsibility of authentication solely to Windows Hello. A malicious application could prompt you to unlock 1Password to access your information. So any software on my PC can just decide to prompt for Windows Hello PIN and if I accidently type it, it will give it my 1Password password? and from here: https://1password.community/discussion/comment/640813/#Comment_640813 > I'm unsure if it possible to retrieve a list of applications specific to your device that have access Windows Hello. If this is an area of concern, it would be worth reaching out to Microsoft support for help or to see if this is possible. and here: https://1password.community/discussion/comment/641974/#Comment_641974 > There is no way to have additional secret entropy added in, since Windows doesn’t provide a secure place to store data that only our app can fetch (akin to the macOS keychain, for example). I dont know what did they think when creating TPM but why doesnt it have list of apps that can access TPM? Why doesnt it have separation of software, that one app cannot access TPM data for other app? Windows Hello prompt doesnt even tell you what app asked for authentification. You just have to trust that it's the last app you opened or interacted with. If MacOS Keychain can so it why not Windows? TPM should be improving security but the way it's implemented it seems more like security hole.
w
2023-08-12 11:16:38
windows 2fa/passkey tells me what app sends the request
2023-08-12 11:17:44
example
Foxtrot
2023-08-12 01:22:19
in Win10 and 1Password it looks smilar to this
2023-08-12 01:23:07
but while searching for good example I found that many Windows Security prompts actually identify the app that is asking... so maybe it's fault of 1Password
afed
2023-08-12 01:45:53
https://news.ycombinator.com/item?id=37060528
Foxtrot
2023-08-12 01:56:09
When I view YT video it gets downloaded into my RAM, omg that means I am pirating, FBI will get me 😄
afed
2023-08-12 02:00:04
yeah, but still constant attempts from some companies to declare ytdl as something illegal
elfeïn
2023-08-12 10:04:45
and here too
2023-08-12 10:04:48
https://youtu.be/uf5FkGnb6RE
2023-08-12 10:04:52
go nuts
sklwmp
2023-08-13 09:17:22
https://www.androidpolice.com/firefox-bringing-back-full-extension-support-android/
elfeïn
2023-08-13 10:20:20
oooo
Traneptora
lonjil oh, and WebAuthn is just the web version of FIDO2, which is used for all sorts of stuff. I use it for SSH and to sign git commits. It's nice that my ssh private key is literally unstealable and I don't even need to remember a really good password to do it.
2023-08-15 07:22:38
how is it literally unstealable
2023-08-15 07:24:24
If someone has access to your machine, why can't they steal your private key
2023-08-15 07:24:38
how does your machine read your SSH private key
2023-08-15 07:24:41
and why can't an attacker just do whatever that is, if your machine is compromised
lonjil
Traneptora how does your machine read your SSH private key
2023-08-15 07:41:17
it doesn't. everything involving the private key happens on the security key.
2023-08-15 07:42:03
ssh asks the yubikey "could you please sign this", and then I have to approve it by clicking the button the yubikey
2023-08-15 07:42:37
an attacker who took over my machine could trick me into signing something, but not get the key to sign unlimited stuff
Traneptora
2023-08-15 07:44:54
Oh, it's a hardware device on which the private key is stored
2023-08-15 07:45:11
and the OS never sees the private key, it just sees the signature. I see
lonjil
2023-08-15 07:45:27
yeah
Traneptora
2023-08-15 07:45:33
Not sure how that's possibly able to be implemented on the web tho
lonjil
2023-08-15 07:46:13
webauthn is an api available in JS, and the browser has to forward that to your security stuff in whichever way
Traneptora
2023-08-15 07:46:27
and what if I don't have a hardware security device?
lonjil
2023-08-15 07:47:11
the API will say that there's no device, and after that I guess it's up to the website to decide what to do
2023-08-15 07:47:31
usually using these things is something you set up after you already have an account
Traneptora
2023-08-15 07:47:44
why would I want to do that
lonjil
2023-08-15 07:47:59
the original use case was fool-proof 2FA
Traneptora
2023-08-15 07:48:02
what if I want to access that account from any other device
2023-08-15 07:48:25
what if my hardware key malfunctions? do I lose access to the site?
lonjil
2023-08-15 07:48:42
if you don't have an alternate way of accessing the site, yes
Traneptora
2023-08-15 07:48:58
and if there exists an alternative way of accessing the site, how does that improve security in any way
2023-08-15 07:49:05
if conventional password field authentication is still permitted
lonjil
2023-08-15 07:49:38
if used for 2FA, it's done exactly like any other 2FA: backup codes
Traneptora
2023-08-15 07:50:10
2FA is designed to prevent a compromised machine from gaining access
2023-08-15 07:50:16
that's... not something it accomplishes
2023-08-15 07:52:04
Basically, I don't understand how a security hardware device improves security, beyond simply not having one, if you don't actually need it to authenticate
lonjil
2023-08-15 07:52:09
yes it does, and I don't think 2FA is intended that way. I mean, most 2FA impls depend on phones, either via SMS or via an authenticator app. But phones just like computers can log into websites, so you have a single device that has both the ability to do the login, and the ability to gain the second factor.
Traneptora
lonjil yes it does, and I don't think 2FA is intended that way. I mean, most 2FA impls depend on phones, either via SMS or via an authenticator app. But phones just like computers can log into websites, so you have a single device that has both the ability to do the login, and the ability to gain the second factor.
2023-08-15 07:52:24
this is why I think 2FA is stupid
lonjil
2023-08-15 07:52:47
You could always throw the backup codes away
2023-08-15 07:52:51
Then you do need it
2023-08-15 07:53:13
personally I keep backup codes on a physical notebook in my apartment.
2023-08-15 07:53:44
but my main backup strategy is having multiple security keys, so if I lose one I have more that I already registered.
Traneptora
2023-08-15 07:54:10
Basically, what I'm saying is either (1) you need the device to authenticate (2) you don't need the device to authenticate (1) risks permanent lockout if anything happens to the electronics, such as a housefire. (2) risks nothing but also gains nothing as a malicious actor could just do that
lonjil
2023-08-15 07:55:02
The main thing both 2FA and security keys are supposed to protect against is people using stolen passwords, not compromised machines.
Traneptora
2023-08-15 07:55:29
If that's the case then why are passwords stolen in the first place?
2023-08-15 07:55:50
Sites don't store passwords in their databases - they store password hashes. The only way to gain access to a password is to compromise the user
2023-08-15 07:56:03
either by tricking them, or compromising their client (e.g. computer)
lonjil
2023-08-15 07:56:41
database leaks are by far the biggest source of passwords, followed by phishing
Traneptora
2023-08-15 07:56:47
databases don't store passwords
lonjil
2023-08-15 07:57:01
you're too optimistic
Traneptora
2023-08-15 07:57:41
if your site is storing passwords in a database, and not password hashes, there's nothing you, as a user, can do, as that's a level of gross incompetence that cannot be fixed by you
lonjil
2023-08-15 07:57:55
anyway, I personally know how to use a password manager, so I don't have to worry about the most common ways passwords are stolen, but I find security keys very convenient
Traneptora if your site is storing passwords in a database, and not password hashes, there's nothing you, as a user, can do, as that's a level of gross incompetence that cannot be fixed by you
2023-08-15 07:58:12
most people use the same password in multiple places
Traneptora
2023-08-15 07:58:27
Those people don't use hardware security keys
2023-08-15 07:58:55
You don't need a hardware device to use different passwords - software password managers make that painless
lonjil
2023-08-15 07:58:57
they do when the companies they work at make security keys the only way to log into company stuff
2023-08-15 07:59:10
and they do when every iphone has a built in security key
Traneptora
2023-08-15 07:59:28
makes me glad I don't buy apple products
lonjil
2023-08-15 07:59:44
just because it's built in doesn't mean you have to use it...?
Traneptora
2023-08-15 07:59:49
It does if they require it
lonjil
2023-08-15 07:59:51
android is the same anyway
Traneptora
2023-08-15 07:59:59
android is not hardware
lonjil
2023-08-15 08:00:22
no, but google wants this stuff in every smartphone
Traneptora
2023-08-15 08:00:43
Essentially, I don't trust electronic methods for authentication that don't require human intervention
lonjil
2023-08-15 08:01:14
so far it seems to always require human intervention
Traneptora
2023-08-15 08:01:34
A recovery password can be written down on a piece of paper, put in a safe, or mailed to your mom.
2023-08-15 08:01:39
A master password can be memorized
2023-08-15 08:01:54
But anything that doesn't require a human can be done with a compromised machine
lonjil
2023-08-15 08:02:32
as I said earlier, my yubikey requires that I click it for every usage.
2023-08-15 08:02:52
on apple devices, you have to either input your pin code or use the biometrics every time
Traneptora
2023-08-15 08:03:14
so what do you gain by having a yubikey then?
2023-08-15 08:03:29
and again, what happens if it breaks?
lonjil
2023-08-15 08:03:40
nothing because I have 3 more?
Traneptora
2023-08-15 08:03:52
are they all in the same place?
lonjil
2023-08-15 08:03:54
and frankly I literally never managed to memorize my master passowrd
Traneptora
2023-08-15 08:03:56
what if your appartment burns down
2023-08-15 08:04:09
it's a real question
lonjil
2023-08-15 08:04:25
one is on my keychain, one is plugged into my PC, one is stored at my dad's place
Traneptora
2023-08-15 08:04:25
and not one that is exceedingly unlikely either
2023-08-15 08:04:38
if you have one at a separate place, that's good
lonjil
lonjil and frankly I literally never managed to memorize my master passowrd
2023-08-15 08:05:02
so the first thing I bought a yubikey for was to use to unlock my password manager
2023-08-15 08:05:17
just as a convenience thing
Traneptora
2023-08-15 08:05:24
So you don't have to type in your master password?
lonjil
2023-08-15 08:05:46
I do use a password too, but a much shorter one
2023-08-15 08:06:12
unfortunately keepassxc doesn't support pin protected security key stuff yet, so I do want a bit more precaution
Traneptora
2023-08-15 08:06:30
ah, I don't have any issue remembering my master password the only risk is I forget it, which I won't. I suppose unless I get hit in the head or something but then I have a bigger risk
lonjil
2023-08-15 08:06:52
I have my old one written down in the same notebook as all my backup codes
2023-08-15 08:07:13
this was bad because it made me want to take that notebook with me in case I needed to unlock my password manager on my phone, lol
Traneptora
2023-08-15 08:07:16
It might not be a bad idea to write it down and put it in the safe deposit box at the bank, since the master password is the only thing I need
2023-08-15 08:07:51
my passwords are not randomly generated, they're procedurally generated using the domain name of the website and a hash of the master password. I wrote up a whole spec and a script for it, and they're both synced to the cloud
2023-08-15 08:08:02
(among a few other fields)
2023-08-15 08:08:21
the spec and script aren't useful without the master password (or rather, without its sha3-384sum)
lonjil
2023-08-15 08:08:44
after I set it up for keepassxc, I started using it for some other stuff. my ssh keys at home are normal and unprotected (because there's a 0% chance my computer will be compromised, yup, definitely) but on my laptop I only keep yubikey-dependant ssh keys, so that someone who steals my laptop while it's unlocked can't log into my PC.
Traneptora my passwords are not randomly generated, they're procedurally generated using the domain name of the website and a hash of the master password. I wrote up a whole spec and a script for it, and they're both synced to the cloud
2023-08-15 08:09:01
nice
2023-08-15 08:09:37
wait what do you do if you need to do a password reset on a site
Traneptora
2023-08-15 08:09:48
one of the fields is "index"
lonjil
2023-08-15 08:09:51
ah
Traneptora
2023-08-15 08:09:58
it's 0 by default, unless I need to change it to 1, for some reason
2023-08-15 08:10:01
such as that one
2023-08-15 08:10:04
and 2, etc.
lonjil after I set it up for keepassxc, I started using it for some other stuff. my ssh keys at home are normal and unprotected (because there's a 0% chance my computer will be compromised, yup, definitely) but on my laptop I only keep yubikey-dependant ssh keys, so that someone who steals my laptop while it's unlocked can't log into my PC.
2023-08-15 08:10:37
<:kek:857018203640561677> I feel this tho I do have a passphrase for private keys that I consider to be particularly important
lonjil
2023-08-15 08:11:07
mm
Traneptora
2023-08-15 08:11:21
like the one that gives me access to the FFmpeg infrastructure is a separate key that's not used for anything else
lonjil
2023-08-15 08:11:29
sensible
Traneptora
2023-08-15 08:11:31
and I have it passphrased
2023-08-15 08:11:41
which I have to enter every time I make a commit
2023-08-15 08:11:50
(not that I do that very much, 95% of it is just jpegxl stuff)
2023-08-15 08:12:04
the commits are also GPG signed but that's another can of worms
lonjil
2023-08-15 08:12:14
I have a few ssh keys on a usb stick on my keychain that are passphrase protected, but uh, I don't remember the passphrase
Traneptora
2023-08-15 08:12:19
oops
lonjil
2023-08-15 08:12:43
I've started using SSH signing instead of GPG signing
2023-08-15 08:12:56
very convenient since I already have SSH keys
Traneptora
2023-08-15 08:19:25
I have one GPG key
2023-08-15 08:19:32
which is in a keyserver
w
2023-08-15 09:03:20
they did for the better part of 10 years/they always kept getting bigger
2023-08-15 09:03:49
i think it started getting attention with titanfall 1, where I remember there was like 50gb of audio files
2023-08-15 09:04:46
and then gta 5 with 7 discs
2023-08-15 09:05:40
but if the update is that "big" then it's gotta be epic
2023-08-15 09:05:43
i'm hyped
jonnyawsom3
2023-08-15 10:05:59
Yeah, most of the time all audio is WAV and all textures are 4K now with no 'HD Texture Pack' as an optional download. Not to mention cutscenes where 1 minute of video is a 1GB avi
2023-08-15 10:06:59
The game engines haven't kept up with modern compression. It's either WAV or MP3, Bink video or none, ect
lonjil
2023-08-15 10:08:57
ogg is very popular also
jonnyawsom3
2023-08-15 12:14:07
Seems like Unity can accept OGG, MP3 or WAV, Unreal only accepts WAV and then compresses into XMA (A format used on the xbox360)
Posi832
2023-08-15 05:26:58
opus all da way
VcSaJen
lonjil First of all, GPG in unusable, both in practice and in theory. If you used the same key across websites, its use could be correlated between websites, either by the website operators themselves trying to track you across the web, or by attackers. So it has a small privacy benefit. But the main benefit is domain separation (domain here used generically, not the DNS meaning). If the same key is used for many things, great care is needed to prevent confusion between different things. By baking the separation into the keys, it is much harder to fuck up and get the wrong thing signed. You do this with GPG too, with subkeys.
2023-08-16 07:30:20
Highest disadvantage is that they're stuck on one device, or on devices from one vendor. I heard that Bitwarden and other password managers are working on storing keys in Vaults, but I'm not sure how would it work, is there API in browsers and OSes for that already?..
lonjil
VcSaJen Highest disadvantage is that they're stuck on one device, or on devices from one vendor. I heard that Bitwarden and other password managers are working on storing keys in Vaults, but I'm not sure how would it work, is there API in browsers and OSes for that already?..
2023-08-16 07:34:39
it's just FIDO2 / WebAuthn
2023-08-16 07:35:38
But note: there's nothing stopping you from using devices from multiple vendors at the same time, or say having one yubikey and also registering bitwarden as a security key.
elfeïn
2023-08-16 11:43:29
https://youtu.be/JcMKvhTUjiQ
CrushedAsian255
2023-08-16 11:56:03
Look what happens when you try to use #KilledByGoogle in YouTube
2023-08-16 11:56:10
Traneptora
Posi832 opus all da way
2023-08-18 07:24:21
one reason game devs are still using vorbis over opus is the decode complexity
2023-08-18 07:25:00
vorbis is much less complex, which tends not to matter for playback usually, but for a very cpu-intensive application like a video game where timing matters a lot, the cycles saved from vorbis over opus can be worth the ratio drop
2023-08-18 07:25:22
especially since many games don't cache the decoded SFX in ram, as that would be too memory-hungry
lonjil
2023-08-18 11:20:22
Opus isn't *that* complex, afaik
2023-08-18 11:22:45
Though I think the newer Xboxes have like 8 Opus DSPs
Traneptora
lonjil Opus isn't *that* complex, afaik
2023-08-18 12:09:09
it isn't, but the issue has been brought up before
VcSaJen
2023-08-20 11:36:55
Chromium really is a new IE
afed
2023-08-20 09:17:13
https://news.adobe.com/news/news-details/2023/Adobe-Co-Founder-Dr.-John-Warnock-Passes-at-82/default.aspx
Fraetor
2023-08-20 10:13:05
RIP
elfeïn
2023-08-21 11:55:05
oh no
Quackdoc
2023-08-21 12:11:53
I might be mistaken, but IIRC it's BT.2020 but the peak luminance gets mapped to the displays luminance
2023-08-21 12:12:17
well it could be 2020, srgb, rec 709 etc
2023-08-21 12:13:22
it's designed as a fallback and probably wont get actually used
2023-08-21 12:15:05
I may be mistaken but everyting you need is here and here https://manuals.plus/m/daba89fd26a25086fa5fbb4855bca4cf77e76cfecbf8bd748a139fcbdc220332#iframe https://web.archive.org/web/20171130183054/https://standards.cta.tech/kwspub/published_docs/CTA-861-F_FINAL_revised_2017.pdf
Fraetor
2023-08-21 06:44:05
Continuing from the XML discussion: https://discord.com/channels/794206087879852103/794206170445119489/1143034575413575760
2023-08-21 06:46:07
XML suffers from a lot of extra complexity by trying to solve every use case. Due to this is has complex features like references (needed for representing cyclical data structures), and the ability to reference other external documents. While it is theoretical possible to implement these features securely, it only takes a small slip-up in implementation for vulnerabilities to occur.
2023-08-21 06:47:11
You see a lot of these same complexities in other serialisation languages, like YAML, or even specific things like python's pickle format.
2023-08-21 06:48:29
JSON is nice as it is easy to understand and reason about, and restricts itself to a commonly supported subset of features. Because of this it can't represent every possible data structure, but works great for the 95% of cases.
Traneptora
2023-08-21 08:02:44
JSON's also significantly more performant
2023-08-21 08:03:01
since parsing it can be done without much more than a catalan string parser
elfeïn
2023-08-22 02:12:00
ye but xmlllll :c
2023-08-22 02:12:09
i love xml
DZgas Ж
2023-08-22 02:23:12
xml best 💯
VcSaJen
2023-08-22 02:24:30
Json does not support comments, which makes it unsuitable for configs and such
w
2023-08-22 02:25:08
you can argue that it doesnt need comments
VcSaJen
2023-08-22 02:26:01
Configs do not need comments?
2023-08-22 02:27:25
Anyway, the worst format is YAML
diskorduser
VcSaJen Anyway, the worst format is YAML
2023-08-22 03:35:16
Why
lonjil
2023-08-22 05:07:40
There exists supersets of JSON that support comments
2023-08-22 05:08:56
There's even JSON libraries that support keeping track of comments so that when the data is reserialized, the comments can be written out again in the right places.
_wb_
2023-08-22 06:25:39
There's also CBOR: https://datatracker.ietf.org/doc/html/rfc8949
2023-08-22 06:47:23
JUMBF (`jumb` boxes in jxl) allow storing various things (in a nested box structure), including XML, JSON and CBOR
Nova Aurora
diskorduser Why
2023-08-22 07:06:27
https://noyaml.com/
Traneptora
diskorduser Why
2023-08-22 05:30:19
Yaml has many of the issues that xml has, for essentially no gain
Fraetor
VcSaJen Json does not support comments, which makes it unsuitable for configs and such
2023-08-22 06:16:07
JSON originally had comments, but they were removed because people where putting parsing directives in them.
w
2023-08-22 06:16:58
just put comments in strings
Fraetor
Nova Aurora https://noyaml.com/
2023-08-22 06:17:46
A lot of the most egregious issues with YAML are fixed with YAML 1.2 (though a lot of common parsers are still YAML 1.1), and it is a nice format for heavily nested config files. I wouldn't use it for data serialisation though.
w
2023-08-22 06:18:28
yaml seems to be only useful for config
sklwmp
2023-08-23 06:11:57
https://techcommunity.microsoft.com/t5/excel-blog/announcing-python-in-excel-combining-the-power-of-python-and-the/ba-p/3893439
Nova Aurora
2023-08-23 06:20:27
Is python the new vbscript?
Fraetor A lot of the most egregious issues with YAML are fixed with YAML 1.2 (though a lot of common parsers are still YAML 1.1), and it is a nice format for heavily nested config files. I wouldn't use it for data serialisation though.
2023-08-23 06:25:42
Yaml 1.1 and 1.2 are incompatible afaik, so what makes it better than, say, TOML?
Fraetor
2023-08-23 04:08:05
Nested data structures. TOML is create for fairly flat config files, but gets ugly for data with more structure: ## YAML ```yaml title: Extract Instant Air Temperature description: | Extracts out the instantaneous 1.5m air temperature from a file and writes it to a new one. section: Grid Stat major_cat: Major Category 1 minor_cat: Minor Category 1 steps: - operator: read.read_cubes constraint: operator: constraints.generate_stash_constraint stash: m01s03i236 - operator: filters.filter_cubes constraint: operator: constraints.combine_constraints stash_constraint: operator: constraints.generate_stash_constraint stash: m01s03i236 cell_methods_constraint: operator: constraints.generate_cell_methods_constraint cell_methods: [] - operator: write.write_cube_to_nc # This is a magic value that becomes the runtime output file path. file_path: CSET_OUTPUT_PATH ``` ## TOML ```toml title = "Extract Instant Air Temperature" description = """ Extracts out the instantaneous 1.5m air temperature from a file and writes it to a new one. """ section = "Grid Stat" major_cat = "Major Category 1" minor_cat = "Minor Category 1" [[steps]] operator = "read.read_cubes" [steps.constraint] operator = "constraints.generate_stash_constraint" stash = "m01s03i236" [[steps]] operator = "filters.filter_cubes" [steps.constraint] operator = "constraints.combine_constraints" [steps.constraint.stash_constraint] operator = "constraints.generate_stash_constraint" stash = "m01s03i236" [steps.constraint.cell_methods_constraint] operator = "constraints.generate_cell_methods_constraint" cell_methods = [ ] [[steps]] operator = "write.write_cube_to_nc" # This is a magic value that becomes the runtime output file path. file_path = "CSET_OUTPUT_PATH" ```
Quackdoc
2023-08-23 04:09:03
IMO anything that uses spaces for syntax is a bad format to me, especially if it's one someone could be expected to write by hand
Fraetor
2023-08-23 04:10:54
I mostly agree with you, and I would probably have gone with JSON in the above example if it supported comments.
2023-08-23 04:13:47
Though to be fair I'm using it in a python context, so people are used to it.
veluca
2023-08-23 08:02:18
yaml is scary
spider-mario
2023-08-23 08:26:16
strictly speaking, you don’t _have_ to use spaces for syntax with yaml, you can use `{}`/`[]` notation like in JSON
2023-08-23 08:27:07
some say that YAML is a superset of JSON; I haven’t verified whether it is strictly the case considering all edge cases and so on but it does seem to be at least roughly true
Fraetor
2023-08-23 10:45:03
I think YAML 1.2 is meant to be a superset of JSON.
yurume
2023-08-24 09:53:55
```json {"on": {"label": {"types": ["created"]}}} ```
2023-08-24 09:54:27
JSON-like syntax can appear everywhere the value is allowed, including the topmost level
Fraetor
2023-08-24 05:01:17
Below is a example of this [GitHub Actions workflow](https://github.com/MetOffice/CSET/blob/main/.github/workflows/pre-commit-update.yml) converted to JSON (which is also valid YAML). ## JSON ```json { "name": "Update pre-commit config", "on": { "schedule": [ { "cron": "48 3 * * 1" } ], "workflow_dispatch": null }, "permissions": { "pull-requests": "write", "contents": "write" }, "jobs": { "update-pre-commit-config": { "runs-on": "ubuntu-latest", "steps": [ { "uses": "actions/checkout@v3" }, { "uses": "actions/setup-python@v4", "with": { "python-version": "3.x" } }, { "name": "Install dependencies", "run": "python3 -m pip install pre-commit" }, { "name": "Hash existing config file", "run": "sha256sum .pre-commit-config.yaml > ${{ runner.temp }}/config_file_hashes" }, { "name": "Update pre-commit config", "run": "git config --local user.name \"$GITHUB_ACTOR\"\ngit config --local user.email \"$GITHUB_ACTOR@users.noreply.github.com\"\ngit switch -c \"pre-commit-$(sha256sum ${{ runner.temp }}/config_file_hashes | head -c 8)\"\npre-commit autoupdate --freeze\n" }, { "name": "Create pull requests", "env": { "GH_TOKEN": "${{ github.token }}" }, "run": "... Snipped for discord ..." } ] } } } ```
jonnyawsom3
2023-08-25 07:21:20
I was wondering how people were doing that
spider-mario
2023-08-25 10:16:14
I had a dream that there was a page describing previous features in Internet Explorer and ActiveX, and that one of them was that IE allowed `<embed src="foo.exe">` with executables that use DirectX
2023-08-25 10:16:26
it was able to redirect the DirectX calls so that the program would draw on the page
2023-08-25 10:16:46
does that count as a nightmare?
Traneptora
2023-08-25 12:15:07
I wouldn't put it past IE6
_wb_
2023-08-25 02:56:35
yeah I totally wouldn't be surprised if there actually at some point was a way to do something like that
spider-mario
2023-08-25 04:59:53
> The ActiveX security model relied almost entirely on identifying trusted component developers using a code signing technology called Authenticode. Developers had to register with Verisign (US$20 per year for individuals, $400 for corporations) and sign a contract, promising not to develop malware. Identified code would then run inside the web browser with full permissions, meaning that any bug in the code was a potential security issue; this contrasts with the sandboxing already used in Java at the time.[11] okay, I was vaguely aware that there were security concerns with ActiveX but I didn’t realise it worked like that
lonjil
2023-08-27 06:23:04
real math done by a real professional math person:
Traneptora
lonjil real math done by a real professional math person:
2023-08-27 06:32:00
reminds me of that shelach paper
lonjil
2023-08-27 06:32:48
What paper is that?
Traneptora
lonjil What paper is that?
2023-08-27 06:34:19
Shaharon Shelah, 2002:
2023-08-27 06:34:33
https://arxiv.org/pdf/math/0102056.pdf
lonjil
2023-08-27 06:35:04
Lol
Traneptora
2023-08-27 06:35:30
it was about this theorem
lonjil
2023-08-27 06:38:42
The one I posted is a slight restatement of a derivation done by John Conway in *On Numbers and Games*
2023-08-27 06:40:29
The infinity sign is the gap between the reals and the positive infinite numbers
Traneptora
lonjil The infinity sign is the gap between the reals and the positive infinite numbers
2023-08-27 06:41:18
wdym by the "gap"?
2023-08-27 06:41:33
also how does one take the big-omega'th root of what I presume is a surreal number
2023-08-27 06:41:40
and not an ordinal
2023-08-27 06:41:59
(what even is big-omega here?)
w
2023-08-27 06:43:02
omega is just omega
lonjil
2023-08-27 06:43:48
Little omega is both a surreal number and an ordinal
2023-08-27 06:44:57
Gap is like the gaps or holes in the rational numbers. The surreals are not Dedekind complete
Traneptora
2023-08-27 06:45:17
oh by a divide you mean where you can do a clopen set
2023-08-27 06:45:18
gotcha
2023-08-27 06:45:24
a disconnection
2023-08-27 06:45:37
i.e. R in the surreal numbers is like x^2 < 2 in the rationals
lonjil
2023-08-27 06:46:00
And a process similar to Dedekind cuts can produce objects outside the surreals that lie in these surreal gaps
Traneptora
2023-08-27 06:46:04
but yea in this context I assume little-omega is being interpreted as a surreal number as one cannot take roots of ordinals
2023-08-27 06:46:27
but what is big-omega
lonjil
2023-08-27 06:47:51
Big omega is the gap corresponding to the cut where the left side is the class of all surreals and the right is the empty class.
Traneptora but yea in this context I assume little-omega is being interpreted as a surreal number as one cannot take roots of ordinals
2023-08-27 06:49:50
The Surreal ordinals do correspond to Cantor's ordinals, I'm pretty sure, just with some extra fun stuff
2023-08-27 06:51:09
I'm pretty sure that big omega here is the same as the combinatorial game **On**
Traneptora
lonjil The Surreal ordinals do correspond to Cantor's ordinals, I'm pretty sure, just with some extra fun stuff
2023-08-27 06:57:02
oh yea, but it's like trying to divide an odd integer by 2
2023-08-27 06:57:08
you can't do it unless you interpret it as a rational
lonjil
2023-08-27 06:57:55
Mm
Traneptora
lonjil Big omega is the gap corresponding to the cut where the left side is the class of all surreals and the right is the empty class.
2023-08-27 06:58:19
how do you do arithmetic on the gap, do you complete it with equivalence classes of cauchy sequences, assign arithmetic operations as sequence-wise, and then it Just Works™️?
2023-08-27 06:59:14
If so, the gap between the finite and infinite is defined by which cauchy sequence?
2023-08-27 06:59:36
(I figure the metric is just `|a - b|`)
lonjil
2023-08-27 06:59:48
I don't think Cauchy sequences can handle surreal gaps
Traneptora
2023-08-27 07:00:04
that's what I thought, so how do you complete the surreals to add the gaps in a way that preserves the arithmetic structure?
2023-08-27 07:00:50
dedekind cuts work on rationals if you add sets
2023-08-27 07:00:53
but not for multiplication
2023-08-27 07:00:58
so you need some kind of cleverness
lonjil
2023-08-27 07:01:22
I know some Games are in those cuts and some Games are very poorly behaved with regards to arithmetic.
2023-08-27 07:01:47
So I don't think you can get something nice that just works?
2023-08-27 07:02:24
I saw someone mention a paper that had something about a Dedekind completion of the Surreals, I'll find it again when I get home.
Traneptora
2023-08-27 07:03:46
I thought surreal numbers were by definition games that were not fuzzy
2023-08-27 07:04:13
so how would you have a game in one of those cuts that isn't a number
lonjil
2023-08-27 07:05:36
Up is a game that is bigger than 0 and smaller than all positive surreals, so it's in that gap.
Traneptora
2023-08-27 07:06:31
What is Up? remind me
lonjil
2023-08-27 07:06:51
Tbh I forgot the definition of it
Traneptora
2023-08-27 07:07:00
is that `{0|*}`?
2023-08-27 07:07:32
no that's fuzzy
2023-08-27 07:07:33
hm
2023-08-27 07:08:19
actually no, it's positive
2023-08-27 07:08:27
yea, that's Up
lonjil Up is a game that is bigger than 0 and smaller than all positive surreals, so it's in that gap.
2023-08-27 07:08:41
why is Up itself not a positive surreal?
2023-08-27 07:11:25
Hm, I checked, and apparently surreal numbers are defined as ordered pairs of sets of surreal numbers, such that each element in L is strictly less than each element in R (when interpreted as games)
2023-08-27 07:11:38
which is not the same thing as "all non-fuzzy games"
lonjil
2023-08-27 07:11:55
Yeah
2023-08-27 07:13:05
Sorry I got distracted trying to refind a handy list of games
spider-mario
Traneptora What is Up? remind me
2023-08-27 08:12:56
not much, you?
2023-08-27 08:13:31
(couldn’t help it)
lonjil
2023-08-27 09:00:07
> Some gaps are important enough to deserve names. We use > "**On**" for the gap (**No**, {}) at the end of the number line, > "1/**On**" for the gap between 0 and all positive numbers, > "∞" for the gap between reals and positive infinite numbers, and > "1/∞" for that between infinitesimals and positive reals. > > For these gaps, we have > **On** = ω^**On**, > 1/**On** = ω^(-**On**), > ∞ = ω^(1/**On**), > 1/∞ = ω^(-1/**On**),
Eugene Vert
2023-08-27 09:06:26
||OωO||
Traneptora
lonjil > Some gaps are important enough to deserve names. We use > "**On**" for the gap (**No**, {}) at the end of the number line, > "1/**On**" for the gap between 0 and all positive numbers, > "∞" for the gap between reals and positive infinite numbers, and > "1/∞" for that between infinitesimals and positive reals. > > For these gaps, we have > **On** = ω^**On**, > 1/**On** = ω^(-**On**), > ∞ = ω^(1/**On**), > 1/∞ = ω^(-1/**On**),
2023-08-29 02:40:49
trying to figure out what the definition of **On** is here
2023-08-29 02:41:39
does that mean everything on the left and nothing on the right?
lonjil
Traneptora trying to figure out what the definition of **On** is here
2023-08-29 06:48:07
Yeah
2023-08-29 06:49:05
**No** is the class of all surreals.
bonnibel
2023-08-31 10:31:10
https://cdn.discordapp.com/attachments/259470543160344586/1146547302006272181/Everything_is_chrome_in_the_future.mp4
yoochan
2023-08-31 10:58:07
😄 remains safari, firefox and Lynx !
Traneptora
lonjil **No** is the class of all surreals.
2023-08-31 12:01:37
iirc gaps have to create open sets right
2023-08-31 12:01:56
so how is positive numbers and zero a gap?
2023-08-31 12:02:10
I'd imagine the left set is not open
lonjil
2023-08-31 12:04:40
I don't understand what you mean
Traneptora
lonjil I don't understand what you mean
2023-08-31 12:18:28
dedekind cuts rely on both intervals being open
2023-08-31 12:18:58
the left and right side of the cut
lonjil
2023-08-31 12:19:14
That is not true
Traneptora
2023-08-31 12:19:21
hm?
2023-08-31 12:20:22
if you perform a dedekind cut on the rationals and it's not both open then you just get a rational at the endpoint
2023-08-31 12:20:56
and the "value" of the cut is that endpoint, right?
2023-08-31 12:22:44
so if you take all positive numbers and then all nonpositive, would wouldn't that cut be equivalent to zero?
lonjil
2023-08-31 12:23:19
sorry im very tired today so I'm having trouble getting anything sensible written
Traneptora
2023-08-31 12:23:33
no rush
lonjil
2023-08-31 12:25:11
I should dig up that paper that apparently contained something about the Dedekind completion of the surreals I mentioned before
2023-08-31 12:33:56
technically speaking Dedekind cuts aren't ever used in the surreals
2023-08-31 12:34:32
the basic {L|R} construction is usually not named, but some literature calls it a "Conway cut"
2023-08-31 12:38:40
Ok now I'm confused because I could've sworn I read about something about Cuesta Dutari cuts being a special case of Conway cuts but now I'm reading a description of surreal construction which just calls them all Cuesta Dutari cuts
2023-08-31 12:39:23
and the notion of "Cuesta Dutari cuts" was also invented specifically to describe surreal numbers
2023-08-31 12:41:26
I hate when sci-hub doesn't have something
2023-08-31 12:44:08
and of course everything is complicated by the fact that the gaps in the surreal numbers *aren't* numbers
2023-08-31 12:44:34
the gaps in the rationals are numbers (the reals), which makes for things being intuitive
2023-08-31 12:46:05
meanwhile the non-numbers in the gaps of the surreal are only partially ordered, don't work well with multiplication
2023-08-31 12:47:01
tbh I should read ONAG from the start instead of looking at the section about gaps
lonjil the basic {L|R} construction is usually not named, but some literature calls it a "Conway cut"
2023-08-31 12:51:42
anyway, an important property of these cuts is that if all elements in L are smaller than the elements in R, then the resulting object is between the members of L and R. So if L is the class of all surreals <=0, and R those >0, then {L,R} denotes an object between 0 and >0. Finding the properties of these objects is left as an exercise to the reader (or you can read hundreds of pages of fun math)
bonnibel
lonjil I hate when sci-hub doesn't have something
2023-08-31 01:36:17
Bonus points if the paper you're looking for does not have a doi for some reason
2023-08-31 01:37:11
(~~If anyone has access to the Audio Engineering Society E-Library and could send me a pdf of 1 specific paper hmu~~)
Traneptora
lonjil anyway, an important property of these cuts is that if all elements in L are smaller than the elements in R, then the resulting object is between the members of L and R. So if L is the class of all surreals <=0, and R those >0, then {L,R} denotes an object between 0 and >0. Finding the properties of these objects is left as an exercise to the reader (or you can read hundreds of pages of fun math)
2023-08-31 02:10:14
if that's how numbers are defined, why is that a gap at all?
2023-08-31 02:10:30
or is it because L and R aren't sets
lonjil
2023-08-31 02:19:15
yeah, I think so
2023-08-31 02:20:20
If you have a set of surreal numbers, you can always define another surreal number that is unequal to any of those numbers. So the collection of all surreal numbers cannot be a set.
2023-08-31 02:22:46
I do not understand the section on gaps in ONAG, so really, I cannot be one to explain this properly.
2023-08-31 02:23:20
Though, doesn't help that Conway was rather handwavey and the only formal treatments appear to be hard to find papers >.>
2023-08-31 08:32:37
Conway also says that each and every gap is a proper class.
2023-08-31 08:33:36
So talking about many gaps at the same time is hard in any typical set theory.
Traneptora
2023-09-05 01:26:29
ugh, arch messed up libtiff
2023-09-05 01:26:42
if you are having issues with symbols not found, downgrade libtiff to 4.5.1-1
2023-09-05 01:27:01
4.5.1-2 has linker issues and will cause your gdk pixbuffs to fail to load and your x server to fail to start
lonjil
2023-09-05 03:35:12
> downgrade libtiff to 4.5.1-1 your system is now unsupported!
veluca
2023-09-05 03:50:49
I am slowly switching to NixOS
2023-09-05 03:50:58
I am not sure if I will regret this
lonjil
2023-09-05 03:52:56
Everyone I know who uses NixOS love it
2023-09-05 03:53:29
On the other hand, almost everyone I know who has tried to switch to NixOS, failed.
Tirr
2023-09-05 03:53:40
the idea behind nixos is quite nice, it's like using a modern package manager to build a root filesystem
2023-09-05 03:54:47
I found it difficult to learn how to write configuration in nix language though
2023-09-05 03:55:03
and config evaluation feels way too slow
Traneptora
lonjil > downgrade libtiff to 4.5.1-1 your system is now unsupported!
2023-09-05 05:27:19
sure but it works in the short term until they can published a fixed libtiff
2023-09-06 02:26:04
https://bugs.archlinux.org/task/79579
Cacodemon345
2023-09-06 02:28:26
So it's an issue with mozjpeg.
Traneptora
2023-09-06 02:29:36
it appears that way
2023-09-06 02:29:42
I installed libjpeg-turbo and the issue went away
Cacodemon345
2023-09-06 02:30:10
And mozjpeg is also in AUR, so definitely not a Arch problem.
Traneptora
2023-09-06 02:30:28
yea they closed it as not a bug for that reason
plate
2023-09-06 08:16:18
this is the reason why i prefer alt jpeg encoders not overriding my main libjpeg.so
Traneptora
2023-09-08 06:49:21
thanks LinkedIn very helpful
spider-mario
2023-09-08 08:24:21
maybe they really are looking for a software engineer
2023-09-08 08:24:34
to write software to receive and manage all the chicken orders
Traneptora
2023-09-08 08:27:40
I checked and it's not that
spider-mario
2023-09-08 10:12:20
https://youtu.be/8UHbL0da9c4
2023-09-10 10:25:47
2023-09-10 10:25:52
… ok
_wb_
2023-09-11 09:34:48
Lol what is that? Lobster diagrams?
spider-mario
2023-09-11 10:09:07
apparently
2023-09-11 10:09:21
I love the lemon slices for the “C1q”
chillax3042
2023-09-18 04:58:30
Hello, I am just wondering how to make my jpg files smaller before I try to put thousands of 5GB+ of them into word to create a PDF Photo Report out of them. Or how to make the old gaming laptop with only 16GB ram handle the task faster.
2023-09-18 04:59:47
...and I prefer not to loose image quality or as little as possible. Any good ideas to help my use case?
2023-09-18 05:01:00
or should I go some other channel for my question? I am new to here, so I have no clue
username
2023-09-18 05:03:08
<@529048521714958388> this tool allows you to reduce the size of pre-existing JPEG files without quality loss https://github.com/tjko/jpegoptim/
2023-09-18 05:03:51
it's a command line tool with no GUI although there may be some other program which has a GUI if using the command line is an issue
2023-09-18 05:05:29
also using `--all-progressive` will help with file size when using that tool
chillax3042
2023-09-18 05:10:23
is that software going to be easy for me to install and use? And do I have to bring up the command line in Windows ( how to do this?) or is there better way?
username
2023-09-18 05:11:18
it requires command line however I'm pretty sure there are other tools that internally do the same task but with a GUI
2023-09-18 05:11:26
Ill try to look for one with a GUI
chillax3042
2023-09-18 05:12:10
command line like type cmd into the search bar and bring up the command prompt?
username
2023-09-18 05:12:34
yes
chillax3042
2023-09-18 05:21:04
if you are talking about reducing the size, do you mean the amount of pixels? because I want to try and keep the full resolution.
username
if you are talking about reducing the size, do you mean the amount of pixels? because I want to try and keep the full resolution.
2023-09-18 05:26:43
no the tool I have sent works directly on JPEG files to reduce their **file size** but not their quality or resolution so the before and after results are pixel Identical without visual loss of any kind
chillax3042
2023-09-18 05:33:59
I would love to try it out, just not feeling so confident doing it on the company machine
_wb_
2023-09-18 06:09:43
It's the same as jpegtran -optimize, no?
yoochan
2023-09-18 06:24:31
Or jpegli, as an alternative to jpegtran. Similar command line stuff. To be tested for correct display of the colors in the pdf beforehand
2023-09-18 06:25:29
However, jpegli isn't lossless
username
2023-09-22 01:44:53
Discord somewhat recently added the ability to add custom domain connections to your profile.
username Discord somewhat recently added the ability to add custom domain connections to your profile.
2023-09-22 02:13:57
<@794205442175402004> you and any other core devs could probably add "https://jpegxl.info" as a connection in Discord (maybe even non core devs? unsure if allowing non core devs would be wanted or a good idea although jpegxl.info is considered a community website of sorts but it's fine whatever you decide). Also keep in mind it does require some setup on the side of the website/domain for verification, I don't know the specifics but iirc discord provides the steps needed to set that up when you try to add a custom domain as a connection.
2023-09-22 02:15:24
I assume more then one person can have a connection to the same domain although it's really hard to find any info about custom domain connections in Discord at all.
afed
2023-09-22 02:36:27
it's also useful to make a nicer and easier to remember redirect to invite link, for example like **discord.jpegxl.info**, as many communities do
jonnyawsom3
2023-09-22 02:47:10
You need to add a DNS record to the site per user trying to use it as a connection
2023-09-22 02:47:17
Not sure if it works with more than 1
Kampidh
2023-09-22 05:38:32
There's also an https method, but not sure as well if it works for more than one
DZgas Ж
2023-09-25 08:11:43
linux kernel source tar.xz 132 MB
lonjil
2023-09-28 08:17:10
https://mastodon.social/@geerlingguy/111141304157539494
Demiurge
2023-09-28 08:50:07
When you get into arguments and get angry with people you care about or don't care about, over completely contrived controversies, that you never would have known about without being exposed to it online or on TV... well then, politics has accomplished its goal of stealing your mental energy
username
2023-09-28 08:51:17
posting this here for context: https://discord.com/channels/794206087879852103/794206170445119489/1156873267248889916
Demiurge
2023-09-28 08:53:10
And preventing you from using that energy on building productive relationships with the people you interact with instead of arguing about whatever this month's assigned topic is.
2023-09-28 08:54:14
What is everyone supposed to be angry about this month anyways? I don't know because I stopped reading the news.
2023-09-28 08:55:37
Nevermind, I don't actually want to know what the assigned topic of this month is anyways...
2023-09-28 08:56:11
I would rather talk about what's actually on my mind without the influence of the media.
w
2023-09-28 09:00:33
you can't not be influenced from the media
Demiurge
2023-09-28 09:00:47
What do people think about, before they get their head bogged down with worthless trivia they read online?
w
2023-09-28 09:01:21
they think about nothing
2023-09-28 09:01:25
because that's not how it works
Demiurge
2023-09-28 09:02:18
I think what people think about and consider important beforehand is more important than whatever information gets amplified by the TV and social media
2023-09-28 09:04:10
I think that the whole purpose of most of this worthless information and artificial debates is to distract people and waste their energy
2023-09-28 09:04:54
And especially to waste energy fighting with each other about controversies that didn't exist until they read about them
2023-09-28 09:05:25
To get people to hate each other and feel like their lives are under attack or at stake
2023-09-28 09:05:39
When it wasn't before
2023-09-28 09:05:56
It is a very good distraction.
2023-09-28 09:06:16
A very very effective energy vampire
2023-09-28 09:07:50
The whole purpose of its existence is to be important and be something to argue about
2023-09-28 09:08:12
Just like politicians themselves.
2023-09-28 09:08:37
The more it ruins your life the more successful it is
2023-09-28 09:09:15
Anyways that's my hot take for tonight...
2023-09-28 09:10:30
Hope everyone thinks about what really matters to them and practices forgiveness and patience with others. :)
2023-09-28 09:11:11
While at the same time protecting their own sacred mental energy
w
2023-09-28 09:16:05
the problem is that what matters to you is different from someone else
2023-09-28 09:16:41
so when two ideas are against each other, that's when you need politics
2023-09-28 09:17:33
you can choose to live in a bubble, then you shouldn't be against anything that people decide for you
Demiurge
2023-09-28 09:17:47
Or just agree to disagree and not go on a holy war.
2023-09-28 09:18:21
And try to give people space to be themselves.
2023-09-28 09:18:38
Rather than telling everyone how things need to be
w
2023-09-28 09:18:52
that's still politics
Demiurge
2023-09-28 09:18:59
The whole idea of politics is wrong fundsmentally
w
2023-09-28 09:19:14
no?
2023-09-28 09:19:35
politics exists to compromise on the needs of everyone
Demiurge
2023-09-28 09:19:37
It's literally designed to waste our time and prevent us from having a productive frienfship
w
2023-09-28 09:19:50
my mere existence is because of politics
2023-09-28 09:19:54
and so is yours
2023-09-28 09:20:26
and i'm thankful that there are rules in place that allow me to be alive
Demiurge
2023-09-28 09:20:29
I exist regardless of anyone's beliefs.
2023-09-28 09:21:27
Rules only exist if people believe in them.
w
2023-09-28 09:21:47
i get it youre a liberal
Demiurge
2023-09-28 09:22:02
Unless it's a rule like... gravity...
2023-09-28 09:22:36
Sorry, I just am myself and I only know how to be myself.
2023-09-28 09:23:09
But you can call me whatever you think makes it easier to figure me out
2023-09-28 09:23:20
People do that anyways
w
2023-09-28 09:23:31
that is the definition of libertarianism
2023-09-28 09:23:45
i assume youre also economic right
Demiurge
2023-09-28 09:24:00
I wouldn't know. I just worry about being true to myself.
w
2023-09-28 09:24:23
that kind of thinking is toxic you may aswell stop existing
Demiurge
2023-09-28 09:24:38
You can be yourself too, even if it's different than me.
w
2023-09-28 09:24:43
if all you care about is yourself.
2023-09-28 09:25:39
since in your bubble, you don't want to affect anybody and you don't want to be affected by anybody
Demiurge
2023-09-28 09:25:44
Well I worry about being true to my heart more than being true to someone else's ideology so if that makes me toxic in your eyes, that's an interesting perspective.
w
2023-09-28 09:26:23
but do you agree that others should be able to be true to their heart?
2023-09-28 09:26:31
or is it only you
2023-09-28 09:26:36
in your world view
Demiurge
2023-09-28 09:27:23
I think people should be true to their heart and not live someone else's life.
w
2023-09-28 09:27:32
now how do we do that...
Demiurge
2023-09-28 09:28:08
It's not easy :) everyone wants to tell us how to live and think
2023-09-28 09:28:19
And define us and put us into a neat box
2023-09-28 09:28:42
Classify everything into neatly defined groups
2023-09-28 09:28:53
And then make them at war with each other for fun
w
2023-09-28 09:28:57
so how would you do it?
Demiurge
2023-09-28 09:29:47
Use gratitude to help you stay in the present? That would be a good start.
w
2023-09-28 09:30:43
unfortunately not everyone has the luxury to be dealing with that
Demiurge
2023-09-28 09:30:53
Think of all the things you're thankful for in order to ground you in the present and think of what's actually here rather than what isn't here
w
2023-09-28 09:32:18
😔
Demiurge
2023-09-28 09:34:11
People like to talk about freedom but freedom is a state of mind. What I want is a form of awakening. The freedom I want can't exist if everyone still thinks inside the same box.
2023-09-28 09:35:32
That isn't what most people want to hear and it isn't what most people are even ready to hear and understand but that's the truth. Nothing will ever change until the way we think changes
2023-09-28 09:36:11
People have confined themselves in a box they have to break out of first.
spider-mario
Demiurge The whole idea of politics is wrong fundsmentally
2023-09-28 09:37:06
politics can’t not exist https://en.wikipedia.org/wiki/Politics > Politics (from Ancient Greek πολιτικά (politiká) 'affairs of the cities') is the set of activities that are associated with making decisions in groups, or other forms of power relations among individuals, such as the distribution of resources or status. The branch of social science that studies politics and government is referred to as political science.
2023-09-28 09:37:17
at most, you could say that the current way that we approach politics is wrong
2023-09-28 09:37:27
but it would be useful to be more specific than that
w
2023-09-28 09:37:50
i'm on the side of economic freedom but I can at least acknowledge poor people exist
Demiurge
2023-09-28 09:38:54
Government and religion are two names for the same thing