Ah, I guess I didn’t know they didn’t have the rights anymore. Tbh I played through AW2 and didn’t connect that Casey was a reference to Max Payne lol.
Ah, I guess I didn’t know they didn’t have the rights anymore. Tbh I played through AW2 and didn’t connect that Casey was a reference to Max Payne lol.
Heh, does Astrobot count?
What do you mean legally distinct? You know that’s Sam Lake, writer and creative director at Remedy, and face model for Max Payne 1/2, both also developed by Remedy?
The existence of this article is confusing to me. FB doesn’t need to “scrape” their own site, and they don’t care about whether you set your photos to public or private.
I find it to be a bit sketchy in general, because it means the OS is actually parsing and editing the actual bytes of the file contextually when an app tries to access it. Probably making a shadow copy somewhere without the GPS exif data.
But yeah, I agree, at a minimum the OS should pop up a notification that “By default, GPS data will be stripped from the file due to inadequate location permissions” until the user either changes their preference or says “that’s fine, don’t remind me for this app”. Having it happen silently just isn’t good.
Also, yesterday was Bandcamp Friday (they forgoe their cut and everything goes to the artist). The next two are Oct 4th and Dec 6th.
You’re not entering a contract with those people, let alone being paid. If you believe you’re getting paid in an untracable way, your govt would like a word with you.
I don’t know why you think the company got played, did you read the article? Dude is busted. Best case, they’re going to garnish his income for the rest of his life.
ToS was the wrong term. Artists agree to a contract when they monetize their content on Spotify. The contract specifies exactly what the artist will be paid for. If the artist was misrepresenting facts in order to be paid more than the contract would otherwise stipulate, it’s called fraud, and that is a crime.
Artificial streams are not new. Spotify has many articles dedicated to describing the problem of artificial streams, and the penalties for artists engaging in it. Here are One, Two, Three of them just from a single search.
This is a loophole in the same way that taking stuff when the owner isn’t looking is a loophole. In other words, it’s just called a crime.
It’s not a loophole, though. Their ToS specifically prohibits creating artificial streams. The guy isn’t going to get away with it. The AI generated music isn’t a problem, but spinning up bots to give it streams is the same as using click bots to farm ad revenue. If the man catches you, the man’s gonna win.
Vulfpeck made a silent album and asked fans to stream it nonstop. THAT was a loophole, because there wasn’t anything spotify could do, there wasn’t anything in their agreement that said they couldn’t do that, and that’s awesome. Spotify (and the others I assume) has since plugged that hole, but I applaud them for taking advantage while they could.
Yeah, I have to think there are others out there doing this same thing at a smaller scale, being more subtle about it, and not getting caught. This guy just got a bit too greedy.
I think this was Steve Jobs’ primary skill. He could see a clear vision of the product people didn’t know they wanted. Bottom to top, from the hardware to run on, to the typeface their apps used; he knew that the best user experiences happened when every level of the stack harmonized to create a very finely tuned user experience.
Unfortunately, the people who are that good usually don’t work for free. We’re very fortunate that Valve is choosing to open source their work and keep their SteamDeck platform an open one.
Debian is the only one there I haven’t actually tried myself as a daily driver, so idk if using the terminal is necessary. I’ve just heard it’s solid and I assumed all normal user operations can be done via GUI in gnome or KDE like you can with Fedora.
It’s better to ask which distro is dummy proof. Some are made for noobs and windows users, others are not, and they’re all based on “Linux”.
Mint, Debian, and Fedora are all good starter options, and all are made to get stuff done without having to use the command line.
I agree. Specifying the same param twice like this feels like it should be idempotent. Sometimes a final cmdline string is built by multiple tools concatenating their outputs together; if each one adds --force
without any way to know if it’s already been added elsewhere, this could lead to undesirable behavior.
Even --forceforce
would be better.
Dumpster fire or not, it doesn’t let you actually see recent posts unless you’re signed in anymore. So all the public services that use it (or Facebook) to make public statements are inaccessible.
IMO the US should start a .gov mastodon instance for these types of accounts. Moderation might be a challenge given that there’s a fine line between censorship on a private platform, and infringement of free speech on a publicly funded one, but I think we’ll need to figure it out eventually.
I remember when the mapping of virtual memory segments clicked for me. I think i said out loud, “that’s so clever!”. Now it just seems so fundamental to managing memory for user space applications, but I hadn’t thought about how it was done before.
Immich is a self-hosted photo hosting service. They’re listing this in their docs because people are trying to upload photos with GPS data, hitting this cursed behavior because they didn’t give immich Location access (because why would you?), and then filing unnecessary bug reports on them about their disappearing data.
To be clear, no one is against stripping GPS data, that’s not what anyone takes issue with, it’s the silently part that is unexpected behavior.
It’s cursed because it happens silently, such that you might accidentally be deleting gps data you wanted to keep without noticing, for a reason that you probably wouldn’t think to check, probably instead erroneously filing a bug on the app for doing it.
I’m actually not sure what TPM can guard against, but I think you’re right, I think if a malicious OS borked with the bootloader, TPM would catch it and complain before you decrypt the other OS.
Yeah, physical access usually means all bets are off, but you still lock your doors even though a hammer through a window easily circumvents it. Because you don’t know what the attacker is willing to do/capable of. If you only ever check for physical devices, you’ll miss the attack in software, similarly if you only rely on Secure Boot you’ll miss any hardware based attacks. It’s there as a tool to plug one attack vector.
Also, my guess is the most common thing this protects against are stupid employees plugging a USB they found in the parking lot into their PC. If they do it while the OS is running, IT can have a policy that blocks it from taking action. But if they leave it there during a reboot, IT is otherwise helpless.
No point in putting locks on your house, because an attacker can just drive their car through your front door.
The attacks you mention have their own ways of being detected: usually eyeballs. But eyeballs can’t help you against something hiding in your bootloader. So Secure Boot was made.
And I don’t really follow your dual boot claim. If you don’t trust one of the OSes, and you boot it up on your hw, you’re already hosed. At that point it can backdoor your bootloader and compromise your other OS. Secure Boot prevents malicious OSes from being booted, it can’t help you if you willingly boot a malicious OS.
“Linear” is not a word I would use to describe it, hah. I’m pretty sure you can go back to the start, make different choices, and play another 70+ hours of content you’ve never seen. Which is even more insane.