• 0 Posts
  • 26 Comments
Joined 1 year ago
cake
Cake day: June 21st, 2023

help-circle





  • bisby@lemmy.worldtoScience Memes@mander.xyz*Ackshually*
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    If we’re ackshually things, lets cover the references to the lake of fire in the bible.

    In revelations 19:20, there is the beast and the false prophet being tossed into the lake of fire.

    In revelations 20:9, a bunch of people are explicitly consumed by fire from heaven. Consumed, not burned forever.

    Then in revelations 20:10, the devil is added to the lake of fire with the beast and false prophet, and those three burn forever. But not the common folk.

    Lastly, in revelations 20:13-15, hades and death give up their dead, and people are judged. Bad people are tossed into the lake of fire, explicitly labeled as a second death, but not mentioned as being eternal torment.

    So in conclusion, the devil himself is spending eternity burning in the lake of “fire” (not lava or magma, nor is it underground, this is the apocalypse, this is happening on the surface of the planet that is being bombarded with heavenly shit), he’s not doing any torturing there. He is also not the one sending people there, and sinners don’t burn forever, they die when cast into the fire.


  • bisby@lemmy.worldtoScience Memes@mander.xyzEquality
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    3 months ago

    Both sides are being unbearably obstinate here.

    The teacher’s meaning is clear and the kid should just answer what is being asked, not what is being said. So the kid is in the wrong. If you’re smart enough to be this clever, just answer the question.

    The teacher says “You are wrong, failed” when the kid is technically correct, instead of clarifying the intent of the question. So the teacher is in the wrong. “Clever, but you know what I meant” solves the problem. “You get an A in math and an F in interpreting language”

    On the flip side, I had a cousin who had a question on a test: “What is the largest SI prefix” … he answered “yotta” (which at the time was the largest)… And got it wrong. because the “correct” answer was “mega”. Because that was the largest the class had learned about at the time, and the teacher was very inflexible on this; they acknowledged that yotta was the largest, but my cousin had learned about it outside of class, so it couldn’t be an acceptable answer. The teacher couldn’t possibly fathom marking “mega” right for students who had only context from the classroom and also marking “yotta” right for students who had done independent research. No, the question was IMPLIED to be “what is the largest SI prefix [that we have covered in class]” and anything else was wrong.




  • Debian aims for rock solid stability

    To be clear, Debian “stability” refers to “unchanging packages”, not “doesn’t crash.” Debian would rather ship a known bug for a year than update the package if it’s not explicitly a security bug (and then only certain packages).

    So if you have a crash in Debian, you will always have that crash until the next version of debian a year or so from now. That’s not what I’d consider “stable” but rather “consistent”


  • Definitely make sure you think through all the physical security implications of having your house automatically unlock in any scenario.

    Have the house auto unlock when getting home on a bicycle, sounds convenient until, as you point out, they could get stolen and now the thief has a convenient way to unlock your house. So you would not want that.

    You would definitely not want the house to STAY unlocked when something like a tag is in range. If your kid is home alone, you want them to be able to re-lock the house (or in general, you want to be able to lock your house while the kid is home).

    Whatever solution you wind up with, you are going to be trading physical security for ease of use (and complicated fun task). Be safe. Make sure the tradeoffs are actually thought through and worth it.




  • The archlinux-keyring package will install a few gpg keys.

    But also, the AUR also uses gpg keys to validate things.

    Just searching the AUR for one of the repos that Jaffa linked to in another comment…

    https://aur.archlinux.org/cgit/aur.git/tree/PKGBUILD?h=librespot

    Here is the PKGBUILD. Note line 24:

    validpgpkeys=('EC57B7376EAFF1A0BB56BB0187F5FDE8A56219F4') ## Roderick van Domberg
    

    And I’m sure if you got through the AUR there are plenty of packages that use this

    Many AUR helpers (like paru, or yay, etc), will either auto download these keys for you, or prompt you. Even if you were to build this pkgbuild by hand, unless you removed that line, it would require you to import the key for the makepkg to work. So “how does a fresh arch install wind up with GPG keys that I didn’t manually import?” … the answer is AUR helpers most likely (or you did it manually for a makepkg and just forgot).

    It’s also worth pointing out that GPG handles signing things, but also signature verification. These are all public keys in your system. Having public keys that have been used for signature verification is perfectly normal and kind of the point. If you had Roderick’s private key that would be weird.



  • bisby@lemmy.worldtoScience Memes@mander.xyzLove
    link
    fedilink
    English
    arrow-up
    1
    ·
    6 months ago

    e^x and 7 were walking down the street having a nice chat, when in the distance, they see a derivative walking towards them. 7 panics, turns and runs in the opposite direction. e^x is smug and walks right up. “Hi, I’m e^x” it boldly declares to the derivative. The derivative smiles back, “Hi, I’m dy/dt”


  • The internet and cloud points are my favorite. Specifically the fact that those things are out of the picture.

    No VLAN configuration necessary. The hub is “the VLAN”. They literally can’t phone home because they have no route to the internet, with no extra setup necessary. For WiFi devices, I have to make sure they’re connecting to the right VLAN and controlled properly, and if I misconfigure something, they are phoning home or joining a botnet.

    (This stops being as applicable if you have a sketchy hub you don’t trust, but I trust deconz and ZHA fine enough in this context).


  • Because of how starlink works, they have to aim satellites specifically at areas for data to flow. They have the ability to turn regions on and off (ie, satellites over China).

    They know exactly where the transceivers are and based on movement patterns, probably which side they are on.

    Unless he is feeding that position data to the Ukrainian military, he knows exactly who is using them and letting it happen. He didnt sell them the dishes, but he lets them be used.