Ok so I checked and it looks to be AI slop but I am not against the idea. Trading in some convenience for a little whimsy can be a good trade to make.
Jack Riddle[Any/All]
Profile picture drawn by Paws and Claws and licensed under the Creative Commons Attribution Sharealike 4.0 International license(cc-by-sa 4.0)
- 2 Posts
- 228 Comments
Jack Riddle[Any/All]@lemmy.dbzer0.comtoMicroblog Memes@lemmy.world•25 years of marriageEnglish
6·2 days agoI mean I don’t think most epstein listers are pedophiles in the sense that they are only attracted to children, my guess would be that it is mostly either a kink for the power dynamic or the taboo. There are prob some exceptions tho
fyi the satanic temple is (also) founded by a eugenicist and their financials are incredibly murky, making it at least seem like all oonated money going directly to Greaves
source(if you want to read all of it click through the links)
Jack Riddle[Any/All]@lemmy.dbzer0.comto
TechTakes@awful.systems•Stubsack: weekly thread for sneers not worth an entire post, week ending 8th February 2026English
3·2 days agoI think the version of this that happens is mostly people making claims about a book they heard from somewhere. see: 1984
Jack Riddle[Any/All]@lemmy.dbzer0.comto
TechTakes@awful.systems•Stubsack: weekly thread for sneers not worth an entire post, week ending 8th February 2026English
7·2 days agoI find it very funny to see worm listed among the other “long books everyone says they read but didn’t” because I am 100% percent certain that literally noone outside of LW does that
Jack Riddle[Any/All]@lemmy.dbzer0.comto
Science Memes@mander.xyz•To USB, or not to USBEnglish
8·3 days agoas long as a paper manual exists…
(tar -xzvf <file> btw, the dash before xzvf is optional)
Jack Riddle[Any/All]@lemmy.dbzer0.comto
Science Memes@mander.xyz•More CUDA pleaseEnglish
10·3 days agostop doing x(originally stop doing math)
Jack Riddle[Any/All]@lemmy.dbzer0.comto
SneerClub@awful.systems•Eliezer’s response to being in the Epstein filesEnglish
3·4 days agoI don’t want to say anything that’ll get me banned, so I won’t. I just want you to know that I really really want to.
As I understand it, this happens cryptographically. Send keys can be added to form a larger key, which gets used to sign the pool of transactions. Because the signature used your key as well, the recipient can verify that they have received your coins(from a pool you signed). The important part is that it is impossible to tell who signed what part of the pool, just that one of the people in the pool did. Because all money is pooled together and sent at the same time, it is not possible to read from the amounts sent which transaction belongs to who.
I believe the way they deal with this is by having the recipient create a one-time address for every sender, so it is not possible to recognize patterns between senders and recipients. Another thing is that every wallet has two associated keys. There is a “spend key”, which is a write-only key that can spend money from the wallet, and a “view key”, which can be used to view the contents of the wallet. You can publish the view key if you want that to be public information, but you don’t have to.
If a diy hrt seller doesn’t accept obfuscated cash they are 100% a fed, but point taken
You might be right, I have not followed xmr closely. You might also notice that this vulnerability is unlikely to deanonimise you, but the point was more that it is a mistake they shouldn’t have made. Their last audit looks fine, though it was made by a blockchain auditing company which I don’t know. I don’t think there is much harm in using xmr for this, groups who would be capable of exploiting vulnerabilities in this kind of project are unlikely to do so, unless an issue of national security becomes associated somehow
xmr is a cryptocurrency which aims to make reading transactions from the chain impossible. Iirc the main mechanism of this is that they bundle a lot of transactions together and send out coins from that pool only once it is large enough, without preserving each specific coin. This repeats for a few proxies. You could trace a coin from origin to endpoint, but this would be pretty much useless as you cannot know whether the endpoint was the intended one or not.
Jack Riddle[Any/All]@lemmy.dbzer0.comto
TechTakes@awful.systems•Stubsack: weekly thread for sneers not worth an entire post, week ending 1st February 2026English
10·10 days agothe overman¹
¹better known by it’s german name
Jack Riddle[Any/All]@lemmy.dbzer0.comto
TechTakes@awful.systems•Stubsack: weekly thread for sneers not worth an entire post, week ending 1st February 2026English
4·10 days agothe comments also do not get it at all. The guy going “don’t say you have 99% percent credence in something¹, for most people saying that it’s a virtual certainty is the same thing” these people cannot speak as a non-cultmember for even a second
¹yeah don’t, nobody says that
Jack Riddle[Any/All]@lemmy.dbzer0.comto
SneerClub@awful.systems•Yudkowsky’s “dumb maths question” for genetics twitterEnglish
16·11 days agoIn another world with my almost entirely different set of intelligence-promoting alleles?
Jack Riddle[Any/All]@lemmy.dbzer0.comto
Science Memes@mander.xyz•the public demands ANSWERSEnglish
100·11 days agoalthough this is usually correct, here it is important for the joke that setup and punchline are seperated by anticipation.
Both servo and firefox now report the text correctly. I haven’t checked the response code on those, but lynx correctly reports 418:



bash mentioned ! ! !