You are the end result of a “would you push the button” prompt where the prompt was “you have unlimited godlike powers but you appear to all and sundry to be an impetuous child” – Zero, 2022
> Carmen is finally back online
> I immediately check my grades
> Nothing has been updated because it literally just came back and the TAs haven't gotten to enter anything yet
You are the end result of a “would you push the button” prompt where the prompt was “you have unlimited godlike powers but you appear to all and sundry to be an impetuous child” – Zero, 2022
You are the end result of a “would you push the button” prompt where the prompt was “you have unlimited godlike powers but you appear to all and sundry to be an impetuous child” – Zero, 2022
TBF I assume university wifi is pretty trustworthy (since it's got decent security measures in place), but when you're just in random places looking for random hotspots it all feels a bit shady
Central, my uncle ____s works at a University, on the computer security team.
He recommends that weird tor onion thing when using public wi-fi.
Also, he recommends doing this weird thing where you go deep into the hard-to-find settings and do something technical I don't understand but it prevents most viruses and computer stuff I don't understand.
Your futile existence has no meeeeaaaaannniiinnnggggg
I used to think that the antinatalist rejoinder to Nietzsche's "Whoever would be destroyed by the thought "There is no salvation" should be" was "We ALL should be destroyed by that thought".
But now I think the biggest antinatalists on the internet agree, they just think they're part of the group that should be destroyed.
Pretty much, yeah.
It's better to just be indifferent to the whole idea of salvation, I think, not because it isn't a nice idea, but because it tends to presuppose a lot of other ideas that strike me as a bit pretentious, and explicitly believing that there isn't and, as noted, allowing yourself to be destroyed by that idea accepts too many of those opposing pretences.
You are the end result of a “would you push the button” prompt where the prompt was “you have unlimited godlike powers but you appear to all and sundry to be an impetuous child” – Zero, 2022
Hey SredVash, do you have an account on a popular social networking website that limits correspondence to 140 characters at a time?
Basically, I remember him saying that when you are on a website, the server/website/I-don't-know-which-one you are on sends out datastuffs to other sites and advertisers. Like, specific data, these datastuffs (channels? streams? mesages? lines? connections?) are affected by what stuff you scroll past, how often you switch tabs, what links you hover over but don't click, what text you highlight, and lots of other things.
The university has a monitoring computer thing program/system/function that displays these data sent as pixels flowing in lines from one url in the center of the screen to other urls on the sides of the screen. Apparently, these datastuffs are part of how the NSA does surveillance and how Google brings up personalized/more-relevant results.
So, also, there are apparently things the people in the security team do to their specific internetthingaccesscbrowserwhatever to allow them to not trigger the sending of those datastuffs.
Anyways, what I'm saying is that yes, University wi-fi, if the security team is doing its job, should be as safe as the user allows it to be. The main problem is on the student end.
But, yeah, random-place-without-security wi-fi? I can't promise anything except that it would be really fun to write HELLO MISS NSA SURVEILLANCE WORKER, THERE IS TOTALLY NOT A SPIDER ON THE BOTTOM OF YOUR CHAIR.
Take all of this with a grain of salt, as this is my memory of a thing I didn't really understand.
i think there are two or three main ways to collect information about web browsing habits:
1. based on IP address. your IP address is used to send and receive information to/from the internet, so it's like your physical address. even if one doesn't know what your mail contains, one can see where you send your mail and who mails you. usually it's not too hard to figure out what sites you're visiting, based on this. the limitation is that this is based on your having a constant IP address, and one that preferably isn't shared with other people -- because if it is, then it's harder to figure out what you specifically are doing (though this may or may not be a useful defense in an actual legal case, so don't quote me on this).
2. cookies. cookies are little bits of information that web browsers can set on your computer. these have a huge variety of uses -- for example, heapers' hangout uses cookies to know that you're logged in; deleting those cookies will log you out. advertisers may set cookies when you visit sites to try to get some information about what other sites you visit; these are tied to your computer and your web browsing profile. you can usually delete cookies, or even tell your browser to not set them at all -- though some site features will depend on cookies, such as pretty much any site that involves logging in.
3. user accounts. more typical for companies than governments, these are ways by which you can pretty much tell a site everything that you're looking at on that site, and instead of having to keep track of you using an otherwise-anonymous identifier cookie on, they can keep a whole account (or if you want to be cynical, a whole intel file) on their server, about who you are, maybe some basic info on you (e.g. age and gender, or whatever it takes to sign up to that website), and your record of how you've interacted with their site. for example, if you have a google account and use youtube, youtube will remember the videos you've seen (and keep a list of them, if you (or anyone else?) wants to recall anything from that list), and it will also start recommending videos to you based on things you watch.
You are the end result of a “would you push the button” prompt where the prompt was “you have unlimited godlike powers but you appear to all and sundry to be an impetuous child” – Zero, 2022
Man, I remember when Twitter apps first became a thing and there were a bunch of them that had issues because they were counting 140 bytes instead of 140 characters
Hint: Unicode means that 1 character = 1 byte is no longer a safe assumption
You are the end result of a “would you push the button” prompt where the prompt was “you have unlimited godlike powers but you appear to all and sundry to be an impetuous child” – Zero, 2022
How the fuck does someone in the Midwest live without like a zillion extra blankets in the house?
You are the end result of a “would you push the button” prompt where the prompt was “you have unlimited godlike powers but you appear to all and sundry to be an impetuous child” – Zero, 2022
Ah, I can understand that
I have this weird thing where I can't sleep without a clock
That's why I've kept the same broken-ass LED clock radio since I was 5
You are the end result of a “would you push the button” prompt where the prompt was “you have unlimited godlike powers but you appear to all and sundry to be an impetuous child” – Zero, 2022
do you have an account on that popular social networking site that is known for its creepy stalkers ability to give things and people and comments "likes"?
do you have an account on that popular social networking site that is known for its child porn and celebrity nudes subsections for just about every topic out there?
do you have an account on that popular social networking site that is known for its armchair activist userbase reblogging feature?
do you have a presence on that popular social disconnection site that is known for its raids on other sites many subcommunities dedicated to geeky topics?
No, I'm not saying that her place isn't colder, I know that Minnesota gets way dang cold because humidity and temperature and all that.
I'm giggling at the word "Midwest", it's a very amusing concept, these easterners trying to call themselves west.
Nobody claims to live in the "Mideast".
Trust me, I would never challenge the Great Lakes area when it comes to coldness.
Remember who founded your republic, Roz. The nearest big city where I am used to be the nation's capital until the proto-secessionist jackasses south of the Mason-Dixon decided it was too far north. It's not even two hours to the Atlantic from here.
Hence, Midwest. It's in the middle, and west of the real states. >:3
I am pretty reasonably sure I could identify people from New York, Texas, Florida, California, and Pennsylvania but that last one only because I live there.
Most of the states are pretty nondescript on their own, or are part of larger multistate vagueities like Delmarva.
Comments
Endless Thirteen
He recommends that weird tor onion thing when using public wi-fi.
Also, he recommends doing this weird thing where you go deep into the hard-to-find settings and do something technical I don't understand but it prevents most viruses and computer stuff I don't understand.
The university has a monitoring computer thing program/system/function that displays these data sent as pixels flowing in lines from one url in the center of the screen to other urls on the sides of the screen. Apparently, these datastuffs are part of how the NSA does surveillance and how Google brings up personalized/more-relevant results.
So, also, there are apparently things the people in the security team do to their specific internetthingaccesscbrowserwhatever to allow them to not trigger the sending of those datastuffs.
Anyways, what I'm saying is that yes, University wi-fi, if the security team is doing its job, should be as safe as the user allows it to be. The main problem is on the student end.
But, yeah, random-place-without-security wi-fi? I can't promise anything except that it would be really fun to write HELLO MISS NSA SURVEILLANCE WORKER, THERE IS TOTALLY NOT A SPIDER ON THE BOTTOM OF YOUR CHAIR.
Take all of this with a grain of salt, as this is my memory of a thing I didn't really understand.
1. based on IP address. your IP address is used to send and receive information to/from the internet, so it's like your physical address. even if one doesn't know what your mail contains, one can see where you send your mail and who mails you. usually it's not too hard to figure out what sites you're visiting, based on this. the limitation is that this is based on your having a constant IP address, and one that preferably isn't shared with other people -- because if it is, then it's harder to figure out what you specifically are doing (though this may or may not be a useful defense in an actual legal case, so don't quote me on this).
2. cookies. cookies are little bits of information that web browsers can set on your computer. these have a huge variety of uses -- for example, heapers' hangout uses cookies to know that you're logged in; deleting those cookies will log you out. advertisers may set cookies when you visit sites to try to get some information about what other sites you visit; these are tied to your computer and your web browsing profile. you can usually delete cookies, or even tell your browser to not set them at all -- though some site features will depend on cookies, such as pretty much any site that involves logging in.
3. user accounts. more typical for companies than governments, these are ways by which you can pretty much tell a site everything that you're looking at on that site, and instead of having to keep track of you using an otherwise-anonymous identifier cookie on, they can keep a whole account (or if you want to be cynical, a whole intel file) on their server, about who you are, maybe some basic info on you (e.g. age and gender, or whatever it takes to sign up to that website), and your record of how you've interacted with their site. for example, if you have a google account and use youtube, youtube will remember the videos you've seen (and keep a list of them, if you (or anyone else?) wants to recall anything from that list), and it will also start recommending videos to you based on things you watch.
do you have an account on that popular social networking site that is known for its child porn and celebrity nudes subsections for just about every topic out there?
do you have an account on that popular social networking site that is known for its armchair activist userbase reblogging feature?
do you have a presence on that popular social disconnection site that is known for its raids on other sites many subcommunities dedicated to geeky topics?
this is a website for two-bit cleverness
third bit is requested to die an ignominious death at 14 PM on april the 5th of january
Oh my gosh you easterners are so adorable. I love how they never claim to be the Mideast.
(knows exactly the blanket thing you are talking about. Extra blankets are indispensable.)
I'm giggling at the word "Midwest", it's a very amusing concept, these easterners trying to call themselves west.
Nobody claims to live in the "Mideast".
Trust me, I would never challenge the Great Lakes area when it comes to coldness.