• 122 Posts
  • 864 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle





  • , but it works reliably well. It takes a second or two to be redirected to the site you’re visiting.

    Do you mean it works reliably well in letting users through, or in blocking AI?

    Do you have sources or more information about the effectiveness of it in blocking AI? What else it blocks as collateral damage would also be interesting.

    /edit: Clicking through some links (specifically canine.tools) I have to say - it may also be effective in annoying me personally, and eventually exiting those websites. Similar to consent dialogs you could go into settings for and save with opt-outs. But it’s a barrier and user-opposing functionality.

    I certainly don’t see it as a simply or only good and effective thing.


  • It doesn’t open with a summary or overview but dives right in to exploration, but I think the point comes across:

    The copy and paste key codes, which have no physical keys anymore, are - to a degree - supported in software. Their claim is that those key codes are the tool for universal copy and paste, and then it’s the input interpretations job (key and combination mapping) to offer bindings to those key codes.

    GTK added support the copy and paste keyboards in January 2025. QT also added support for copy and paste key codes the same month. I’m not sure of the first released version of the GTK toolkit that will contain the fix. For QT, it will be QT 6.10, scheduled for release in September 2025. Together, this will cover many apps built for Gnome and KDE as well as others that use the same toolkits.

    … followed by some more “current state of support for those key codes”.



  • You linked a tutorial to sh. Note that nobody ends up shell scripting in sh. People will use bash, which is an alternative shell and shell language, and almost universally available where sh is available. sh is very old and limited. bash is much more common.

    There’s many other kinds of shells as well though. And you such an automation task you could use any number of scripting languages. The part that makes it a shell, which is interactive use, is not necessary for a scripting task like this of automating an operation. Shell languages can be used as scripting languages too though. I just want to point out alternatives and context.

    Personally, I use Nushell as my daily shell and for scripts and am very satisfied with it. It’s not universally available as in pre-installed, but is multi-platform and easy to install through an exe or package. Because it’s a newer project, there’s not that many resources yet, and still occasionally makes changes to its language with new releases. But, for me, the upsides to other shells are obvious and significant. I posted my Nushell solution in a separate comment (separating concise solution from this general prose exploration).



















  • I looked at Wikipedia; Taler then Blind signature, then looked for docs on GNU Taler where I didn’t immediately find any technical overview of how that works. Phind gave me a seemingly reasonable and understandable answer. (Surely sourced from somewhere.)

    When we multiply the original message by rere, sign it, and then multiply by r−1r−1, the blinding factors cancel out while preserving the signature.

    The success of this process relies on two critical properties:

    • The blinding factor must be relatively prime to N
    • The RSA keypair must satisfy the congruence relation red≡r(modN)red≡r(modN)

    The magic is that you can

    1. Apply a mathematical operation on your data
    2. Sign that data
    3. Revert/Invert the mathematical operation

    and the signature remains valid.

    It does sound like magic. But isn’t most of cryptography like that?

    There’s a python example in there as well, with such a calculation. I didn’t go through it though.