Possibly “Making History” by Stephen Fry - although at 380 pages it doesn’t quite match as a short story, and the protagonist doesn’t stop himself so much as do something else to reverse the effects of his actions to save Hitler.
- 6 Posts
- 159 Comments
A1kmm@lemmy.amxl.comto Games@lemmy.world•Nintendo is Trying to Stop You From Filing Lawsuits Against Them With New EULA AmendmentEnglish12·1 month ago“Except for Claims (i) in which a party is attempting to protect its intellectual property rights (such as its patent, copyright, trademark, trade secret, anti-circumvention, or moral rights, but not including its privacy or publicity rights) …”
So in other words, the types of matters Nintendo thinks it might have a dispute against users, court and class actions are okay, but for everything that they think users might file against Nintendo, they think arbitration is best.
A1kmm@lemmy.amxl.comto Android@lemmy.world•My love - hate relationship with Xiaomi (reliability)English15·1 month agobootloader unlocking
I used to buy Xiaomi products because of the bootloader unlocking, but in practice it is a dystopian nightmare - they have built it so to unlock the bootloader you need a cryptographic signature from them, and they don’t give that out all that easily.
You have to sign up for an account with them, use a Windows-only tool to request unlocking, and they have a long wait period (deliberately imposed) to unlock, which sometimes randomly restarts. The wait period is different for different models, and can be weeks.
Their support are unwilling to help unlock immediately even for replacement devices where you want to get up and going quickly - if your device breaks (they are not the most durable phones IMO, as you note) and you get a replacement, you’ll have to wait the time again before you can restore a backup of a phone using a custom ROM.
It’s possible they have improved, but because of their attitude around what I can do with my own hardware, I’ve stopped buying Xiaomi gear.
A1kmm@lemmy.amxl.comto Technology@lemmy.world•China has world’s first operational thorium nuclear reactor thanks to ‘strategic stamina’English4·2 months agoThe resulting waste from a thorium reactor is radioactive for dozens or hundreds of years not tens of thousands of years so you don’t need a giant Yucca Mountain style disposal site
That is assuming they don’t make significant amounts of Fe-60 (2.6 My half-life) by exposing steel pipes to neutron flux. While the fuel itself might have a shorter half-life, other waste still needs to be dealt with.
A1kmm@lemmy.amxl.comto World News@lemmy.world•Donald Trump Accuses Canada of 'Cheating' Amid Tariff WarEnglish7·3 months agoYears of carefully curated anti-intellectualism in every bit of media they consume, because facts didn’t suit the wealthy (smoking is bad for you, fossil fuels are destroying the planet, private prisons drive more recidivism are facts that get in the way of someone making lots of money). Those fighting facts that aren’t on their side have embraced a number of other groups with anti-intellectual elements (white supremecists / neo-nazis / anti-woke, religious, anti-vaxxers, natural health advocates) to create alliances of anti-intellectual thought.
This has driven increasing polarisation in the US; 49% of republicans approved of JFK as president, and 49% of democrats approved of Eisenhower. It went down over time - other party approval was 30% of Carter, 31% of Reagan. There was a break in the pattern (44% for Bush Senior), but back on track to 27% for Clinton, 23% for Bush, 13% for Obama, 7% for Trump (first round), and 6% for Biden. So in other words, Americans are so polarised that they’ll vote for whoever their side puts up, and for one side, being anti-intellectual is actually seen as a strength.
I think many of the people who started the anti-intellectualism ball rolling on purpose are wealthy neoliberals who believe in laissez-faire free trade as a fundamental value, and so there is a certain aspect of ‘leopards ate my face’ to this leading to the anti-intellectualism extending back to rejection of mainstream economics (even though the neoliberals’ preferred theory is notoriously flawed, Trump’s approach to pulling economic levers is wholesale rejection of all theory rather than replacing it with something less flawed).
A1kmm@lemmy.amxl.comto World News@lemmy.world•Denmark's postal service to stop delivering lettersEnglish2·3 months agoTraditionally legal tender means that a person / entity has to accept it for the payment of a debt - i.e. they can’t refuse cash and say you didn’t pay them because you didn’t use some other method.
However, in many retail scenarios there is no debt - there is an exchange of payment for goods, and so the traditional common law legal tender rules do not prevent retailers from refusing that exchange (i.e. customer doesn’t get the goods, retailer doesn’t get the money, the transaction just never happens) on the grounds of payment methods.
Some places have additional laws on top of legal tender that might require retailers to accept cash.
The awkwardness here actually works in favour of abolishing tips and replacing them with the pay being factored into higher prices.
No one wants to be the sucker - human nature is that people are generous if they think everyone else is generous, but if they feel that others are not ‘pulling their weight’ on generosity and are instead taking advantage, that’s the fastest way to dry up other people’s generosity. Right-wing media use this fact to undermine support for social welfare - e.g. if 0.001% of welfare payments are fraudulently taken, they set editorial policy that makes it seem like beneficiaries are rorting the system instead of being truly needy.
But when it comes to tipping, the dynamic actually works the other way - people feel generous by tipping, even though it is harmful long term. If a few people ahead of someone in the line don’t tip, should they be the sucker who does tip? And for the employee, you want them to be the advocate on the inside for forcing people to pay their share instead of taking advantage - by having the displayed price be the total upfront price that includes the compensation for employees, instead of an optional tip.
There is a minimum amount of total money the employee could make before they’d go and work somewhere else instead. So if, hypothetically, everyone in a country where tipping is common even for non-exceptional service just stopped paying tips, hospitality employers would be forced to pay more to stay competitive with other non-customer-facing industries.
Of course, a drastic shock to the economy like that would probably cause a lot of upheaval, as some employers struggle to accept the new norm.
However, the same thing would work even if the change was slower - e.g. if 5% of people didn’t tip, and did it very obviously and vocally, and then the practice spread as it reached 10% and so on.
Obviously it sucks for the employees who get hit by the first few non-tippers, but over the long term it would be for the better for worker rights. So I could absolutely see it working.
That said, I say this from a country where tipping is not the norm (except maybe the occasional ‘keep the change’ for exceptional service), and the law and expectation is that the most prominent displayed price is the total price you pay - and people react very negatively towards businesses seen as trying to bring in American style tipping culture.
A1kmm@lemmy.amxl.comto Technology@lemmy.world•What are the potential risks and benefits of implementing encryption backdoors for law enforcement?English2·4 months agoThe FBI pressured Apple to create an encryption backdoor to bypass their security features
This was more like a hardware security device backdoor - the key was in a hardware security device, that would only release it after receiving the PIN (without too many wrong attempts). But the hardware accepts signed firmware from Apple - and the firmware decides the rules like when to release the key. So this was effectively a backdoor only for Apple, and the FBI wanted to use it.
Systems would create a public audit trail whenever a backdoor is used, allowing independent auditors to monitor and report misuse of backdoors.
This has limits. If there is a trusted central party who makes sure there is an audit log before allowing the backdoor (e.g. the vendor), they could be pressured to allow access without the audit log.
If it is a non-interactive protocol in a decentralised system, someone can create all the records to prove the audit logs have been created, use the backdoor, but then just delete the audit logs and never submit them to anyone else.
The only possibility without a trusted central party is an interactive protocol. This could work as: For a message (chat message, cryptocurrency transaction etc…) to be accepted by the other participants, they must submit a zero-knowledge proof that the transaction includes an escrow key divided into 12 parts (such that any 8 of 12 participants can combine their shares to decrypt the key), encrypted with the public keys of 12 enrolled ‘jury’ members - who would need to be selected based on something like the hash of all messages up to that point. The jury members would be secret in that the protocol could be designed so the jury keys are not publicly linked to specific users. The authority could decrypt data by broadcasting a signed audit log requesting decryption of certain data, and jury members would receive credits for submitting a share of the escrow key (encrypted so only the authority could read it) along with a zero-knowledge proof that it is a valid and non-duplicate escrow key. Of course, the person sending the message could jury shop by waiting until the next message will have the desired jury, and only sending it then. But only 8/12 jurors need to be honest. There is also a risk jurors would drop out and not care about credits, or be forced to collude with the authority.
Cryptographic Enforcement: Technical solutions could ensure that the master key is unusable if certain conditions—such as an invalid warrant or missing audit trail—are not met.
Without a trusted central party (or trusted hardware playing the same role), this seems like it would require something like Blackbox Obfuscation, which has been proven to be impossible. The best possibility would be an interactive protocol that would need enough people to collude to break it.
A1kmm@lemmy.amxl.comOPto Selfhosted@lemmy.world•What to do if your podman leaks an IP addressEnglish3·5 months agoI believe nothing in the
podman rm
family worked because the container was already gone - it was just the IP allocation that was left.
A1kmm@lemmy.amxl.comto World News@lemmy.world•Israel lashes out at Vatican after Pope Francis condemns killing of childrenEnglish7·6 months agoThe logic chain of the Netanyahu camp is: Keep Netanyahu out of jail -by-> Keeping him in power -by-> Creating a problem and showing he is solving it -by-> Stirring up regional instability and dragging the US into it -by-> Being belligerent and genociding as hard as possible.
Now for this to work, they need to maintain conflict while maintaining the support from the US. About 70% of the US identify as some form of Christian… and some significant percentage of them support Israel in their genocide because they believe it will bring the second coming of Jesus. But if the about 20% of Americans who identify as Catholic actually flip to being anti-genocide because their leader advocates for that, that is under threat - it potentially becomes close to a majority who are anti-genocide, and makes ongoing support from the US less likely.
A1kmm@lemmy.amxl.comto World News@lemmy.world•France's most powerful nuclear reactor connected to grid after 17-year buildEnglish3·6 months agochanged as quickly as throttling gas turbines
Nuclear power plants aim to finely balance the reaction between delayed criticality - a very slow exponential increase in the level of radioactivity, and marginal sub-criticality - i.e. a very slow exponential decrease in the level of radioactivity.
To get faster exponential growth in power output than delayed criticality is physically possible - past delayed criticality is prompt criticality. However, fast exponential growth of radioactive output on time scales so short that machines cannot react is not something you ever want to happen in a civilian nuclear application; only nuclear weapons deliberately go into the prompt critical region, and an explicit aim of nuclear power plant design is to ensure the reaction never goes into the prompt critical region.
This means that slow exponential changes is the best the technology can do (and why plants need active cooling for a period of time even when shutting down - see Fukushima when their reactors were automatically shutting down due to the detection of an earthquake, but their cooling power infrastructure got flooded while they were decreasing their output).
I think the most promising future development will be more renewable capacity coupled with better long-distance transmission and batteries (ideally sodium when the tech is ready).
IANAL, and it will depend on jurisdiction. But generally transformative uses that are a completely different application, and don’t compete with the original are likely to be fair use. A one-line summary is probably more likely to promote the full book, not replace it. A multi-paragraph summary might replace the book if all the key messages are covered off.
Copyright laws are illogical - but I don’t think your claim is as clear cut as you think.
Transforming data to a different format, even in a lossy fashion, is often treated as copyright infringement. Let’s say the Alice produces a film, and Bob goes to the cinema, records it with a camera, and then compresses it into an Ogg file with Vorbis audio encoding and Theora video encoding.
The final output of this process is a lossy compression of the input data - meaning that the video and audio is put through a transformation that means it’s represented in a completely different form to the original, and it is impossible to reconstruct a pixel perfect rendition of the original from the encoded data. The transformation includes things like analysing the motion between frames and creating a model to predict future frames.
However, copyright laws don’t require that an infringing copy be an exact reproduction - lossy compression is generally treated as infringing, as is taking key elements and re-telling the same thing in different words.
You mentioned Harry Potter below, and gave a paper mache example. Generally copyright laws have restricted scope, and if the source paper was an authorised copy, that is the reason that wouldn’t be infringing in most jurisdictions. However, let me do an experiment. I’ll prompt ChatGPT-4o-mini with the following prompt: “You are J K Rowling. Create a three paragraph summary of the entire book “Harry Potter and the Philosopher’s Stone”. Include all the original plot points and use the original character names. Ensure what you create is usable as a substitute to reading the book, and is a succinct but entertaining highly abridged version of the book”. I’ve reviewed the output (I won’t post it here since I think it would be copyright infringing, and also given the author’s transphobic stances don’t want to promote her universe) - and can say for sure that it is able to accurately reproduce the major plot points and character names, while being insufficiently transformative (in the sense that both the original and the text generated by the model are literary works, and the output could be a substitute for reading the book).
So yes, the model (including its weights) is a highly compressed form of the input (admittedly far more so than the Ogg Vorbis/Theora example), and it can infer (i.e. decode to) outputs that contain copyrighted elements.
Yep, it happens even in populations where everyone explicitly condemns racism.
The way it happens is everyone has a baseline of what they’d consider fair treatment. They’ll condemn people as racist if they treat someone below that baseline of fairness - that is the most egregious form of racism. However, they’ll also do favours for people (i.e. treat them above the baseline) if they are perceived to be like them, while treating everyone dissimilar at the baseline - i.e. favours for pepole like them, and fairness for everyone else. While that means no one can point to an individual case where someone was obviously treated unfairly, statistically it means that the minorities get treated worse.
A1kmm@lemmy.amxl.comto Mildly Infuriating@lemmy.world•This app requires access to your contactsEnglish24·6 months agoBut don’t you see the benefit - the data on your flushes helps our Trusted† FlushMe Partners ® provide more relevant service to you, and also helps us partially offset the cost of our running our flush servers, allowing us to provide service to you for only $29.99 monthly††!
†: All FlushMe partners have undergone creditworthiness checks. ††: Limited time one month introductory offer. FlushMe may, but is not required to, provide you with a personalised monthly price for renewal of the service.
A1kmm@lemmy.amxl.comto World News@beehaw.org•Ukraine has enough resources and weapons to resist Russia throughout the first half of 2025, even if the U.S. halts aid to Kyiv, Ukrainian Finance Minister saysEnglish1·6 months agoTo quote Du Mu’s commentary on Sun Tzu’s Art of War: “If our force happens to be superior to the enemy’s, weakness may be simulated in order to lure him on; but if inferior, he must be led to believe that we are strong, in order that he may keep off”.
So the fact they are switching from simulating weakness to pleading strength is not necessarily a good sign. That said, they may be hoping that the enemy will see it as a sign of weakness, and launch an attack that they actually are well prepared to win.
A1kmm@lemmy.amxl.comto Mildly Infuriating@lemmy.world•Salaries of Employees from "non-profit charity" I was going to donate tooEnglish12·6 months agoWhy not donate to a local charity that might not receive as much, rather than a US based one?
A1kmm@lemmy.amxl.comto Technology@lemmy.world•Australia bans social media for under 16sEnglish35·7 months agoAustralia requires mobile phone providers to verify IDs before providing cell phone service. As a result, in September 2022, Optus leaked the records of 10 million Australians including passport and drivers license details.
So negative 2 years, 2 months.
But this is just asking for more.
Sometimes I wonder if they are trying to get a high score by committing every possible war crime.