Haven’t watched anything anime related for ages… Never watched initial d. But its possible the nationalist thing is accurate (also: what’s the deal of portrayals on the regular of Germans in their shows?). Regarding the whole over the top “violence” and other stuff, there is for sure a difference in cultures here. I find funny for instance on anime we have the mega villains and all that, but in contrast, if you leave a bike unattended in the middle of Tokyo there is a big chance you still see it next day. Of course there is the whole yakuza thing and scamming tourists, but I would argue criminality is just very different. As for why people lean into sometimes what we consider extreme content, maybe is just an exposure thing? When people are exposed to different realities they tend to be either more or less inclined to see depictions of it or complete opposites.
- 2 Posts
- 22 Comments
This is an interesting take. I’ve been to Japan as a tourist once, and I can tell it was probably one of my best trips I’ve ever made (the sheer amount of novelty and getting around the people was really cool), and I can attest the people were very nice to me. But I can also tell, if I was part of the work force, the sentiment would be different. I did never see signs against Chinese people anywhere BTW.
As for the “China bad” part. Check how people brigade on shitter to “cancel people out” (very definition of cancel culture) and you quickly see that some people LOVE the mob mentality. This is also what is going on people going after stuff such as dji for no reason (but I will say straight up, I am not sure if I would trust network equipment easily. Same for me actually applies to cisco as well)
ZeDoTelhado@lemmy.worldto Privacy@lemmy.ml•DeepSeek collects keystroke data and more, storing it in Chinese servers0·4 months agoNice catch. I’ll be sure after do run the real thing
ZeDoTelhado@lemmy.worldto Privacy@lemmy.ml•DeepSeek collects keystroke data and more, storing it in Chinese servers0·4 months agoThanks, managed to have it installed locally bia pocket pal (termux was giving me errors constantly on compile). Out of curiosity, I made a very “interesting” prompt, and frankly I am not even surprised
EDIT: decided to be a little spicier, didn’t fail to amuse me
ZeDoTelhado@lemmy.worldOPto Selfhosted@lemmy.world•How reliable/realistic is to use a laptop as a remote file backup server?English0·4 months agoMy plan is to go there at least once a year, so that would work for me
ZeDoTelhado@lemmy.worldOPto Selfhosted@lemmy.world•How reliable/realistic is to use a laptop as a remote file backup server?English0·4 months agoThat is true, however there are 2 things
- battery of this machine is toast (holds up for half an hour or less)
- as someone mentioned in another comment: unattended laptops with batteries can be actually bad. Batteries on certain cases can leak and cause fires, so for me, if it can work without it great, otherwise I have to drop the idea
ZeDoTelhado@lemmy.worldOPto Selfhosted@lemmy.world•How reliable/realistic is to use a laptop as a remote file backup server?English0·4 months agoI actually have contingencies for this. There is a ups around that I can use. It is good advice for sure, specifically for countries with fluctuations on the electric grid
ZeDoTelhado@lemmy.worldOPto Selfhosted@lemmy.world•How reliable/realistic is to use a laptop as a remote file backup server?English0·4 months agoI am planning after installing Ubuntu server and get some setup done, to actually sit it out and understand how much the fan is going and how I expect this to be an issue. Since my backups are probably going to be once in a week or so, I do not expect the laptop to have a lot of work (for now is just for file backup, no other services in there except tailscale)
ZeDoTelhado@lemmy.worldOPto Selfhosted@lemmy.world•How reliable/realistic is to use a laptop as a remote file backup server?English0·4 months agoAt a later stage I will have to design a strategy to access and make sure is OK. Probably I am going to stick to tail scale and make sure no matter what both tailscale and ssh always start. Sure there can be issues but if minimal services can be guaranteed then it should mostly ok
ZeDoTelhado@lemmy.worldOPto Selfhosted@lemmy.world•How reliable/realistic is to use a laptop as a remote file backup server?English0·4 months agoYou are not wrong with the vps. Although I am quite worried that my data stays with me no matter what. Not that I have state secrets or anything, but my stuff is my stuff. And to avoid issues with encryption and such, your own device most of the times is king
ZeDoTelhado@lemmy.worldOPto Selfhosted@lemmy.world•How reliable/realistic is to use a laptop as a remote file backup server?English0·4 months agoFor sure not :D. I will be installing something such as ubuntu server, so I do not expect this issue (I don’t remember if the laptop has power saving via bios, but need to check)
ZeDoTelhado@lemmy.worldOPto Selfhosted@lemmy.world•How reliable/realistic is to use a laptop as a remote file backup server?English0·4 months agoThanks for the pointer. Indeed I should probably see first the homelab communities as well
ZeDoTelhado@lemmy.worldOPto Selfhosted@lemmy.world•How reliable/realistic is to use a laptop as a remote file backup server?English0·4 months agoThis is a good point actually. I will need to check the laptop can run without battery at all (back in the day I remember this was possible, nowadays I am not sure)
ZeDoTelhado@lemmy.worldto Privacy@lemmy.ml•KeePassXC: Convenience of single passwords file and security of having multiple protected databases possible?0·4 months agoSo what you want to do, effectively, is to have different security requirements for different accounts. Correct? And all in the same file.
For now I just want to get a few things out of the way:
- with this strategy, what are you protecting against?
- how likely is this to happen?
- what is your contingency plan?
I believe its good to have different levels of security for different things, but you also have to understand at what cost you need it.
I can propose a different thing altogether: for the very important passwords, like banks and such, use the pepper method. This means, you have on your password manager part of your password, and a small portion is something you know. Example: generate a 25 chars password, and have at the beginning or end, more 5 chars that you know (can be letters and numbers, and can be something you remember every day, like the first letters of your address plus house number).
With this approach, there are a couple of benefits:
- you can still have computacionaly heavy passwords
- if an attacker gets a hold of your open vault and try to login, it will fail since the password is effectively not complete
Biggest downside I see is remembering the pepper always. And make sure is not written anywhere. And of course, yo can always argue it is possible at some point to get the correct password with the base password known. But at this point, thus should give you enough time to change it and thwart the attack. Remember: there is no perfect security solution, only sufficiently good ones that can be usable and effective.
ZeDoTelhado@lemmy.worldto Privacy@lemmy.ml•Asking online stores to stop sending receipts via email.0·4 months agoOne of the problems I personally see is the reliance on a standard that was done since the dawn of the internet and got stitches all these years.
Emails as a service is useful, and has several properties that make sense to exist. However, it is simply not easy nor intuitive to have encryption on it (and even then, there are limitations).
What we would need on the long run is simply replace email with a common standard that actually encrypts in transit (at very least) with auto negotiated keys on exchange.
But we would need to change the mind of a lot of people to make that a priority… (For better or worse, it is the market that states the incentives and priorities. And it is abundantly clear security is not on the top list)
ZeDoTelhado@lemmy.worldto Privacy@lemmy.ml•I-XRAY a tool that transforms Meta's Ray-Ban smart glasses into Orwell's 19840·6 months agoThat is for sure a good question, although I would say it would present limitations.
Let’s put it this way: Id photos are very standard. Front facing, until the neck, white lights, white background. Now lets say everyone’s photo got leaked (or used) and the only source of photos for a certain photo is the Id one only. I didn’t study the matching algorithms, but I will say that variation for a certain subject under different circumstances increase the matching possibilities. If by any chance you try to match someone live and the only source would be id photos, my guess is it would present a big error rate. Possibility could be fine tuned, not sure up to how much.
Now lets consider what we have today. For a single person, I will bet there are on average more than 15 photos of themselves somewhere available (for those chronically attached to stuff such as IG of fb) and a lot of the times tagged as well (and manually as well, there was a time on fb this was a big thing). With this amount of comparison points, I would say the matching for sure works a lot better
ZeDoTelhado@lemmy.worldto Privacy@lemmy.ml•I-XRAY a tool that transforms Meta's Ray-Ban smart glasses into Orwell's 19840·6 months agoThere is a detail that makes it possible: the absurd over sharing everywhere. If only everyone did not think to plaster everywhere their face with their selfies and decide to share everything everywhere, then maybe something like this would be a lot harder to implement (if possible on certain cases)
Quite frankly, considering the daily routine of a lot of people, this is probably the best thing to do. REST! Nobody will do it for you
so, “fun sized” Saddam Husseins exists?
My signal app tries to update itself. Installed from obtanium. It is a very irritating process, the thing tries to update, there is sometimes weird response times from clicking it (you click the notification and simply do not know if something is happening) and then without notice the thing restarts and then usually it works. But sometimes, the update notification still comes back. Because of that, I just update via obtanium