“Every person who isn’t a murderer is just a murder away from becoming a murderer. Timebomb!”
Never thought about it that way, welp, might as well get it over with.
“Every person who isn’t a murderer is just a murder away from becoming a murderer. Timebomb!”
Never thought about it that way, welp, might as well get it over with.
A refurbished tiny/mini/micro PC will use more power in terms of sheer numbers, but the cost is still so small on them that it’s really not worth considering for most.
I mean, you’re in the right place then my friend, because you’re not going to subscribe to much of anything that has an international presence.
It kinda sucks when you’re in one of the ‘high price’ countries, but there’s lot of countries who wouldn’t have it at all if they had to pay our prices.
Seconding the request to share your work.
That is an amazing idea you’ve come up with that I never considered, but now I need it.
I can back this up with experience.
I’m actively running two piholes for years now. About 2/3rds of my traffic does go to the primary and some seem to ‘lock on’ to using just one, but most devices will swap between the two at their leisure.
People have tested them long term at this point. Outside of a few rare exceptions, there’s not a noticeable difference in reliability between shucked drives and ‘normal’ drives. They’re the same stock but just rebranded and have to be cheaper because they’re marketed primarily for retail as opposed to enthusiast/enterprise who are willing to pay more.
I could blame a lot of things here, but it’s just obviously been far too long since I’ve done basic math. I appreciate you fact checking me.
deleted by creator
Having maintained Linux systems for over a decade, I instantly distrust anyone who claims they understand Linux regardless of what they say next.
I feel like the primary aim is to create a minimalist art piece first and a functional device as an afterthought. If you stop thinking of it as a phone, and think of it purely as an attempt at creating a status symbol, it all kind of makes sense.
Source was included in OPs post, not sure of the reasoning behind putting it through the wayback machine, but to each their own. https://apnews.com/article/entertainment-elections-education-school-boards-teaching-059f2465829ab009394469b95c8cc94a There’s a few more links within the article with other details.
The spreadsheet linked in the post is a bit weird but also has a lot of other interesting supporting details.
Probably some kind of horrific bomb.
It looks like the big technological leap in relation to ‘How can we use superconductors to hurt things’ is to use them in making advanced EMP devices. It doesn’t seem like anyone has figured out any other obvious use cases for them that massively change or improve upon the other horrific devices that we’ve already come up with.
In regards to potential for use in war crimes, it could be a lot worse.
Just an option, there are a lot of places out there that will sell you a ‘refurbished’ phone with 1-3 year warranty. eBay even has an integrated program for it, I think they call it ‘certified refurbished’.
Super useful, it’s very similar to how magnet links for torrenting works. I know of a few less popular file sharing services that can act and search for files based on hash alone.
A lot of other areas online make use of hashes as identifiers already too. If you search for a hash of a file you’ve downloaded, just the hash and nothing else, there’s a very good chance you’ll get multiple results.
This is kind of problematic… By creating a community driven hashlist that is freely shared, you’ve also kind of created an index of CSAM content that could easily be extrapolated for people actively looking to find/share that content.
Maybe not an eli5, but lots of reasons.
There’s no stable, consistently updating client that everyone agrees on, the real ‘emule’ client hasn’t been updated in over a decade. Once you get past that hurdle, the setup is also a lot more cumbersome than other file sharing options. The network also has kind of a bad reputation because there’s not a great way to see if you can trust a file until you’re finished downloading it and people definitely do take advantage of that.