Wait till you hear about the idiots who unironically make that argument for banning Bitcoin too
Wait till you hear about the idiots who unironically make that argument for banning Bitcoin too
Lol that’s hilarious. I laugh so much at the crazy mixing of units we use here in the US. Similarly, it’s quite common to see metric and customary units in the same sentence, as in “add 1 tablespoon to 100 mL of water”.
This would not be the default behavior of yt-dlp. Run yt-dlp -vF <video>
to view the sort order used. Acodec should come before abr.
It used to be the behavior of the original youtube-dl, however.
Resampling does not lead to any perceptible quality loss, but encoding to aac with libavcodec’s encoder (as YouTube does) definitely will. At the very least, it cuts all frequencies above 15 kHz which are potentially audible. Opus does not, and 128k opus is usually considered transparent.
I can’t find it but somewhere there’s a very detailed explanation from Monty himself about it
Are you using the very latest version? YouTube changed their site again a few days ago and it broke yt-dlps ability to find all thr formats. Update yt-dlp and it should be back to normal. yt-dlp will prefer the opus when it is available by default.
Opus is much better than (YouTube’s) m4a. m4a is better than mp3 (which is an obsolete 30 year old format). YouTube doesn’t serve mp3 (so creating one means re-encoding), and re-encoding lossy formats always loses quality.
I’ve never had any issues getting mail delivered to major providers
Those are the wholesale prices to the utility company itself from the grid operators, not the prices to end users from the utility company. End users pay a flat amount per kWh that does not change by demand.
yt-dlp is pretty much the standard program for it https://github.com/yt-dlp/yt-dlp
It is installable as a python module, so it should be easy to sandbox if you need to (though it requires ffmpeg too). Nowadays I almost view it as a standard unix utility though and wouldn’t think twice about installing the native package
EWG is a well known pseudoscience peddler, even going as far as anti-vaxx claims https://en.wikipedia.org/wiki/Environmental_Working_Group
Before trying the conversion, I suggest checking if you are missing a library that strawberry needs (probably libopus or libopusfile). For me, strawberry reads opus files perfectly normally, so I wonder if yours is falling back to using ffmpeg or something to decide them
If you really must convert, use Vorbis with the variable bitrate mode -q6
(or -q:a 6
option in ffmpeg) which usually ends up around 192 kbps, or push it up one more to q7 which will be a little higher. This is the level that is usually transparent, but do keep in mind that any conversion between lossy codecs is much more likely to cause perceivable loss in quality than a conversion from a lossless source. Btw opus is the direct successor to Vorbis and is superior in quality per bitrate (128k is what YouTube uses and is indistinguishable the vast majority of the time). It’s probably better than 320k mp3 at least
Your Lemmy instance is censoring it
It’s unfortunate that the other users are ignoring your actual question… You should still be able to bind qbittorrent to the wireguard interface, and you definitely MUST do so in order to make sure you’re safe (if the VPN drops, you don’t want it to fall back on your normal connection). If you aren’t sure what the wireguard interface is names, try running ip a
before and after activating the VPN connection and compare them.
Port forwarding allows other users to connect directly to your torrent client. Without it, it’s much more difficult for you to connect to other people who aren’t port forwarded (though not impossible if there’s a third, mutually connected client who can facilitate initiating the connection). Things will generally still work without it, but youll connect to fewer people, so it might be slower. And if you’re downloading rare torrents, you might have to be patient and wait for someone else to join and facilitate the connection
Also, if you happen to be learning Japanese, Chinese, or Korean, check out https://github.com/themoeway/yomitan
Facebook may be evil but I don’t think they’re anywhere near “inject malware into global supply chains to push adoption of a public engineering side project that they don’t directly profit from and most executives don’t care about” level of evil. Is it possible? Sure anything is possible, but that is wildly beyond many many more plausible explanations and there’s zero evidence leading us down this path. And why would they go through the trouble of backdooring zstd, which has a highly observed codebase, when they just successfully backdoored lzma because it didn’t have a lot of maintainers?
While it’s true that zstd is commonly favored for having “good” compression at blazingly fast speeds, which is useful on the web and on servers, Zstd 's max compression setting (zstd --long -19
) is actually within about 5% of LZMA’s but faster, so it replaces most use cases of LZMA except when that extra 5% (and that’s not even constant; some inputs are even better on zstd) really does matter at all speed cost
The first 3 seem incredibly far-fetched.
I think it’s likey that, of all the mainstream compression formats, lzma was the least audited (after all, it was being maintained by one overworked person). Zstd has lots of eyes on it from Google and Facebook, all of the most talented experts in the world on data compression contributing to it, and lots of contributors. Zlib has lots of forks and overall probably more attention than lzma. Bz2 is rarely used anymore. So that leaves lzma
Are they attempting to listen on the same port, so one of them is failing to? Try setting a different port number for the two
It was the point of software as a service and DRM
I just manually block IPs that seem to be engaging in denial of service activity (sucking 3x the size of the torrent and still reporting 0% progress) and I’ve banned a few /16s too like those belonging to PoneyTelecom
Perfect example of a (part of a) security vulnerability being fixed in a commit that doesn’t immediately seem security related and would never be back ported to a
stablestale distro