Especially if you - like Microsoft - consider “Unicode” to mean UTF-16 (or UCS-2) with a BOM.
Just another Swedish programming sysadmin person.
Coffee is always the answer.
And beware my spaghet.
Especially if you - like Microsoft - consider “Unicode” to mean UTF-16 (or UCS-2) with a BOM.
Do you have WebP support disabled in your browser?
(Wasn’t aware my pict-rs was set to transcode to it, going to have to fix that)
This won’t really affect the development of ZLUDA much in particular, since the main developer happens to live in The Netherlands, and clean-room reverse engineering - especially for interoperability purposes - is fully protected by law in the EU.
But NVIDIA does really like to make it as much of a pain as possible to support CUDA software anywhere but for a single user on their personal consumer-grade desktop.
I feel like this could go really well together with Piet.
Just imagine; an album consisting of a bunch of Velato programs with Piet code as the artwork.
Version requirements? No rules!
He won’t be allowed to perform at Eurovision with the Windows 95 name/trademark/logo, so it would be hilarious if he switches to a name like Linuxman during it.
Here’s a .jxl
JPEG-XL upload I did on Lemmy three days ago;
https://lemmy.ananace.dev/pictrs/image/ad4e745e-0135-4cc3-889c-052600828d82.jxl
The built-in Firefox support is only activated for unstable builds, so you can’t enable it on stable unless you manually enable it during compile-time.
Why is it .jpg
and not .jxl
? That’s the registered extension for JPEG-XL.
If you’re taking part in transmitting a torrent over Yggdrasil, then people you’ve peered with in the swarm will definitely see your Yggdrasil IP - which is based off of the encryption key you generate (and you can change whenever you wish) for the connection to the mesh.
Regarding obfuscation of what you’re accessing inside something like the bittorrent DHT, that could likely be done with multiple Yggdrasil connections and torrent clients - so each address only associates with one torrent, it’s just not a core feature of the network itself.
The Yggdrasil network really isn’t meant to provide perfect internal anonymity between two directly communicating peers, it’s instead built to be an easy-to-use, end-to-end encrypted, mesh network - with great performance.
It’s there to protect the content and target of your communications from anyone beside you and said target, without adversely affecting the delivery of said content. Not to protect you from your communication target, though it can do a passable job at that too.
My main use of Yggdrasil has actually been as an easily setup alternative route into NATed systems, seeing as I can easily hit 600Mbit and get below 15ms of latency over it, which I quite often use to run VNC or SSH (and SCP/rsync) over. And since the mesh can be established as long as you can reach a node, it becomes ridiculously easy to get a functional link over it.
Transmitting DC++ traffic without my ISP being able to detect any of that is just a bonus.
I should note that I’m not relying on Yggdrasil for anonymity inside the network, rather more for anonymity towards observations from outside the network. And also mostly anonymity towards what I’m communicating when observed from outside the network.
Been doing some DC++ over Yggdrasil with good success
To me it sounds a lot like “We don’t really want to answer that question, so here’s a bit of technobabble to ease your mind.”
I mean, writing your own linked list in C and then summing its values could be considered as having “a proprietary data model that calculates”, but it has basically nothing to do with the question on how they track such things, just hints that they’re not using an existing - and proven - tracking method.
To clarify; they took the question “How are you tracking installs” to mean “With your tracking data, how are you counting installs”, and then basically answered “We add the numbers together”
This is a complete non-answer, and it seems to suggest that their actual tracking method is likely unreliable.
I love their response to (paraphrasing) “Are you going to do another Darth Vader and alter the deal on us in the future?” - “Oh yes, potentially every year.”
Personally using Dex, it’s about as lightweight as you can get, it can be configured with a single configuration file on disk, and it runs entirely stateless as well.
It only deals with authentication delegation though, unlike larger systems like Keycloak.
Both the rendezvous/mailbox and transport servers are available under an MIT license, though not every client makes it easy to use your own rendezvous.
I personally use the rymdport GUI client and the rust CLI.