roadkill's recent activity
-
Comment on What is the best modern-ish OS to install on older computers? (Parameters within) in ~comp
-
Comment on Daniel Penny jury deadlocked on manslaughter charge in subway chokehold case in ~news
roadkill One thing to keep in mind is that people still make noises and sometimes go into involuntary spasms/become reactive to sensations even when passed out. Yes, eyes open and all. I haven't watched...One thing to keep in mind is that people still make noises and sometimes go into involuntary spasms/become reactive to sensations even when passed out. Yes, eyes open and all.
I haven't watched the video and not sure if I would be able to. (The whole concept of 'WatchPeopleDie' and its related subs just churns my stomach.) The reports said that he was being continuously choked for 5 to 6 minutes along with bystanders saying to let go.
Suppose he was fully conscious after 3 minutes. With assistance of bystanders, clearly visible in the photograph of the article linked here, it wouldn't have been difficult to put him in a crucifix or roll him over and hold with an armbar or wristlock. Why keep an arm around the neck for that long? There are ways to safely retain someone, especially with other people helping. Any type of choke is not one of those ways.
5 minutes with an arm tightly wrapped around the neck is irresponsible as fuck.
-
Comment on Daniel Penny jury deadlocked on manslaughter charge in subway chokehold case in ~news
roadkill I practice jiu jitsu. Anyone who has ever deal with any level chokes performed on someone else, to themselves in a combat sport knows it doesn't take long for someone to pass out. Even a novice...He should have recognized when Neely went out quicker -- he went out at about 2:28:33 and got let go at 2:29:21, so about 50 seconds. Also, better training would have probably meant a safer pin rather than hanging on his neck the entire time.
I practice jiu jitsu.
Anyone who has ever deal with any level chokes performed on someone else, to themselves in a combat sport knows it doesn't take long for someone to pass out.
Even a novice white belt can make a non-resisting partner pass out within 10 seconds. And no, for those wondering, it doesn't have to be perfectly dialed in for it to work. Mostly symmetrical compression on the sides of the neck is all it takes.
During a one on one training class, I made a black belt pass out in 4 seconds. To me it was obvious when he became dead weight. So the difference between a sloppy choke by an amateur and a precisely dialed in choke under the coaching of a master is mere seconds. Granted, without resistance.
To someone who is resisting, once you have an arm around their neck, it usually never takes longer than 30 seconds to knock someone out with a rear naked choke. I'm ready to tap within 10-15 seconds on a sloppy one I have hooks under. Penny had people helping him hold the guy down.
After a minute of cutting off blood circulation to the brain, you're already risking issues.
5 minutes is fucking murder.
-
Comment on How decentralized is Bluesky really? in ~comp
roadkill As opposed to the multiple weak links run by individuals AND corporations that caused other federated/decentralized services to succumb to the same enshittification cycle that came before? Let's...And the fact that it is a single weak link run by a corporation is also why it will succumb to the same enshittification cycle that comes to all corporate social media platforms.
As opposed to the multiple weak links run by individuals AND corporations that caused other federated/decentralized services to succumb to the same enshittification cycle that came before?
Let's not pretend that something's protocol and the way it is structured as a service still isn't affected by the people behind it all running said service.
I'd argue decentralization poses MORE risks to data and how it is used as by its very nature, all of your data has to be duplicated multiple times over by each and every service that has access to it. It only takes one to not honor deletion requests. (Which has happened on multiple Lemmy instances where they refused to delete my account.)
There has also been multiple Mastodon and Lemmy services that all had to be Fediblocked due to bad actors or disappeared without a trace after people dug into who was behind the instances... a company like BlueSky is going to be a lot more careful about burning its reputation let it ends up becoming another X or Threads in a lot shorter amount of time before it can even pull off any further substantial funding rounds.
So far, it's been hard to complain about how Bluesky is handling things. Right now it's not much more than an extremely self-selecting and curated twitter clone, but that's all it has to be to be an improvement over Xitter itself. That can always change and users will bail when it does. That's the circle of social media life.
Honestly. We should just go back to self hosted blogs and webrings. Finding a related site always seemed to be more impactful when you knew you were just a few degrees away from personally knowing the person involved in it.
-
Comment on Forced to upgrade [from iPhone 8] in ~tech
roadkill I see you completely forgot about JailBreakMe.com... People were going into iOS stores loading up the website and jailbreaking iOS devices right there on the spot. The point is, anything you do to...I see you completely forgot about JailBreakMe.com... People were going into iOS stores loading up the website and jailbreaking iOS devices right there on the spot.
The point is, anything you do to jailbreak can also be done by a malicious application to jailbreak. Intention is the only difference.
-
Comment on Forced to upgrade [from iPhone 8] in ~tech
roadkill If you are able to root/jailbreak the device, a malicious app or website is able to exploit the device. Did you already forget about the PNG exploits that allowed for drive-by attacks that...If you are able to root/jailbreak the device, a malicious app or website is able to exploit the device.
Did you already forget about the PNG exploits that allowed for drive-by attacks that affected iOS?
I run custom software on my device. I'm well aware of the risks which is why I'm asking you not to minimize the risks involved with jailbreaking a device.
-
Comment on Starlink Direct to Cell in ~tech
roadkill It's still a warning to stay away even if you minimize it by saying "other people do it, too." Yes, other billionaires are also corrupt. Why continue to tolerate Musk if it's bad enough to call it...It's still a warning to stay away even if you minimize it by saying "other people do it, too." Yes, other billionaires are also corrupt. Why continue to tolerate Musk if it's bad enough to call it out?
-
Comment on Forced to upgrade [from iPhone 8] in ~tech
roadkill The problem is that the hammer that is used to drive a nail is also the hammer that can be used to smash a window in to break into a house. When you jailbreak for your own means, you leave your...The problem is that the hammer that is used to drive a nail is also the hammer that can be used to smash a window in to break into a house.
When you jailbreak for your own means, you leave your device open to exploits in the wild as you are using exploits to jailbreak your phone. It's effectively bolting open a security flaw for others to use against you.
-
Comment on Forced to upgrade [from iPhone 8] in ~tech
roadkill Some Dumbphones are actually cut-down Android devices and can have apps sideloaded. While this defeats the purpose of having a not-Smartphone, the lack of touchscreen will either help or hinder...Some Dumbphones are actually cut-down Android devices and can have apps sideloaded. While this defeats the purpose of having a not-Smartphone, the lack of touchscreen will either help or hinder your ability to maintain using it while only having those exceptionally rare necessary apps like 2FA for your bank account. The Kyocera Cadence, for example, had a Snapdragon 210 in it with 1GB of ram.
-
darken (developer of SD Maid for Android) has had his developer account terminated after twelve years for "stalkerware policy" on Google Play despite having no actual stalking tools in the app
14 votes -
Western Digital refused to answer our questions about its self-wiping SanDisk SSDs. Oh, and it’s also getting sued.
53 votes -
SanDisk’s silence deafens as high-profile users say Extreme SSDs still broken. SanDisk is ignoring lost data claims. It's time to ignore the company's SSDs.
71 votes
You're extremely limited on Linux options as backports likely won't even go back far enough to cover a 386 or Pentium CPU.
I had an AMD K6-2/350 that I attempted to install a modern distro on and all 32 bit distros failed due to the lack of CMOV instructions. I found one Debian Squeeze backport which allowed me to be able to install it and have working SSL certificates that allowed the machine to get online.
Honestly, it'll be more trouble than it's worth to attempt to get either system online if that's on your list of things planned for either system.
32 bit CPUs are largely abandoned due to the lack of instruction sets modern (within the last 20 years) kernels require... and that 386 is 16bit.
This is before you consider other issues... such as specs to even boot an OS. Amount of ram, for example. Whether or not the video card in either system even still has drivers in the kernel, as well.
They're period pieces, at best.