• Activity
  • Votes
  • Comments
  • New
  • All activity
    1. Windows Controlled Folder Access

      I recently enabled controlled folder access in Windows 10. It restricts programs from modifying folders in a blacklist. I have all of the music/pictures/videos/documents/desktop folders and...

      I recently enabled controlled folder access in Windows 10. It restricts programs from modifying folders in a blacklist.

      I have all of the music/pictures/videos/documents/desktop folders and folders containing backups added, is there anything else I should consider adding?

      7 votes
    2. I made a post awhile back about asking for inspiration for a new project. I built a thing.

      hey all! i made a post awhile back talking about how i was in a tech rut, and tired of creating the same things over and over again, working with the same libraries and the same frameworks. i was...

      hey all!

      i made a post awhile back talking about how i was in a tech rut, and tired of creating the same things over and over again, working with the same libraries and the same frameworks.

      i was bored of it!

      so last week i said hell with it and i spent more money than i should've on udemy courses, learned a lot about javascript and the mern stack (mongodb, express.js, react, node.js)

      then, after a few nights of staying up way later than i should have (i have presently been awake for 27 hours) i built this thing:

      https://dry-castle-80238.herokuapp.com/dashboard

      dev-connector.

      a small little social media site for the technically-minded.

      nothing groundbreaking or super fancy - just a basic social media site with posts, comments, user profiles and all that. but it's the first thing in awhile that i've actually finished and put into production on some capacity (even if it's just heroku)

      jump in, leave a few comments, and let me know what you think. :)

      passwords are hashed with bcryptjs, but i've been recommending everyone just use fake login info on sign up for safety's sake.

      12 votes
    3. What does big data look like when cross-referenced?

      Google knows a lot about its users. Facebook knows a lot about its users. FitBit knows a lot about its users. And so on. But what happens when these companies all sell their data sets to one...

      Google knows a lot about its users. Facebook knows a lot about its users. FitBit knows a lot about its users. And so on.

      But what happens when these companies all sell their data sets to one another? It'd be pretty trivial to link even anonymized users from set to set by looking for specific features. If I went for a run, Google tracked my location, FitBit tracked my heart rate, and Facebook tracked my status about my new best mile time, for example. Thus, Google can narrow down who I am in the other sets using pre-existing information that coincides with theirs. With enough overlap they can figure out exactly who I am fairly easily. Furthermore, each additional layer of data makes this discovery process from new data sets even easier, as it gives more opportunities to confirm or rule out concurrent info. So then when, say, Credit Karma, Comcast, and Amazon's data enter the fray, my online identity stops looking like an individual egg in each different basket but a whole lot of eggs in all in one. And they can do this across millions/billions of users--not just me!

      I don't know for certain that this is a thing that happens, but... I have to assume it definitely is happening, right? How could it not? With how valuable data is and how loose protections are, this seems like a logical and potentially very lucrative step.

      Right now, is there an aggregate version of "me" that exists in a data store somewhere that is a more comprehensive and accurate picture than my own self-image? After all, my memory and perception are imperfect and biased, but data stores aren't.

      6 votes
    4. Siri, Alexa, Google - Who's using and having good experiences with voice commands?

      Hi there, Big companies are spending big money on allowing consumers to control everything from their TV, smart speakers, lights, microwaves, etc with voice commands. But do people really want...

      Hi there,

      Big companies are spending big money on allowing consumers to control everything from their TV, smart speakers, lights, microwaves, etc with voice commands. But do people really want that?

      I'm curious because I very much do NOT want to interact with computers vocally. I find it's slow and prone to error, not unlike writing out long passages on a smartphone. It functions, but it's not a great experience and remains a novelty for me.

      Bought both kids Echo Dots which is a smart speaker with Amazon's Alexa assistant. It's cool, really innovative. But after a couple weeks both remain unplugged in my kids' rooms - totally lost interest. The only person who I've seen really use a voice speaker is an elderly gentlemen for whom it was the easiest way to interact with a computer (using it specifically to play music and get news).

      My friend swears that teens commonly use Siri on their phones to look up information. I can only think of one person I've seen actively use the voice controls and that was an older woman who wanted show her friends how Siri could "rap."

      So I was curious how many of you find yourself frequently interacting with computers via voice commands. I personally feel very awkward and self-aware and get easily frustrated because it reminds me so much of the terrible automated attendants on 800 numbers.

      Edit: You all are confirming my suspicions. Anyone under age 25 use the voice commands often? I feel like this is all just the first step in designing AI interfacing

      28 votes
    5. Does a trustworthy VPN provide privacy? If so, how do you know if a VPN is trustworthy?

      It's hard to get a straight answer on this because there are allegations of shilling everywhere when it comes to VPNs (particularly when you discuss specific providers). There's also this post...

      It's hard to get a straight answer on this because there are allegations of shilling everywhere when it comes to VPNs (particularly when you discuss specific providers). There's also this post which gets linked pretty frequently and which seems to throw a wrench in the whole idea.

      For context, I ask because I have two main concerns:

      1. I have been the subject of a mild internet stalking/doxing, and I have no wish to relive that experience.
      2. I live in the United States and, if I am understanding things correctly, my ISP now has the right to sell my browsing data without my consent.

      I have no love for my ISP and am all about the idea of blocking them from gathering data about me, but it seems the only other option is to hand all of my data over to another company who simply promises not to do anything with it. While I'm sure some of them are legitimate, how can you tell the difference between a genuine privacy tool and a honeypot?

      23 votes
    6. How do you store your bookmarks?

      I'm curious what Tildes uses to organize and store their web bookmarks. Do you rely on your browser, or do you trust some proprietary service like Pocket? Maybe you have a self-hosted solution?

      13 votes