1. 1

    My wife and I have noticed this. She lists over the pockets that are just smattered all over my cargos. Even my regular pants generally have pockets. Many of her pants and skirts have stitched up pockets or stitching to look like pockets. What the heck!

    1. 2

      The ‘stitched up’ pockets might be referred to as ‘fake pockets’ elsewhere in this thread.

      There are some sewed-shut pockets that can be cut open and made functional without damaging the garment, but I’ve only observed this in men’s formal wear.

    1. 1

      Something I don’t understand is that this isn’t how capitalism is supposed to work. If there exist enough women who are willing to pay for pants with larger pockets then they’ll be made, won’t they?

      I’ve also heard many of my female friends complain about their tiny pockets, maybe I’m in a bubble and most women don’t mind? Maybe my friends keep trying pants with larger pockets and not buying then because they don’t look stylish enough? Maybe there’s a global conspiracy? I’m having a hard time deciding which of these options is most likely to be true.

      1. 7

        It’s probably a disconnect between what people complain about and what they buy. I heard fake pockets make pants look slimmer so when a designer adds large pockets they sell less of that design even though thats what people say they want.

        1. 1

          Presumably the women in question care more about looking good than carrying things.

          The women I know who have different priorities wear different clothes–as do the men I know.

          1. 2

            Then thats just the market working as normal. There will be no shift to more useful clothing if people don’t buy that even if they complain to others after buying it.

            1. 2

              I speculate that people who care about the appearance (rather than functionality) of clothes buy more clothes.

              If that effect exists, how strong is it? Do 10% of people buy 90% of clothes?

              I heard it is like that for booze: 10% buy 90%. And it ain’t top shelf…

        2. 2

          I found this article really interesting since I had no idea the problem existed. I think maybe the suppliers dont either. The stuff they make that’s slimmer or lighter in pockets sells the most. When Im in Walmart or Target, the heavier stuff isn’t what people are trying on. They might have noticed this eventually modifying supply practices to sell attributes majority were buying.

          Another thing thing comes to mind is that each piece of clothing has multiple attributes. Women probably buy something that looks and feels nice despite smaller pockets they don’t like. However, a simplistic analysis of purchasing data might count those sales as a yes to all three. They mighy think small pockets are in demand even though they didnt matter. Then, start putting them on more clothing.

          In any case, there’s certainly an unserved need in the market. Smaller suppliers with a proven design/style should consider making a version of each with bigger pockets. A big uptick in sales of those might cause larger suppliers to follow suit.

        1. 4

          A much better example, IMO, are these Markov generated Tumbler posts, trained with Puppet documentation and a collection of H.P. Lovecraft stories.

          1. 3

            “The whippoorwills were piping wildly, and in a form capable of modifying the local system.”

            1. 5

              Poetic.

              And this one looks like one of those quotes that become historical, but almost no one that uses it knows what it means:

              “Any reasonable number of resources can be specified in a way I can never hope to depict.”

            2. 2

              I like King James Programming. Example: Exercise 3.63 addresses why we want a local variable rather than a simple map as in the days of Herod the king

              1. 3

                hath it not been for the singular taste of old Unix, “new Unix” would not exist.

                Truth.

            1. 1

              Mr. Wellons posted an update:

              About one week after publishing this article I found an even better hash function. I believe this is the least biased 32-bit integer hash function *of this form* ever devised. It’s even less biased than the MurmurHash3 finalizer.

              …and…

              If you’re willing to use an additional round of multiply-xorshift, this next function actually reaches the theoretical bias limit (bias = ~0.021) as exhibited by a perfect integer hash function

              …I think he’s a bot. /s :)

              1. 3

                I upvoted it even though I fully remember the lessons that I’ve learned from alynpost, friendlysock, et al… Something like “just because I like it doesn’t mean that it is healthy for lobste.rs”.

                We crustaceans are part of the intended audience of this content and it is not meant to be healthy for our communities, any more than the cessation of cobalt mining would be…

                I don’t want to discuss it here. Egads, I like some of you, let’s not ruin that. ;)

                To wit: I think we should all watch this an mull over it privately. Don’t downvote it away, please.

                1. 4

                  I feel like the OP would have avoided the downvotes if they didn’t try to derail the comments with an off-topic appeal for a politics tag.

                1. 2

                  Moving, while my whole family is sick. WTF isn’t there a provision in my lease that will give me a few extra days if we’re all ill? And for that matter, why don’t I get paid sick days? This whole thing is dumb.

                  Hey, you asked! :)

                  1. 1

                    FYI, this ended up being hell. Worse than expected. Expensive, embarrassing, etc. That there were no episodes of literal incontinence was a highlight.

                  1. 2

                    The punchline is that the AES key is just MD5(password || IV[:8]).

                    Would somebody please tell me if password is the phrase that you enter at the Enter passphrase (empty for no passphrase): prompt during an invocation of ssh-keygen?

                    Would somebody describe how the article should change to take into account empty passphrases?

                    1. 3

                      That is the pass phrase entered at the prompt. If it’s empty, the key is not encrypted.

                    1. 5

                      The amount of pearl-clutching in this Twitter thread is barely short of astounding. People have some quaint assumptions about how software services collect and use usage data that originates inside the platform. What service wouldn’t want to measure how people use it? What company Spotify’s size got there without measuring things?

                      1. 6

                        Spotify’s discovery weekly playlist, trending charts, song/album-based radio, daily genre-based playlists, “popular in this location” charts, artist suggestions, playlist auto-extend - all of these would not be possible without data collection. And these are actually things I use and help me find music from around the world I wouldn’t otherwise. The main thing is that there be enforcement inside Spotify that none of the employees are peeking at the data of a particular user. We need regular inspections and certifications for this sort of a thing. I’m fine with anonymized data analysis. (And de-anonymization falls under “not being able to access the data of a particular user”.)

                        1. 4

                          You must be a creator! Please don’t disdain the consumers’ responses. Just… observe. This is important.

                          To my eye, a good outcome of these GDPR Data Extracts will be that consumers/users demand control of their devices!

                          I’ve been trying to tell people for years what it means, what actually happens, when they use ‘free’ services every waking moment. They use them casually, and excitedly, and while in mourning, and on that day they fell in love.

                          Spotify knows when you’re drunk. (Well, they might, if they figured out how to extract that.)

                          Google knows when you’re aroused (Well, they might, if they figured out how to extract that)–and if you use their communication services, or Android, they might even put two and two together and figure out if you have a crush on any specific person in your contacts list…

                          Don’t get me started on politics!

                          I remember, about exactly twenty years ago, I got in the habit of running tcpdump constantly, and through that I identified which programs would talk on the network. In those days, my system didn’t generate a constant stream of traffic when it was idle, so it was easy. I was offended to see some apps “phone home” when there was clearly no benefit to me, the user. Since I had full control of my PC in 1998, I could block it, intercept it, delete the app, hexedit the app, whatever I liked.

                          You know what I mean? It’s one thing for Spotify to tell their app to tell your phone to send all that data. It’s a whole different thing that your phone DID it and does not offer you an audit mechanism!

                          1. 2

                            On the other hand some consumers give their data knowing that it’s an exchange for features they want.

                            Many people like FB’s targeted ads!

                        1. 3

                          This data is pretty ‘high resolution’.

                          Did anybody determine if it contains scroll events with timestamps?

                          What is that kind of data called? The kind of data Facebook and Google have… They get a constant stream of scroll events, mouse movement events, etc, so they can tell when your attention lingers over certain images or themes, even if you don’t ‘click’ or ‘tap’ anything in response.

                          Let’s call that attention data, for now… I want to see what kind of attention data Google and/or Facebook have on me, even if–especially if!–they collected it while I was on third party sites.

                          1. 2
                            • trying to take up piano again, i have been off and on all year, but making an effort to do like an hour daily. Played as a child. A little lost on picking it back up again (start with theory, just start playing pieces ) … I was not an advanced player but did a few years as a child had Fur Elise memorized at one point … etc.
                            • train more daily in martial arts – active practitioner for decades.
                            • bday party for friend!
                            • excited about upcoming Diablo nuclear power plant tour in August 2018 I just got reservations for!
                              1. 1

                                Yup! … but the tour is not for another 2 weeks or so … I went there on a tour as a child, and my buddy who is going on the tour there, was an employee when the plant was being built 27 years ago …

                            1. 2

                              @hl, are you the author of this?

                              I would love to see this expand to include the following and more:

                              • a list of ISPs that are proven to NOT have NPORTOUT25.
                              • a script that will scan users’ current network connection for known violations and optionally auto-submit them to VT.
                              • a new violation for clothing manufactures that make false pockets, and a separate violation for too-small pockets. (These are really common in women’s clothing.)

                              Would you say that U-Haul truck rentals violate MPRICE? Oh, it seems somebody thinks so.

                              I know it is a wiki, but I want to discuss before I go making changes that might violate the spirit of your project. :)

                              1. 1

                                no

                              1. 8

                                a.out binaries are smaller than elf binaries, so let’s statically link everything into one big executable ala busybox.

                                Similarly, a modular kernel with all its modules takes up more total space than a single kernel with everything built in. So don’t even bother implementing modules. Linux 1.2 was the last great Linux before they ruined everything with modules.

                                64-bit code takes up more space than 32-bit, so let’s build for 32-bit instruction sets. Who has more than 4GB of addressable memory anyway?

                                Optimized code usually takes up more space, often a lot more when inlining is enabled. Let’s build everything with -Os so we can fit more binaries on our floppies.

                                Icons are really superfluous anyway, but maybe we’ll want X11R5 or some other GUI on a second floppy. (I’d say X11R6 but all those extensions take up too much space). Make sure to use an 8-bit storage format with a common palette – 24-bit or 32-bit formats are wasteful.

                                (I lament the bloated nature of the modern OS as much as the next Oregon Trail Generation hacker, but really – is “fits on a 1.7MB floppy really the right metric? Surely we can at least afford to buy 2.88MB drives now?)

                                1. 5

                                  64-bit code takes up more space than 32-bit, so let’s build for 32-bit instruction sets. Who has more than 4GB of addressable memory anyway?

                                  Most programs don’t need more than 4GB of addressable memory, and those that do, know it. Knuth flamed about this some, but while you can use X32 to get the big registers and little memory, it’s not very popular because people don’t care much about making fast things.

                                  I lament the bloated nature of the modern OS as much as the next Oregon Trail Generation hacker, but really – is “fits on a 1.7MB floppy really the right metric? Surely we can at least afford to buy 2.88MB drives now?

                                  No, but smaller is better. If you can fit inside L1, you’ll find around 1000x speed increase simply because you’re not waiting for memory (or with clever programming: you can stream it).

                                  There was a time when people did gui workstations in 128kb. How fast would that be today?

                                  1. 2

                                    Most programs don’t need more than 4GB of addressable memory, and those that do, know it.

                                    All the integer overflows with values under 64-bits suggests otherwise. I know most programmers aren’t doing checks on every operation either. I prefer 64-bit partly to cut down on them. Ideally, I’d have an automated tool to convert programs to use it by default where performance or whatever allowed.

                                    “No, but smaller is better. If you can fit inside L1, you’ll find around 1000x speed increase simply because you’re not waiting for memory”

                                    Dave Long and I agreed on 32-64KB in a bootstrapping discussion for that very reason. Making that the maximum on apps kept them in the fastest cache even on lots of older hardware. Another was targeting initial loaders to tiny, cheap ROM (esp to save space for updates). Those were only memory metrics we could find that really mattered in general case. The rest were highly situation-specific.

                                    1. 1

                                      Most programs don’t need more than 4GB of addressable memory, and those that do, know it.

                                      All the integer overflows with values under 64-bits suggests otherwise.

                                      How?

                                      I know most programmers aren’t doing checks on every operation either. I prefer 64-bit partly to cut down on them. Ideally, I’d have an automated tool to convert programs to use it by default where performance or whatever allowed.

                                      What does that mean?

                                      1. 0

                                        My point isn’t about the addressable memory: it’s about even being able to represent a number. Programs are usually designed with assumption that the arithmetic they do will work like real-world arithmetic on integers. In machine arithmetic, incrementing a number past a certain value will lead to an overflow. That can cause apps to misbehave. Another variation is a number coming from storage with many bits goes to one with fewer bits which caller didn’t know had fewer bits. That caused the Ariane 5 explosion.

                                        Overflows happen more often with 8-16-bit fields since their range is so small. They can happen to 32-bit values in long running systems or those with math pushing numbers up fast. They either won’t happen or will take a lot longer with 64-bit values. I doubt most programmers are looking for overflows throughout their 32-bit applications. So, I’d rather just default on 64-bit for a bit of extra, safety margin. That’s all I was saying.

                                  2. 1

                                    Linux 1.2 was the last great Linux before they ruined everything with modules.

                                    https://twitter.com/1990sLinuxUser :P

                                    1. 2

                                      Why has systemd deprecated support for /usr on a different filesystem!!

                                      That issue bit me last month! I moved my /usr because it was too large, and the damned system couldn’t even boot into an init=/bin/sh shell! It dropped me into an initrd shell. I had to boot off a live CD to fix it. (If the initrd shell should have been sufficient, pardon me. I tried, but lvm wasn’t working.)

                                  1. 2

                                    Google, hardware operations. I only put in six months, it was a temp thing. A FTE position did become available while I was there, but the other temp got it. “Regrets, I have a few.” Still, it was pretty damned cool. I don’t know what things are like on the software side, but HWOps at that time and place had something in common with those Sun stories.

                                    1. 6

                                      Yeah, I know someone who runs a keyserver and they are getting absolutely sick of responding to the GDPR troll emails.

                                      Love the idea to use activitypub (the same technology involved in mastadon) for keyservers. That’s really smart!

                                      1. 16

                                        Offtopic: Excuse me.

                                        I think it depends on some conditions, so not everybody is going to see this every time. But when I click on medium links I tend to get this huge dialog box come up over the entire page saying some thing about registering or something. It’s really annoying. I wish we could host articles somewhere that doesn’t do this.

                                        My opinion is that links should be links to some content. Not links to some kind of annoyware that I have to click past to get to the real article.

                                        1. 11

                                          Use the cached link for Medium articles. It doesn’t have the popup. Just the content.

                                          1. 1

                                            Could you give an example? That sounds like a pleasant improvement, but i don’t know exactly what you mean by a cached link.

                                            1. 3

                                              There is a’ cached’ link under each article title on lobste.rs

                                              1. 1

                                                Thanks.

                                          2. 7

                                            I started running uMatrix and added rules to block all 1st party JS by default. It does take a while to white list things, yes, but it’s amazing when you start to see how many sites use Javascript for stupid shit. Imgur requires Javascript to view images! So do all Square Space sites (it’s for those fancy hover-over zoom boxes).

                                            As a nice side effect, I rarely ever get paywall modals. If the article doesn’t show, I typically plug it into archive.is rather than enable javascript when I shouldn’t have to.

                                            1. 2

                                              I do this as well, but with Medium it’s a choice between blocking the pop-up and getting to see the article images.

                                              1. 6

                                                I think if you check the ‘spoof noscript>l tags’ option in umatrix then you’ll be able to see the images.

                                                1. 1

                                                  Nice trick, thanks!

                                            2. 6

                                              How timely! Someone at the office just shared this with me today: http://makemediumreadable.com

                                              1. 4

                                                From what I can see, the popup is just a begging bowl, there’s actually no paywall or regwall involved.

                                                I just click the little X in the top right corner of the popup.

                                                But I do think that anyone who likes to blog more than a couple of times a year should just get a domain, a VPS and some blog software. It helps decentralization.

                                                1. 1

                                                  And I find that I can’t scroll down.

                                                  1. 3

                                                    I use the kill sticky bookmarklet to dismiss overlays such as the one on medium.com. And yes, then I have to refresh the page to get the scroll to work again.

                                                    On other paywall sites when I can’t scroll, (perhaps because I removed some paywall overlay to get at the content below,) I’m able to restore scrolling by finding the overflow-x CSS property and altering or removing it. …Though, that didn’t work for me just now on medium.com.

                                                    1. 1

                                                      Actually, it’s the overflow: hidden; CSS that I remove to get pages to scroll after removing some sticky div!

                                                2. 3

                                                  What is the keyserver’s privacy policy?

                                                  1. 5

                                                    I run an SKS keyserver, have some patches in the codebase, wrote the operations documents in the wiki, etc.

                                                    Each keyserver is run by volunteers, peering with each other to exchange keys. The design was based around “protection against government attempts to censor keys”, dating from the first crypto wars. They’re immutable append-only logs, and the design approach is probably about dead. Each keyserver operator has their own policies.

                                                    I am a US citizen, living in the USA, with a keyserver hosted in the USA. My server’s privacy statement is at https://sks.spodhuis.org/#privacy but that does not cover anyone else running keyservers. [update: I’ve taken my keyserver down, copy/paste of former privacy policy at: https://gist.github.com/philpennock/0635864d34a323aa366b0c30c7360972 ]

                                                    You don’t know who is running keyservers. It’s “highly likely” that at least one nation has some acronym agency running one, at some kind of arms-length distance: it’s an easy and cheap way to get metadata about who wants to communicate privately with whom, where you get the logs because folks choose to send traffic to you as a service operator. I went into a little more depth on this over at http://www.openwall.com/lists/oss-security/2017/12/10/1

                                                    1. 5

                                                      Thanks for this info.

                                                      Fundamentally, GDPR is about giving the right to individuals to censor content related to themselves.

                                                      A system set out to thwart any censorship will fall afoul of GDPR, based on this interpretation

                                                      However, people who use a keyserver are presumably A-OK with associating their info with an append-only immutable system. Sadly , GDPR doesn’t really take this use case into account (I think, I am not a lawyer).

                                                      I think what’s important to note about GDPR is that there’s an authority in each EU country that’s responsible for handling complaints. Someone might try to troll keyserver sites by attempting to remove their info, but they will have to make their case to this authority. Hopefully this authority will read the rules of the keyserver and decide that the complainant has no real case based on the stated goals of the keyserver site… or they’ll take this as a golden opportunity to kneecap (part of) secure communications.

                                                      I still think GDPR in general is a good idea - it treats personal info as toxic waste that has to be handled carefully, not as a valuable commodity to be sold to the highest bidder. Unfortunately it will cause damage in edge cases, like this.

                                                      1. 3

                                                        gerikson you make really good points there about the GDPR.

                                                        Consenting people are not the focus of this entirely though , its about current and potential abuse of the servers and people who have not consented to their information being posted and there being no way for removal.

                                                        The Supervisory Authority’s wont ignore that, this is why the key servers need to change to prevent further abuse and their extinction.

                                                        They also wont consider this case, just like the recent ICANN case where they want it to be a requirement to store your information publicly with your domain which was rejected outright. The keyservers are not necessary to the functioning of the keys you upload, and a big part of the GDPR is processing only as long as necessary.

                                                        Someone recently made a point about the below term non-repudiation.
                                                        Non-repudiation this means in digital security

                                                        A service that provides proof of the integrity and origin of data.
                                                        An authentication that can be asserted to be genuine with high assurance.
                                                        

                                                        KeyServers don’t do this!, you can have the same email address as anyone else, and even the maintainers and creator of the sks keyservers state this as well and recommend you check through other means to see if keys are what they appear to be, such as telephone or in person.

                                                        I also don’t think this is an edge case i think its a wake up call to rethink the design of the software and catch up with the rest of the world and quickly.

                                                        Lastly i don’t approve of trolling, if your doing it just for the sake of doing it “DON’T”, if you genuinely feel the need to submit a “right to erasure” due to not consenting to having your data published, please do it.

                                                      2. 2

                                                        Thank you for the link: http://www.openwall.com/lists/oss-security/2017/12/10/1, its a fantastic read and makes some really good points.

                                                        Its easy for anyone to get hold of recent dumps from the sks servers, i have just hunted through a recent dump of 5 million + keys yesterday looking for interesting data. Will be writing an article soon about it.

                                                    2. 3

                                                      i totally agree, it has been bothering me as well, i am in the middle of considering starting up my own self hosted blog. I also don’t like mediums method of charging for access to peoples stories without giving them anything.

                                                      1. 3

                                                        I’m thinking of setting up a blog platform, like Medium, but totally free of bullshit for both the readers and the writers. Though the authors pay a small fee to host their blog (it’s a personal website/blog engine, as opposed to Medium which is much more public and community-like).

                                                        If that could be something that interests you, let me know and I’ll let you know :)

                                                        1. 2

                                                          lmao you don’t even get paid when someone has to pay for your article?

                                                          1. 1

                                                            correction, turns out you can get paid if you sign up for their partner program, but i think it requires approval n shit.

                                                          2. 2

                                                            hey @pushcx, is there a feature where we can prune a comment branch and graft it on to another branch? asking for a friend. Certainly not a high priority feature.

                                                            1. 3

                                                              No, but it’s on my list of potential features to consider when Lobsters gets several times the comments it does now. For now the ‘off-topic’ votes do OK at prompting people to start new top-level threads, but I feel like I’m seeing a slow increase in threads where promoting a branch to a top-level comment would be useful enough to justify the disruption.

                                                        1. 10

                                                          Russ Cox wrote:

                                                          At Bell Labs, Rob switched acme and sam from black and white to color in the development version of Plan 9, called Brazil, in the late fall of 1997. I used Brazil on my laptop as my day-to-day work environment, but I was not a developer. I remember writing Rob an email saying how much I enjoyed having color but that it would be nice to have options to set the color scheme. He wrote a polite but firm response back explaining his position. He had worked with a graphic designer to choose a visually pleasing color palette. He said he believed strongly that it was important for the author of a system to get details like this right instead of defaulting on that responsibility by making every user make the choice instead. He said that if the users revolted he’d find a new set of colors, but that options wouldn’t happen.

                                                          It was really a marvelous email, polite yet firm and a crystal clear explanation of his philosophy. Over the years I have from time to time spent hours trying to find a copy of that email. It is lost.

                                                          1. 16

                                                            This is a good example of having a fundamentalist position to the point of absurdity. The idea that there will be a correct colour scheme for a text editor is an amazing mix of arrogance and over-simplification.

                                                            1. 12

                                                              And ignores the fact that not everyone has “correct” vision and color perception.

                                                              1. 2

                                                                And not every display is created equal, either. Nor every physical environment. (I switch themes when I use my laptop outdoors, because my usual low-contrast theme is illegible there.)

                                                                1. 1

                                                                  That seems silly.

                                                                  I go outside sometimes too, but I adjust the contrast and colour temperature of the entire system, since I do more than edit text.

                                                                  1. 2

                                                                    Oh, that makes sense. When I take my old ThinkPad outside, I don’t have internet access, so, it’s highly unlikely that I will be doing anything other than editing text. :) In recent history, this has only happened when I’m a passenger on a long drive. There are a couple of toy C programs I putz around with to pass the time.

                                                              2. 2

                                                                The idea that there will be a correct colour scheme for a text editor is an amazing mix of arrogance

                                                                Why?

                                                                I have my own opinions on the matter, but it seems to me that optimising a colour scheme for a set of requirements (contrast, colour blindness, long exposure time, etc) is probably possible.

                                                                I think most people have a brand preference for a set of colours that is something else though.

                                                                and over-simplification.

                                                                The depth of the response may be lost to us, but surely it is irresponsible to assume it was done without thought given here is an accomplished programmers report that the response was in fact, quite thoughtful?

                                                                1. 2

                                                                  I have my own opinions on the matter, but it seems to me that optimising a colour scheme for a set of requirements (contrast, colour blindness, long exposure time, etc) is probably possible.

                                                                  There are many considerations that go into people’s selections of color schemes that intrinsically vary, including physical environments (e.g., home vs. office), time of day (e.g., daylight vs. evening light), and simple personal preference. To insist that there be no option to change the colors – on principle – is to tell everybody who might care about these considerations that they’re flat out wrong and that the author knows that before having talked with them. As if that’s not arrogant enough, it’s even more arrogant (and illogical) to further claim that even if one were wrong about the specific colors chosen, they’re still right about the broader point that there’s only one appropriate color scheme for an editor.

                                                                  The bit about author’s responsibility is a red herring. I, too, believe that it’s important for authors to choose an appropriate set of configuration parameters. I also believe there’s nothing wrong with users wanting different values.

                                                                  1. 1

                                                                    I think it supporting multiple physical environments (gamma/contrast) and time of day (temperature) doesn’t beg for multiple colour schemes: That’s just lazy engineering. This is obviously a job for the display manager or monitor setup.

                                                                    Being left with “simple personal preference” isn’t satisfying; People can have a “simple personal preference” about nearly everything, Flat earth, Metric system, Fish on Friday, and so on. Some editors support more preferences than others.

                                                                    In terms of something wrong with “users wanting different values”, one thing I particularly dislike about preferences is sitting down at another persons workstation and being unable to help them quickly (i.e. with minimal mental load on myself) because they have configured damn near everything that can be configured.

                                                                    1. 3

                                                                      I think it supporting multiple physical environments (gamma/contrast) and time of day (temperature) doesn’t beg for multiple colour schemes: That’s just lazy engineering. This is obviously a job for the display manager or monitor setup.

                                                                      I don’t think that’s obvious at all.

                                                                      Being left with “simple personal preference” isn’t satisfying; People can have a “simple personal preference” about nearly everything, Flat earth, Metric system, Fish on Friday, and so on.

                                                                      “Flat earth” is a scientific model, the purpose of which is to make predictions, and that model makes no useful predictions that aren’t made more accurately by other models. If you were building software that depended on a model of the earth, I think it would be fair to leave out a “flat earth” model because it’s objectively less useful. Meal choices are indeed a personal preference – and if you were building software for people to record their meals, I’d recommend against supporting only one possible food. Few people would find it reasonable to tell somebody what single food they must eat for all meals. Choice of unit system has properties of both; there are tradeoffs with different systems, and most software provides an option to switch between them.

                                                                      My main point is that to provide an option is to allow for the possibility that you might be wrong and enable users to adjust as they need to. To refuse the option (on principle) is to assert that anybody who wants it to work differently is wrong by construction.

                                                                      It seems like you’re taking the conjecture (that there is only one optimal color scheme) as an axiom and, faced with a data point like a person claiming to prefer a different color scheme, conclude that the person is irrational (akin to a flat earth believer). That seems backwards to me.

                                                                      In terms of something wrong with “users wanting different values”, one thing I particularly dislike about preferences is sitting down at another persons workstation and being unable to help them quickly (i.e. with minimal mental load on myself) because they have configured damn near everything that can be configured.

                                                                      I agree with how annoying this is, but I would not even consider to insist that people use no customizations for the tiny fraction of time I spend in their environments.

                                                                      1. 1

                                                                        It seems like you’re taking the conjecture (that there is only one optimal color scheme) as an axiom

                                                                        I’m humouring it, sure.

                                                                        Here’s a smart guy who has convinced another smart guy – the exact conversation lost, but the impression remained. I’m giving it the benefit of the doubt because that’s how we ourselves begin to be convinced of strange and unusual ideas.

                                                                        I’m still making my own opinion here:

                                                                        It seems possible to have a colour scheme optimised for certain things.

                                                                        It might not be possible to optimise for every thing, and it’s certainly not possible to optimise for everything once you’ve permitted “personal preference” to be one of those things; as an extreme example, people had personal preference not to sit next to black people on the bus – so I think it’s absolutely foolish to admit “personal preference” so quickly.

                                                                        most software provides an option to switch between them.

                                                                        Feature parity is often a useful goal, but I don’t see how it’s relevant. The feature either generally useful or specifically popular, and the argument is clearly about the former.

                                                                        That seems backwards to me.

                                                                        That’s why thinking about it is useful.

                                                                        I think you can start from either position: That choice is good or choice is bad. It’s almost certainly not that simplistic, but I see no good reason to start at the end you are starting from, and several easy reasons not to.

                                                                      2. 2

                                                                        Being left with “simple personal preference” isn’t satisfying;

                                                                        Their personal preference might be based on something like “I’m colorblind” or “I have a sensory integration disorder” or “I need a high-contrast theme because I have extremely poor vision.” Sometimes preferences are out of necessity.

                                                                        1. 1

                                                                          I don’t agree that those things are “simple personal preference”.

                                                                          I touched briefly on why, but reading back it might not be clear:

                                                                          Accessibility is actually probably something that can be optimised for – that is to say, a colour scheme can be optimised for colourblindness, contrast needs, integration disorders, and so on.

                                                                          However even if personal needs remain unaccommodated, I’m still not sure every application being written needs to reinvent the wheel to add this kind of configuration. Notwithstanding the risk/reward questions (e.g. how many people have these kinds of problems, really), it still seems like it would be smarter engineering to get your display manager/windowing environment to do it, not to mention more convenient for users.

                                                                          So: Still not convinced.

                                                              1. 5

                                                                Play Minecraft (and maybe some minetest) and Terraria with my five year old, fill up some more moving boxes, and try to get linux on my odd smartphone.

                                                                1. 2

                                                                  What Minetest mods do you play with?

                                                                  1. 1

                                                                    Dunno, let’s see:

                                                                    sebboh⬢truth:~$ ls -l ~/src/minetest/mods/
                                                                    total 0
                                                                    lrwxrwxrwx 1 sebboh sebboh 30 Dec 30  2017 adv_spawning -> /home/sebboh/src/adv_spawning/
                                                                    lrwxrwxrwx 1 sebboh sebboh 33 Dec 30  2017 animalmaterials -> /home/sebboh/src/animalmaterials/
                                                                    lrwxrwxrwx 1 sebboh sebboh 33 Dec 30  2017 animals_modpack -> /home/sebboh/src/animals_modpack/
                                                                    lrwxrwxrwx 1 sebboh sebboh 35 Dec 31  2017 loyall -> /home/sebboh/src/loyall-minetest-mod
                                                                    lrwxrwxrwx 1 sebboh sebboh 27 Dec 30  2017 mobf_core -> /home/sebboh/src/mobf_core/
                                                                    

                                                                    Wow, it’s been longer than I thought since I touched this. The loyall-minetest-mod is locally developed. It implements a “stereo” item that can be placed, which plays music. You can toggle the music on or off by ‘hitting’ the block.

                                                                    Doing this helped my son understand what a programmer does, I think. He immediately asked me to implement vehicles and other non-trivial things. :)

                                                                    Since I’m talking about it, I might as well publish it. Note, there’s nothing in here that wasn’t cribbed from other existent mods. Except for the stereo/record player artwork, which was derived from photos of actual equipment in a way that I believe is fair use. You’ll note that the stereo is actually two distinct blocks placed next to one another, one of which is inert… :) It’s really just a proof-of-concept.

                                                                  2. 2

                                                                    Hah, also have big plans for Terraria this weekend ;D

                                                                    1. 2

                                                                      So…we (my friend and me) have conquered almost all bosses ;D

                                                                      1. 1

                                                                        We had a set back this weekend… we lost our flying piggy bank due to a save error and/or cloud sync error. Steam on GNU is not really stable…

                                                                        1. 1

                                                                          oh :( do you play via standalone server? looks like it’s more stable

                                                                          1. 1

                                                                            I start Terraria on two computers with this invocation: steam steam://rungameid/105600, and then on one I select the Host & Play option, and I set the Steam Multiplayer option to ‘disabled’. Then on the other computer, I select Join by IP, and I provide a hostname (not FQDN, but it exists in /etc/hosts) and a port (the default).

                                                                            Hm, some games have ‘headless’ servers. Is that what you’re referring to? Is that an option?

                                                                            I do have the ‘save to cloud’ option selected for our players and worlds.

                                                                            I may be mis-remembering the specific strings used to identify each menu option, sorry.

                                                                            I think I caused the inventory items to be lost when I terminated a process. …Because it was just sitting there taking up CPU after we were done playing. My machines to literally nothing, not even update an on-screen clock when they are idle, so you can always tell when something is still running, because the fans become audible at all. So, I killed the Terraria and Steam processes…

                                                                            1. 2

                                                                              Hm, some games have ‘headless’ servers. Is that what you’re referring to? Is that an option?

                                                                              yep, I’m referring to headless server. See Dedicated server at the bottom of the page: https://terraria.org/

                                                                  1. 8

                                                                    I haven’t read the GPDR. According to this post, Article 17 requires a data deletion mechanism.

                                                                    Did anybody tell the various blockchains about that?

                                                                    1. 8

                                                                      The decentralized chains don’t really have a “controller” per se.

                                                                      ‘controller’ means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data

                                                                      1. 2

                                                                        Regarding the nature of the chains, of course.

                                                                        Regarding that insight, thank you!

                                                                        1. 3

                                                                          Wouldnt that just impose these rules on the block chain participants?

                                                                    1. 5

                                                                      I’m being pedantic on purpose: this malware doesn’t meet the definition of “computer virus”.

                                                                      The malware used stolen credentials to steal more credentials.

                                                                      This story is not over!

                                                                      1. 1

                                                                        From the postmortem:

                                                                        npm has revoked all access tokens issued before 2018-07-12 12:30 UTC. As a result, all access tokens compromised by this attack should no longer be usable.

                                                                        …It’s still not over! Because those tokens might have already been used to publish more malware… It’s wack-a-mole.

                                                                        Wow, they don’t even mention that aspect. They did consider it, they must have. Afraid to talk about it?

                                                                      1. 6

                                                                        Julia Evans does amazing simple illustrations of various technical topics. I advise you check out her graphical work.

                                                                        1. 4

                                                                          Julia Evans exists is some charmed intersection of neophyte (“there isn’t just one protocol used for VPNs”; “the IETF is the group that makes RFCs”) and expert (”I’m working on writing a kernel in Rust”).

                                                                          I say ‘charmed’ because her writing style causes me to enjoy and remember her lessons.

                                                                          1. 3

                                                                            Clicking the site domain in the submission will also show other submissions of her site’s content. There’s been a lot of them on Lobsters.

                                                                            1. 2

                                                                              This is terrific, I am new and didn’t know you could do this. Thanks!