that point in working with the codebase that you inherited that you run into their "xml" format again that isn't, and you comment on the not-even-close-to-validity as "we don't need no validation let the [expletive] burn, burn [expletive] burn"

ok I will start making the minimal requirements list for a browser engine soon, but right now I have to migrate a primary nameserver so I really should concentrate on that.

And not, you know.

sing along to 'th3 futar3 crü' by Kite and Tracker on Ronny's stream oh crap he just transisioned to flat erik yeah this is hard

TIL "having your entire infrastructure, code base, project plans, and financials leaked to the public is called 'an abundance of caution'"

i.e.

Out of an abundance of caution, we have reset all stream keys.

@g the above code is for tic-80. It is not GOOD code, but it was fun. So, basically: "try some stuff out, it's pretty easy to pick up, and you don't really need to worry about all sorts of goofy frameworks etc."

(I didn't post this to the other thing because it's more related to here, and, well, it'll be on livecode.demozoo.org anyway, or will it, hmm, I better ask gasman.)

Show thread

Code for the thing I did in tic80 for the bytejam, related; not exemplary code (because I coded it live, ok, some parts I'd done before and redid, like the HT logo)

If you wanna see this on the stream then it's still up right now at um,,, where is it I forget...

ok here
www. twitch.tv/lovebytedemoparty

anyway this executes in tic80, tic80.com , everything after the =cut= should go into a file 'something.tic' and then you run it from there.

=cut=

m=math
ms=m.sin
mc=m.cos
mf=m.floor
pi=m.pi
xc=240/2
yc=136/2

dots = {
{3,1},{6,1},
{4,2},{5,2},
{1,4},{8,4},
{2,5},{7,5},
{4,7},{5,7},
{3,8},{6,8}
}

lines={
{3,1},{3,3},
{3,3},{4,3},
{4,2},{4,7},
{5,2},{5,7},
{5,3},{6,3},
{6,3},{6,1},
{1,4},{8,4},
{2,5},{7,5},
{3,8},{3,6},
{3,6},{4,6},
{5,6},{6,6},
{6,6},{6,8}
}

hofs=(2*pi)/12

function hackface()
circ(xc,yc,12,4)
circb(xc,yc,8,0)
rect(xc-8,yc-8,20,8,4)
circ(xc-4,yc-3,2,0)
line(xc-8,yc-8,xc+12,yc-4,0)
elli(xc+4,yc-4,4,3,0)

end

-- let's learn to spell
function mkhex(r)
hext={}
for i=1,6 do
ang=(2*pi)/6 * i
x=(mc(ang+hofs)*r)
y=(ms(ang+hofs)*r)
xy={x,y}
hext[i]=xy
end
return hext
end

function dhex(xo,yo,r,c)
hex=mkhex(r)
x2=hex[6][1]+xo
y2=hex[6][2]+yo
for i=1,6 do
x1=hex[i][1]+xo
y1=hex[i][2]+yo
line(x1,y1,x2,y2,c)
x2=x1
y2=y1
end
end

function fkc(b)
for x=2,240,2 do
for y=2,136,2 do
c=pix(x,y)
cc=pix(x-b,y)
ccc=pix(x,y-b)
ts=ms(t)
tc=mc(t)
c1=c+ts
c2=c+tc
pix(x+ts,y+tc,c1)
pix(x,y,c2)
pix(x-1,y-1,ccc)
pix(x,y,cc)

end
end
end

off=25
scl=10

function gr(tr)
for x1 = 1,240,8 do
for y1 = 1,136,8 do
circ (x1+4+tq,y1+4+tq,3,x1*y1>>2)
circb (x1+3,y1+3,3,3)
p = ms(x1*y1)
circb(x1+tq,y1+tq,3,p)
end
end
end

function ht(xo,r)
xr = ms(r)*50
yr = mc(r)*50
for i=1,24,2 do
x1=lines[i][1]*scl+off+xo
y1=lines[i][2]*scl+off
x2=lines[i+1][1]*scl+off+xo
y2=lines[i+1][2]*scl+off
x1r=x1+xr
y1r=y1+yr
x2r=x2+xr
y2r=y2+yr
-- freaking editor missing
-- emacs keys
line(x1,y1,x1r,y1r,8)
line(x1r,y1r,x2r,y2r,2)
line(x1,y1,x2,y2,6)
x1=x2
y1=y2
end

for i=1,12 do
x=dots[i][1]*scl+off+xo
y=dots[i][2]*scl+off
circ(x,y,scl/2,5)
circb(x,y,scl/2,6)
end
end

-- dammit I just want to have
-- this reset ever so often and
-- I forgot how to do that with
-- binary operators

-- I should mention at this point when typing this here that A> the livestream didn't keep the smaller font and
-- B> coding live on stream with other people who know what they are doing when you don't know math
-- because of a US public school education introduces trauma

chk = 0

function TIC()t=time()//32
chk=chk+1
tq=mf(t/16)
if (chk==100) then
gr(tq)
chk=0
end

fkc(1)

for i=15,75,5 do
dhex(xc,yc,i,i/5)
end

ht(-10,t/100)
ht(110,t/100)

-- if (m.abs(chk/8)==chk/8 ) then
-- fkc(3)
-- end

yo=ms(t/102)*25
print('HACK THE PLANET',30,100+yo,4,false,2,false)

hackface()

end

the above was amended as I added the face after the posting

ok I actually put the hackers face in it, so there's a new version, I'll amend the other post.

A mac mini (2009) that had been given to me decided that it was going to be a pain in the ass and not boot today, after moving it from one location to another, so I have dismantled it (mainly to see if I could fix the issue, but also because if I could not, it will make a nice single board computer case.

For the record, this is the model of EUFI machine that has the 32 bit eufi but 64 bit internals, with no support for USB, basically. You CAN hack it, I have done so, but it requires a working CD/DVD, and... well, that decided to stop working also.

So yes, basically: "yup, this is a nice case."

Also the internals are altogether too tightly set together for anyone with human eyeballs, let alone people who's eyeballs have seen shit.

@logout

What do you need in terms of Amiga programming? I will provide.

Pissed. The. FSCK. Off. (reading about schooling) 

Understand: I'm thinking of this as basically we've already BEEN attacked, and we're already LOSING this battle, and it's time to f*n dig in and f*n RIOT.

But to do that, we don't just get a bunch of gas cans and molotovs and start throwing, we build a system that will survive the first, second, fiftieth, thousandth, and 8 billionth attack.
(Then we deal with day 2.)

Also: as an older white guy with burnout, I'm probably going to get a whole heap of shit from all sides because "we can't trust white folks" and "look at this guy who's not white enough trying to remove our white superiority platforms, let's get 'im" and I'm totally not healthy enough to handle that YET. But this window may have already shut more than 90% of the way and FUCK THAT SHIT.

Show thread

Pissed. The. FSCK. Off. (reading about schooling) 

ok

FUCK THIS SHIT

We need to start making online schools that have classes for people (read: kids and others who want to learn) that do NOT require f*n google, f*n apple, f*n amazon, f*n facepalm, f*n microsoft, f*n zoom, f*n ... jfc people what the actual fsck

So. Yeah. First thing: It has to have classes taught by people who want to teach, which will be hard. Because these folks want to teach, they don't neccesarily want to deal with computer bullshit.

Second thing: the infrastructure has to be able to withstand attacks:

  • societal (badmouthing, attempts to punish the students, basic social media BS)
  • litigious (attempts to undermine via law, political BS)
  • 'bad actor' - your standard run of the mill, and then more focused network attacks

LIKELY we need additional attack surface mitigation.

Third: we need methods that provide this for people. And that when these are used, they are ACCEPTED by governments/employers/etc.

ok I'm putting these links here for me to look at later, when I check this again:

https:// web.archive.org/web/2008041916 3232/ www. mactel-linux.org:80/wiki/Apple TV
https:// wiki.awkwardtv.org/wiki/Linux_ on_Apple_TV

one thing I don't get:
First connect your AppleTV HD to your IDE->USB adapter, then open a terminal. Issue the following command in the terminal:

I am FAIRLY sure I have no idea how to get into that thing to get the HD out, or I'd have done it already. But let's see.

Yeah... this model has no HD (: www. ifixit.com/Teardown/Apple+TV+2 nd+Generation+Teardown/3625

That said: this will get me into it IF I can get serial on it somehow. I'll look at that "someday."

... and seas0npass.org/ which I'll probably just mess with to get my own crap on it after I make some thingates.

Show thread

I have searched, but I did not find anything horribly useful - but perhaps someone else has some terms or some info that may lead to something...

Does anyone know of ANYTHING useful which can be done with an 3rd edition Apple TV? (Black plastic thing, yes, ok, apparently 3rd edition, NO, not a later one, YES, I am sure. US model, probably from NYC Apple store, purchased like the first day by a friend who was there for the announcement etc.)

I am absolutely NOT interested in using it with anything Apple. I am interested in replacing it's stuff with something else. I mean, it's a device with a chip, it should be possible to run your own code on it... but then, it is Apple.

I do not wish to throw it away, but I'm FAIRLY sure it's going to be completely useless and I have 87 thousand other projects.

This does not mean I am ok with putting it in the garbage.

A friend asked what my new diswasher's name was.

I said "ooh, good question..."
"I shall name it Donald Trump, because then I can wash out it's mouth with soap every time it opens it's mouth"

ow (ouch) also ow 

also

ow

also

the 'fun' part is over now I just have to deal with the ow

also

I have spent altogether too much time in my bathroom and that will continue for a while

medical "fun" 

I am not remembering to drink the 1 liter of colon excavating liquid each hour that I have to drink tonight before the colonoscopy tommorrow

MOSTLY I'm just dreading the result of this, not the colonoscopy. I want to know why I'm having the issues I am, and be sure all is ok.

sudden work thing and fun doctor updates 

since I'm working now, and the network is being very up/down while I'm doing this work (which... you know. is fun.)

I'm doing the Eyeshadow 2600 FM thing on repeat (:

eyeshadow2600fm.bandcamp.com/a

Show thread

sudden work thing and fun doctor updates 

well, I made it to day 18 of this month before work had to call me with an emergency no one else can really fix quickly.

but I also got confirmation I'll basically be able to go the next month without having to go back, and then the small task which is probably 1 or 2 weeks, then the rest of my time.

I'm almost done rearranging the apartment to be somewhere I can live, not just work.

And the new big work chair is very nice. But my back is not used to it yet.
And for some reason my right eye doesn't ... I probably need to get that looked into. It's been ... it's having issues seeing the left monitor (of the 3) well. Dunno why. I get it checked.

Works psychologist tommorrow, colonoscopy monday. Getting things fixed up.

looking thru the mail server logs and seeing spam messages come in for a fellow who died 2 years ago that have the ransombitcoin thing 'I watched you on your exploited webcam' ... Uh Huh.

so ... I just read Elementary's thinga bout E6 and "everything is in flatpaks" and I'm going

"So... just inject the payload into a flatpak and you basically are all set..."

Look I've done containers and virtualization too long to think someone's magically going to get abstraction to work in a secure way that isn't going to be thwarted by the user's expectations...

Show older
hackers.town

A bunch of technomancers in the fediverse. Keep it fairly clean please. This arcology is for all who wash up upon it's digital shore.