Looking at the real & present danger presented by the Far Right, as Jonathan Freedland points out; the simple fact is: 'Labour will only win another term if the lived & felt experience of Britons gets better'...

Whatever, you think of Labour, and many on Mastodon are (at the very least) uncomfortable with things they have already done & not done since winning the election, there are worse things than the current Labour Govt.... and not just the Tories!

#politics

theguardian.com/commentisfree/…

Soon, the tech behind #ChatGPT may help drone operators decide which enemies to kill

#OpenAI and #Palmer Luckey's weapons company sign agreement to explore lethal drone defense for military use.

arstechnica.com/ai/2024/12/ope…

#Technology #War #KI #AI #Drones #Antireport

This entry was edited (8 months ago)
in reply to antirinfo

[Θεσ/νίκη] ΕΚΤΑΚΤΟ - ΣΥΓΚΕΝΤΡΩΣΗ ΣΤΑ ΔΙΚΑΣΤΗΡΙΑ ΣΑΒΒΑΤΟ 10.00

ΜΕΡΑ ΜΕ ΤΗ ΜΕΡΑ ΤΟ ΜΙΣΟΣ ΜΕΓΑΛΩΝΕΙ

Συγκέντρωση αλληλεγγύης στους πανω από 110 συλληφθέντες/εισες της σημερινής πρωτοφανούς επιχείρησης τρομοκράτησης και καταστολής απο τα τάγματα εφόδου της δημοκρατίας #antireport από ΑΠΟ

La solution au problème de ton existence n’est pas dans les pensées.

notesandsilence.com/2024/11/02…
#zen #silence #psychology #meditation #prayer

old.bitchute.com/video/CcgVddY…

#stats are #faked just like everything else

At Least 40% of SERIOUS ‘COVID VACCINE’ (adverse events) ‘REPORTS’ have been ‘ELIMINATED’

#vaccinescam

cranston reshared this.

Diffusion models are evolutionary algorithms, claims a team of researchers from Tufts, Harvard, and TU Wien.

"At least two processes in the biosphere have been recognized as capable of generalizing and driving novelty: evolution, a slow variational process adapting organisms across generations to their environment through natural selection; and learning, a faster transformational process allowing individuals to acquire knowledge and generalize from subjective experience during their lifetime. These processes are intensively studied in distinct domains within artificial intelligence. Relatively recent work has started drawing parallels between the seemingly unrelated processes of evolution and learning. We here argue that in particular diffusion models, where generative models trained to sample data points through incremental stochastic denoising, can be understood through evolutionary processes, inherently performing natural selection, mutation, and reproductive isolation."

"Both evolutionary processes and diffusion models rely on iterative refinements that combine directed updates with undirected perturbations: in evolution, random genetic mutations introduce diversity while natural selection guides populations toward greater fitness, and in diffusion models, random noise is progressively transformed into meaningful data through learned denoising steps that steer samples toward the target distribution. This parallel raises fundamental questions: Are the mechanisms underlying evolution and diffusion models fundamentally connected? Is this similarity merely an analogy, or does it reflect a deeper mathematical duality between biological evolution and generative modeling?"

"To answer these questions, we first examine evolution from the perspective of generative models. By considering populations of species in the biosphere, the variational evolution process can also be viewed as a transformation of distributions: the distributions of genotypes and phenotypes. Over evolutionary time scales, mutation and selection collectively alter the shape of these distributions. Similarly, many biologically inspired evolutionary algorithms can be understood in the same way: they optimize an objective function by maintaining and iteratively changing a large population's distribution. In fact, this concept is central to most generative models: the transformation of distributions. Variational Autoencoders (VAEs), Generative Adversarial Networks (GANs), and diffusion models are all trained to transform simple distributions, typically standard Gaussian distributions, into complex distributions, where the samples represent meaningful images, videos, or audio, etc."

"On the other hand, diffusion models can also be viewed from an evolutionary perspective. As a generative model, diffusion models transform Gaussian distributions in an iterative manner into complex, structured data-points that resemble the training data distribution. During the training phase, the data points are corrupted by adding noise, and the model is trained to predict this added noise to reverse the process. In the sampling phase, starting with Gaussiandistributed data points, the model iteratively denoises to incrementally refine the data point samples. By considering noise-free samples as the desired outcome, such a directed denoising can be interpreted as directed selection, with each step introducing slight noise, akin to mutations. Together, this resembles an evolutionary process, where evolution is formulated as a combination of deterministic dynamics and stochastic mutations within the framework of non-equilibrium thermodynamics. This aligns with recent ideas that interpret the genome as a latent space parameterization of a multi-scale generative morphogenetic process, rather than a direct blueprint of an organism. If one were to revert the time direction of an evolutionary process, the evolved population of potentially highly correlated high-fitness solutions will dissolve gradually, i.e., step by step and thus akin to the forward process in diffusion models, into the respectively chosen initial distribution, typically Gaussian noise."

The researchers proceed to present a mathematical representation of diffusion models. Then, "By substituting Equations 8 and 10 into Equation 5, we derive the Diffusion Evolution algorithm: an evolutionary optimization procedure based on iterative error correction akin to diffusion models but without relying on neural networks at all." They present pseudocode for an algorithm to demonstrate this.

Equations 1-3 are about the added noise, equations 4-5 are about reversing the process and using a neural network to estimate and remove the noise, equation 6 represents the process using Bayes' Theorem and introduces a representation using functions (f() and g()), and equations 7-9 are some plugging and chugging changing the representation of those equations to get the form where you can substitute back inte equation 5 as mentioned above.

"When inversely denoising, i.e., evolving from time T to 0, while increasing alpha-sub-t, the Gaussian term will initially have a high variance, allowing global exploration at first. As the evolution progresses, the variance decreases giving lower weight to distant populations, leads to local optimization (exploitation). This locality avoids global competition and thus allows the algorithm to maintain multiple solutions and balance exploration and exploitation. Hence, the denoising process of diffusion models can be understood in an evolutionary manner: x-hat-0 represents an estimated high fitness parameter target. In contrast, x-sub-t can be considered as diffused from high-fitness points. The first two parts in the Equation 5, ..., guide the individuals towards high fitness targets in small steps. The last part of Equation 5, sigma-sub-t-w, is an integral part of diffusion models, perturbing the parameters in our approach similarly to random mutations."

Obviously, consult the paper if you want the mathematical details.

"We conduct two sets of experiments to study Diffusion Evolution in terms of diversity and solving complex reinforcement learning tasks. Moreover, we utilize techniques from the diffusion models literature to improve Diffusion Evolution. In the first experiment, we adopt an accelerated sampling method to significantly reduce the number of iterations. In the second experiment, we propose Latent Space Diffusion Evolution, inspired by latent space diffusion models, allowing us to deploy our approach to complex problems with high-dimensional parameter spaces through exploring a lower-dimensional latent space."

"Our method consistently finds more diverse solutions without sacrificing fitness performance. While CMA-ES shows higher entropy on the Ackley and Rastrigin functions, it finds significantly lower fitness solutions compared to Diffusion Evolution, suggesting it is distracted by multiple solutions rather than finding diverse ones.

"We apply the Diffusion Evolution method to reinforcement learning tasks to train neural networks for controlling the cart-pole system. This system has a cart with a hinged pole, and the objective is to keep the pole vertical as long as possible by moving the cart sideways while not exceeding a certain range."

"Deploying our original Diffusion Evolution method to this problem results in poor performance and lack of diversity. To address this issue, we propose Latent Space Diffusion Evolution: inspired by the latent space diffusion model, we map individual parameters into a lower-dimensional latent space in which we perform the Diffusion Evolution Algorithm. However, this approach requires a decoder and a new fitness function f-prime for z, which can be challenging to obtain."

"We also found that this latent evolution can still operate in a much larger dimensional parameter space, utilizing a three-layer neural network with 17,410 parameters, while still achieving strong performance. Combined with accelerated sampling method, we can solve the cart pole task in only 10 generations, with 512 population size, one fitness evaluation per individual."

"This parallel we draw here between evolution and diffusion models gives rise to several challenges and open questions. While diffusion models, by design, have a finite number of sampling steps, evolution is inherently open-ended. How can Diffusion Evolution be adapted to support open-ended evolution? Could other diffusion model implementations yield different evolutionary methods with diverse and unique features? Can advancements in diffusion models help introduce inductive biases into evolutionary algorithms? How do latent diffusion models correlate with neutral genes? Additionally, can insights from the field of evolution enhance diffusion models?"

Diffusion models are evolutionary algorithms

#solidstatelife #evolution #ai #genia #diffusionmodels

旧文重拾


一些早期创作的诗词汇总整理

翻某个存档上古版本个人网站的GitHub (private) 仓库,看到了一些之前创作的诗词,在这里也整理一份。感慨昔日之中二,也感慨今日之无能。


学格律前

闻紫阳县兴修水利工程月夜有怀


一轮明月照紫阳,有田无水胡耀邦。

闻说引水将泽民,两岸杨柳护锦涛。

胡:怎么

作于约初中二年级

无题


雾失蟾宫,月迷花簇,此景信美非吾土,不过游子思乡处。

幸长亭久别,衡宇可瞻,归程明日。愧自谓东西南北,终不免越吟楚奏。

作于2013.12

邪气歌


地裂鸿沟藕魅现,天有黑云不见光。

剑斩祷机复穷奇,手撕层云云影双。

远有骸骨近有殚,安忍漠然绝门窗。

欲洗乾坤愁无海,将射恶虎虎有怅。

浮云满天看似广,取来称量又几两。

粉身碎骨无所惧,不见旭日不回枪。

作于2015.3


学格律后

忆512


八年旧事尘封久,不意今朝入梦来。

地动天摇维柱绝,山崩水阻锦华摧。

万千魂魄归于土,多少家园碾作灰。

逝者已去重振作,人心自古胜天灾。

作于2016.5.12前后。

菩萨蛮


良辰有幸同君共,吞吞吐吐还如梦。月起晚风寒,鸣蛙兀自欢。

君来斯意动,君去斯心空。此夜再难眠,天明惊枕干。

空:做动词,去声

作于2016.5.30前后。

八声甘州·难


悔炎炎烈日误良辰,无处可凭栏。忆零零阁上,临漪榭里,工字厅前。此景同君共赏,使我尽开颜。却有情难诉,悲喜相连。

地角凉亭夜语,又几相吞吐,终是难言。恨光阴流转,月冷更风寒。再踌躇、痴心难掩,得回音、苦笑慰难眠。君虽去、念蓬莱梦,此意难迁。

地角:地质之角

作于2016.6.7前后

无题


日落木萧萧,叶残春意寥。

东风今夜冷,北国去年娇。

感旧人事异,思君山水迢。

孑然何所惧,但恨洛神遥。

作于2017.2.6

无题


佳期未免动肠衷,思子为劳岂冀同。

明日红花谁复问,残枝不必怨东风。

作于2017.2.14

无题


秋风未起春草暮,日日蹉跎事事休。

七尺虽无鸿鹄志,一生岂为稻梁谋。

情生满腹蓬莱事,势起空怀家国忧。

马齿徒增还一岁,不知前路几沉浮。

又作“洪皓志”

作于2018.6.9

无题


事事皆无味,凝思寂寥生。

去来都是幻,幻事亦关情。

作于2018.8.29。


长亭南浦为劳处,形秽重逢愧玉容。

帝乡王乔非我意,赌书梦里羡茶浓。

2019.1.17

次韵前年今日所题


或歌或哭斯事里,如昔如今人不同。

乘兴北行何所见,含窗飞雪伴寒风。

2019.2.14

An old BB favorite. Five years old, but nothing changed. babylonbee.com/news/congress-m…

[Nightly Blog] Learning and Improving Every Day – These Weeks in Firefox: Issue 173 blog.nightly.mozilla.org/2024/…

Ukraine-Liveblog: ++ Scholz setzt auf gemeinsame Lösung mit Trump ++

Bundeskanzler Scholz hält eine Einigung der Europäer mit dem künftigen US-Präsidenten Trump in der Ukraine-Politik für möglich. Nach einem Angriff auf Saporischschja meldete die Ukraine mindestens neun Tote. Die Entwicklungen im Liveblog.

➡️ tagesschau.de/newsticker/liveb…

#Liveblog #Ukraine

phosh 0.43.1 is out 🚀📱🎅 :

This is a small bug fix release addressing two important issues in #phosh and #squeekboard that shouldn't wait 'til 0.44.0.

Check out the release notes at phosh.mobi/releases/rel-0.43.1….

🙏 to everyone who contributed to this release.

#phosh #librem5 #pinephone #gtk #wlroots #gnome #linux #mobile #LinuxMobile

This entry was edited (8 months ago)

New game dropped on Flathub: meet ROTA!

flathub.org/apps/net.hhoney.ro…

I was going to wait until we clean things up a bit more (I have a PR open to backfill release notes, maybe a nicer icon, verification), but I’m too obsessed to not share it immediately.

ROTA is completely open source, built with Godot, and released on Flathub (including for ARM!). And seriously, it’s SO GOOD. So much love and attention has been poured into it.

#GodotEngine #Godot #OpenSource #Linux #LinuxGaming #Flathub #Flatpak

This entry was edited (8 months ago)

Awww. Xonotic even runs on my Thinkpad X220 with custom 2K screen!

Installed from FreeBSD packages 😉

Usually, some "old school" games, like Quake 2, Quake 3, etc fail to properly run in fullscreen, when they found a custom 2K screen on the DP-3 line😄

Usually the games try to burn an integrated graphics card (Intel GMA X3000), when drawing a game scene at 2K. Or run only in windowed mode, because there is no 2K in those "old times".

#xonotic #freebsd #thinkpad #gaming

This entry was edited (8 months ago)

Wrote some words specifically about the problem that is handling dtb files on devicetree platforms with the Linux kernel's expectations regarding its own dtb files.

I suspect this may be somewhat controversial, and will spark debate (which is also kind of the goal). Still, I hope everyone who reads will make a good attempt at internalizing the nuances I am trying to highlight, even if they disagree with some of the details.

My #DecemberAdventure has so far mostly been quite tedious, with lots of staring at diffs and git logs. The result: a whole new implementation of Lua Carousel.

akkartik.itch.io/carousel

There should be no visible changes. That's what the tedious work was for.

Inside, the guts are dramatically redone. Lot fewer moving parts, 20% smaller download. I've used the new guts in 7 previous apps since July.

akkartik.name/post/2024-07-22-…

akkartik.name/freewheeling-app…

SFSCON24 - Johannes Näder - Tackling Openwashers, Freeloaders and Cuckoos


How to safeguard the Free Software market against unfair competition

Companies that produce and sell Free Software face a problem: some competitors use unethical and destructive means to compete, making their products cheaper and winning bids. This kind of market behaviour is increasingly becoming a problem for Free Software producers.

Destructive practices include marketing proprietary software under the guise of being Free Software, whether by using free/open wording, by introducing new licences that falsely appear to be free, or by imposing additional barriers that make it more difficult to use the freedoms offered by Free Software.

Other competitors sell Free Software products without contributing to their development and maintenance, profiting from the work of others but giving nothing back to the community. This allows them to offer low prices while raising the costs of maintenance for the original manufacturers. For some players, there seems to be no limit to their creativity when it comes to undercutting competitors and winning bids.

The Free Software Foundation Europe has been analysing these and other problematic market practices over the last few years. In this talk we will take a closer look at them and show why they harm Free Software manufacturers and the Free Software ecosystem. We will then discuss ways to limit the success of such practices.

CC BY-SA 4.0 - SFSCON 2024

This entry was edited (8 months ago)

I can’t put my finger on it, but something about the work dynamic I have is not chill.

Sure, I could expound voluminously about the who and what and why.

It’s not just work though. It’s human existence as I find myself continually in debt, homeless, being asked or demanded of too much money, time, physical constraints and more to others’ whims, when I never seem to have enough for myself let alone more for others.

There’s that religious, “not my will, but Thine be done” or whatever and to me it’s like: well OBVIOUSLY this isn’t my will, and bending to others’ causes me continual grief and consternation.

I count my blessings which doesn’t take long because they always seem to be so few and so fleeting.

But sucking it up and dealing with others’ BS just never seems to get any better. My patience wears thin. I know others seem to have it worse, but gosh doesn’t it seem as if we read and hear too much from those who just lead impossibly privileged existences I can’t ever even dream of having for myself?

Anyway, I guess I’ll at least be able to invoice more hours for tonight?

But the person to whom I sent the last invoice still hasn’t made good on that. A great way to get on my bad side if you weren’t already is to expect me to do something for money on short notice and given much longer time, fail to pay me.

Meanwhile the last person who did write me a check after being provided with an invoice on the same day as the other person who is “slacking” or not paying me as a priority? Is currently in the hospital. I sure hope he makes an expedient recovery because if I need to deal with this other individual who seems to excel at delegating tasks to me and shirking responsibilities in a timely manner? I know I am only going to have a worse time.

It can ALWAYS get worse. In my experience, it’s almost an invariable given to expect as much.

This entry was edited (8 months ago)

> BUCHAREST, Romania (AP) — A top Romanian court on Friday annulled the first round of the country’s presidential election, days after allegations emerged that Russia ran a coordinated online campaign to promote the far-right outsider who won the first round.

Romania's top court annuls first round of presidential vote won by far-right candidate | AP News
apnews.com/article/romania-ele…

A Japanese #translation is now available for #FeatherWiki thanks to the marvelous BALLOON | FU-SEN (github.com/fu-sen)! Thanks so much!

Find the download on the Downloads page:
feather.wiki/?page=downloads

If you want to get your language added to Feather Wiki, you can also contribute a translation! Instructions can be found at feather.wiki/?page=translation

I've got a #Shark #HP200 #HEPA #AirFilter for my #RV/ camper/ trailer. It's a bit overkill for the space. (It's designed for a 1000 sq.ft. space and I've got something like 450 sq.ft. in the trailer.) But that just means it works 2.5x better. 😉

Anyway... replacement #filters are expensive as fuck. They normally go for something like $75 a filter.

Found a source on Amazon for $32/ filter so I'm very very happy.

If you're looking for a HEPA air filter this is a very good unit and I can highly recommend it.

(non-affiliate Amazon links to follow)

amazon.com/Shark-HP201-Antimic…
amazon.com/Replacement-Compati…

This entry was edited (8 months ago)

BREAKING: Manslaughter Charge Dismissed in Daniel Penny Trial Following Jury Deadlock (VIDEO)
thegatewaypundit.com/2024/12/b…

geat, so the chi coms have been able to listen to everyone's calls and read our text messages for over a year, through law enforcement back doors. alright. join the party. youtu.be/tRATnT577Aw
in reply to :hoshino_smug:

@poopernova THEY TOOK THEIR FLUFFY FOX TAILS JUST LIKE THEY DID WITH SHIROKO'S FLUFFY WOLF TAIL
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
(((THEY))) TOOK THE FLUFFY TAILS
#FOXGIRLFRIDAY

A hill I’ll die on every time: NAT is a security feature. It wasn’t intended as one, it shouldn’t be used as one, but it IS one. If I go into my router and disable the firewall, then do the same on every device I own, not a single extra device on my network becomes publicly exposed. That is security. It makes it hard for users with poor cybersecurity awareness to accidentally expose devices to the entire internet. If we disabled uPNP by default, we’d see a huge drop in automated exploitation.
in reply to Marcus Hutchins

NAT is a “security “ feature the way that MMUs and IOMMUs and VMs and hypervisors and containers are.

I wouldn’t die on that hill. Many have already been slain and the researchers circumventing such things have been publishing their findings for decades.

Some even posit that perhaps virtual memory was a mistake?

e.g. Here’s LaurieWired describing GhostWrite which is an attack against the virtual memory mapping in some buggy provisional vector extensions to a specific vendor’s (thankfully not very widely deployed, basically little more than engineering samples) RISC-V CPUs:

youtube.com/watch?v=qrk8fj7re-…

“The map is not the territory” as the expression goes, but computation is fundamentally the art of symbolic representation (paraphrasing some deeper insights from Tom Jennings [IIRC gleaned in reference to some biography on Turing?]) and so ignoring reality while placing too much credence on the sleight of hand computers provide, is basically how they tend to be used in practice all the time.

Sure, it’s handy to have a pocket device that shows a “real-time map” professing to show the user’s position thanks to some math derived from GPS satellites’ signals, but gosh was it hilarious to look at a coworker outside of San Francisco’s DNA Lounge’s pocket device showing their “current location “ as somewhere on the African continent.

NAT is a convenient memory mapper, but even Dr. Marshall Kirk McKusick, who worked on a lot of the BSD TCP/IP stack while he was a grad student at UC Berkeley which was later reused all over the place is on record as saying that if he had a time machine, he would go back and make IPv3 (which was prototyped and had 48bit addresses) the one that “won”.

NAT was always a workaround to an error. It was never designed with security in mind. It has uses, sure, but I would never trust it for anything authoritative, “translation” is literally the T in NAT and as any polyglot will tell you, translation has trade offs and security isn’t a fundamental property of translation either. Maybe a weird side effect in some constrained circumstances at best? Don’t die on that hill.

This entry was edited (8 months ago)
in reply to Marcus Hutchins

The thing you described about turning off your firewall?

Really depends!

I was once misfortunate enough to administer a firewall (Cisco PIX just to date myself/this story a bit) where everything behind it? Was still running publicly routable IPv4 addresses. /24s (in plurality) with Windows 95 machines, presumably most of them unpatched! (This was long before WSUS, etc.) tbh if I had to guess the firewall was probably there to check off some regulatory compliance checkbox, much like NIDS are on some networks and basically doing very little.

If you’ve ever set up a “transparent bridge” L2 firewall, you can similarly imagine how disabling it wouldn’t do much.

There was one vendor, Packeteer, basically a company that did traffic shaping in a five figure (not counting decimal places) network “appliance” and they had a clever custom NIC which, if the device lost power, would flip latches internally and so the “in” and “out” RJ45 jacks would essentially turn into a $50,000 crossover cable, so traffic would continue to pass unfiltered.

These days, especially since so many consumer OSes are dual stack and default to enabling IPv6, turning off NAT is far less effective than it may have been. I’ve had to modify my /etc/hosts files in more recent years to add ::1 to the entries for 127.0.0.1 where I wanted Facebook/meta/instagram, twitter/x, and other it.sh head owned domains because the IPv4 localhost was no longer sufficient because IPv6 has become so prevalent.

The days of NAT having a semblance of security side effects rather than intentional design goals was short lived at best and increasingly nonexistent.

This entry was edited (8 months ago)

We elected Donald Trump for his policies. The fact this Democrap thinks he needs to fight against what we want says all you need to know about this POS.
breitbart.com/clips/2024/12/05…

Pete Hegseth is being Kavanaughed. And the only people dumb enough to fall for it are Republican senators.
thefederalist.com/2024/12/06/r…

friendica (DFRN) - Link to source
Shell Accounts

Shell Accounts
A shell is a command line interface for an operating system. With most shell providers, a command line interface on one flavor of Linux or Unix is all you get. Eskimo North provides access to eight different popular Linux distributions and SunOS Unix. Eskimo North also full remote desktop capabilities using X2Go with sound, and also NX, VNC, and RPD without sound.

Account Types
We offer four different levels of shell accounts: Economy, Standard, Power, and Enterprise. Background tasks such as IRC bots, Game Servers, and the like are permitted on all account types except student. IRC servers are not permitted because of their tendency to draw denial of service attacks. Standard, Power, Enterprise, and Super-Max shells include a MySQL database allowing you to run a variety of LAMP stack based applications on your website and to use non-web based applications that require a database.

Web Hosting
Web hosting under our domain is provided with all shell accounts. You can host your own domains with virtual domains or web hosting packages.

Remote Desktop
Remote desktop capability is like having a monitor, keyboard, mouse, and speakers plugged right into our servers. Because our servers can be accessed anywhere in the world, this allows you to have a work environment you can access from anywhere in the world without risking losing your files to a laptop, tablet, or phone thief. We offer remote desktop capabilities on all of our shell servers except for the SunOS server. We support x2go, nx, vnc, and rdp protocols. X2go is the best choice as it provides extremely efficient compression and X round trip removal as well as sound.

Applications
Applications include Office Suites such as Libre Office and Caligra (which can read and write Microsoft Office file formats), Web and Program Development tools such as Bluefish Editor as well as many other editors, compilers, interpreters, scripting languages, debuggers, profilers, and online documentation.

E-mail
Our e-mail system offers unprecedented flexibility. You can access your mail via shell mail readers including graphical mailers like Thunderbird, or via Web mail, or via pop-3 and imap mail protocols, complete with TLS encryption. Our mail system includes Bayesian filtering with Spam Assassin which can be individually configured for your needs. Procmail allows you to sort and process mail automatically. Smartlist allows you to maintain mailing lists.

Security
Access to all of our servers is available via strong encryption. The shell servers all support ssh access. All of the remote desktop protocols tunnel via ssh. We maintain all of our servers up to date keep with the latest patches. Backups are made weekly.

Eskimo North has been providing Unix timeshare services since 1985. We have been providing Linux timeshare, shell access, web hosting, e-mail, and Internet services since 1992. Please take a look at our services as they support our free Federated services including Friendica, Hubzilla, Mastodon, Misskey, Yacy, and Nextcloud.

friendica (DFRN) - Link to source
Federated Services

Federated Services are services which many instances form a network to provide a greater whole than the sum of their parts, each participant in the Fediverse is an “instance”. A message or other item made available on one instance is visible and available on other instances.

We make these services available to all people who do not abuse it in order to promote the values of Free Speech, and those of the United States Constitution First Amendment. A free republic is not possible without free speech and commercial mainstream media do not provide it. We also get some advertisement benefit from hosting these, it is our hope that people who see how fast and responsible our services are will decide to do hosting or use other paid services here.

There are numerous federated services available, we offer Macrobloging platform Friendica, Hubzilla; Microbloging services Mastodon, Misskey, a federated search engine, Yacy, and a federated cloud service, Nextcloud.

Macrobloging services are message systems that allow long form posts similar in format to Facebook. These allow for works of fiction, poetry, technical papers, news items, short stories, and more. These formats are most useful for discussion of social issues.

Microbloging services allow only short form posts similar in format to Twitter. While you can link to larger articles elsewhere, you have a relatively short character limit and so can not post them directly.

Censorship, is handled much different on the fediverse than on mainstream media like Twitter or Facebook. On the fediverse, each individual instance is responsible for content available on that instance, but does not censor the rest of the network. Thus if you find the rules of one instance too constraining you can move to another.

Federated search engines are analogous to federated message systems in that each instance chooses what portion of the internet it wants to crawl. When you enter a search term, the local instance queries all of the federated instances, collates and sorts the results and presents them to you. As with messages, each instance can have it’s own censorship policies but no one instance can censor the entire network.

Given the wild-west nature of the fediverse, it is probably not suitable for children under 14, and you’re guaranteed to find some material that will offend virtually everyone. With federated search engines, material that is inappropriate will usually be flagged sensitive or nsfw (not safe for work) so as long as you don’t expand material marked as such, you can avoid this soft of material. There are occasionally people who violate these rules, we do our best to remove such individuals none the less some will get through.

We offer the following federated services:

Friendica.Eskimo.Com
Friendica is a decentralized long format macrobloging message network. It is similar in format to facebook however there is no centralized censorship. Also, it is able to federate with all other federated message systems which use ActivityPub protocol and also we have extensions that allow it to speak to several other networks via other protocols.

Hubzilla.Eskimo.Com
Hubzilla is similar in message format to Friendica in that it allows long posts. However, it specializes in it’s ability to provide connectivity to multiple protocols and so we include it in our mix of federated services primarily for the better connectivity it offers. Hubzilla provides a great deal of interoperability between many networks though ActivityPub is still it’s primary protocol. Hubzilla gives you a greater degree of control over privacy than some of the other networks. You can create private channels that are served between hubzilla instances and other compatible instances.

Mastodon.Eskimo.Com
Mastodon is first and foremost an alternative to Twitter. While Twitter has Tweets, Mastodon has Toots. The format is very similar. Mastodon toots have a limit of 500 characters. Similar to the short limit of Twitter. This is why this platform is referred to as a Microbloging format. Mastodon interacts with other ActivityPub instances however when a long form blog post from another instance arrives, you are only shown a short portion with a link to follow to see the full post on the originating site.

Misskey.Eskimo.Com
Misskey is, like Mastodon, a microbloging service. However, it’s Japanese design and gives it a much more gamey aesthetic. The software is also extremely efficient allowing for a very fast message rate. If you’ve got a fast mind and can read and comprehend fast, you will appreciate this service.

Yacy.Eskimo.Com
Yacy is a federated search engine. There are several thousand instances on the Internet. Each instances crawls whatever portion of the web the administrator requested. It is also possible for the administrator of a site with relatively few resources to request a larger site to do crawls on their behalf. Unfortunately, it does not provide a method for an end user to initiate a crawl, but if you send e-mail to support@eskimo.com and request a crawl, we will initiate a crawl on your behalf.

NextCloud.Eskimo.Com
If you are a customer of Eskimo North, your login credentials will work without a domain extension to access Nextcloud. If you are not a customer you can apply for a Nextcloud account using your choice of login and password, in this case the login should include your originating network. Some features require an Eskimo North shell account to take full advantage of.

If you enjoy these services, please consider supporting us by taking advantage of our paid services: https://www.eskimo.com/

JUST IN: Rep. Eli Crane to Introduce Resolution to Award Daniel Penny With Congressional Gold Medal

thegatewaypundit.com/2024/12/j…