• 0 Posts
  • 47 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle


  • My dream was to work as a game developer. This was nearly 20 years ago. I actually got an offer in that field at one point, and the salary was like $20k less than what I was already being paid. I was the main bread-winner in what was a (mostly) single-income household at that time, with my partner pursuing her PhD. Gave up the dream, and I’m glad I did based on what I later learned about that industry. If I went into the game industry I’d be making far less money and have far less free time to do the things I enjoy, like playing the games other people make.




  • MinuteCast from AccuWeather does exactly this. It looks at your location, looks at radar data for storm systems approaching your location, and estimates when precipitation will start at your location and how intense it will be. It’s generally pretty accurate, with some limitations. It seems to be pretty good for consistent rainstorms but it can get tripped up by pop-up thunderstorms, where the radar track can go suddenly from no rain to downpour. It doesn’t make predictions more then 2-3 hours out because past that timeframe it’s not easy to predict if weather will continue on its current track or change direction. Even with the limitations, I use it all the time. Mostly to tell if I should take the dogs out right away, or if I should wait an hour or two.






  • Jesus, what a bunch of needless “security”

    I disagree with this part. Ticket theft is an actual issue, there are lots of ways to get a copy of someone else’s barcode and either use it before they do or (more likely) sell it to someone else online. TicketMaster’s marketing is talking up the increased security to distract from their true purpose, which is of course to find more ways to take more money from fans. Of course it’s debatable whether the increased security is worth the decreased convenience for ticketholders. That is the inevitable tension when it comes to security, where any increase in security always incurs at least some cost in terms of convenience.

    This is all for personal data mining.

    TicketMaster might be selling user data, but I don’t think that’s their main aim. They want control of the resale market so they can take a cut when tickets are resold. Note how they don’t allow direct transfers between two mobile wallets, they only allow transfers using their app. That’s so they can monitor transfers. If they see someone transferring dozens or hundreds of tickets to many other TicketMaster users then that person is likely reselling and they can clamp down on their account. TicketMaster’s true intent is to force all resales onto their ticket marketplace, because that’s where they get to take a cut of resales.


  • Oh yes, I don’t mean to absolve them of any blame. They treated it as an expensive lesson, which is probably the best way for them to process it.

    Also while TicketMaster is going to sell this as being an “enhanced security” thing, it’s pretty obvious that increased security is only a side benefit for them. Their angle in this is getting more control over the tickets they sell. As long as there are many people who want to go than can physically fit in a venue, there will be a reselling market for event tickets. TicketMaster wants to take a cut of these downstream transactions.

    While the security of rotating barcodes does hinder outright scams, mobile wallets normally allow wallet users to transfer items like tickets to another user if the ticket issuer allows it. TicketMaster does not allow this for their tickets, of course, because it could allow someone to resell tickets while cutting TicketMaster out of the transaction. Currently TM allows transfers using their app, but I’m sure they monitor usage of the feature and clamp down on anyone transferring many tickets. In other words if you try to resell in bulk without using TicketMaster’s own platform (where they get to take a cut), they drop the hammer on you.


  • The reason you can’t use screenshots or printouts is because they’re now using rotating barcodes. Much like the rotating codes in an authenticator app, the number values behind the barcode are changing on some regular cadence. Only the most recent barcode value is considered valid.

    The only other option is to use a mobile wallet, but that prevents me from sending my friends their tickets, since I purchased them all together.

    Some ticket sellers allow you to transfer tickets from one wallet to another wallet, but of course TicketMaster isn’t one of them because they’re fucking TicketMaster. What TicketMaster does allow is transfers from one TicketMaster account to another. Of course then everyone needs to have a TicketMaster account, needs to have the app, etc. It’s either that or leave all the tickets in your app or wallet and go in together. If you tell the door person “I have the tickets for these X people,” they’ll be able to handle that.


  • Yes because the security of barcodes and screenshotted tickets were such a huge problem before.

    I think what you just described is actually a problem. Friends of my parents were visiting somewhere, bought tickets to a show from a reseller, met up with the seller (normal looking guy, no red flags, gave some plausible story why he was selling) and paid cash for printed out tickets with barcodes. Printouts looked legit, dates on the printouts were correct, etc. Went to the doors, tried to scan their tickets, got told that unfortunately they’d just been scammed. The impression they get from the box office worker is that this sort of bad news is something they’ve had to deliver frequently. Anecdotal, but I doubt those friends of my parents were the only ones to get scammed in this way. TicketMaster still sucks as an organization but the extra security of rotating barcodes does serve a legitimate security purpose, just like the rotating security codes generated by an authenticator app.

    Airlines have recently been having problems with stowaways using screenshots of boarding pass barcodes or QR codes too. Such stowaways should get caught before departure by passenger headcounts or boarding ID checks, but clearly there are gaps or breakdowns in these procedures because some of these stowaways are getting caught at the destination. Others may have successfully flown for free. If it keeps happening I bet we’ll see rotating barcodes come to mobile boarding passes too, if that hasn’t already happened.




  • When a tech is new and cool but still not evolved to practical.

    My friend, there is nothing “new” about this technology. It has been around for ages. As a child I lived in a home with a heat pump, and that was in the late 80s. I’m gettin’ pretty old here, and heat pumps are even older than me. Heat pumps are just air conditioners with one extra part: a reversing valve that allows the direction of flow to be switched so the hot side of the system can be inside in the winter and outside in the summer.

    Heat pumps don’t require further evolution to become practical, they’re already practical. Beyond practical! It’s a heating technology capable of efficiency greater than 100%. It’s called a “heat pump” because the system doesn’t create heat, it moves heat. From outside to inside in winter, and inside to outside in summer. Since a heat pump is not creating heat, instead moving energy that already exists, it’s possible to get more energy out (in the form of heat) than the energy you put in (in the form of electricity). Generative heating technologies (natural gas or oil furnace, resistive electric heat) cannot match that as they will always be below 100% efficiency.

    I live in Canada, I have a heat pump, and it is great. If you think heat pumps are bad, or not suited to northern climates, or not yet practical… I’m sorry, but you’re misinformed.




  • There are some viruses that have targeted Linux, but they’re rare compared to other platforms and their ability to spread is relatively low. One of the main reasons is just down to how software tends to be installed on each platform. Viruses have an easier time spreading on Windows or OSX where users are more accustomed to downloading an executable and running it. Once there’s a malicious running process, it has a comparatively high chance to spread because it can attempt to escalate its privileges either by exploiting a bug or socially engineering the user to click through a privilege escalation prompt. That entire workflow is practically nonexistent on Linux, users just don’t tend to download and execute random binaries. Instead most Linux software gets delivered in one of these ways, each of which has impediments that reduce the chance a virus could spread:

    • through an OS repo; it would be difficult for a malicious actor to get a virus through the release process and into a trusted repo
    • through a public source like Github; again it would be difficult for a malicious actor to get a virus into public source code without someone noticing
    • through a container image from an image library like DockerHub; I believe a malicious container would be sandboxed, making it hard if not impossible for that container to take over the host system
    • through an application image like a snap, flatpak or appimage; again, I believe these run in their own sandbox from which they would have difficulty breaking out

    There are some exceptions, for example some companies like Hashicorp will distribute their stuff as precompiled binaries. Even in that case you’re probably fine as long as you don’t run the downloaded binary as root. Users in the habit of downloading strange binaries from sketchy places and running them as root just aren’t very common among the Linux userbase. I’m sure there are some (and they should really stop doing that), but there aren’t enough of them to allow a virus to spread unchecked.