Doom Loop FTW!

The Salesforce NFT restaurant is dead!

Sorry, did I say "restaurant"? I meant "global experiential hospitality platform".

"Despite a strong demand for the concept with millions of dollars in both pre-sold and reserved memberships (despite multiple requests for refunds due to job uncertainty or loss), we ultimately could not address the many concerns brought about by potential investors, most of which have been around the future of SF and the rising costs of constructing the restaurant." [...]

Sigel blamed "macro level" factors including "labor shortages, supply chain disruptions, geopolitical uncertainty, and inflation" for an increase in construction costs, leading to the group's inability to continue with the project. [...]

Sigel touted Sho Group's commitment to NFT-based memberships, which he argued would help offset construction costs [...] There were supposed to be 3,275 Sho Club NFT memberships, according to the group's website: 2,878 slots for the $7,500 "Earth" membership tier, 377 slots for the $15,000 "Water" membership tier, and 20 slots for the $300,000 "Fire" membership tier. The memberships would bestow special privileges and perks, and could be resold on OpenSea, an NFT marketplace. [...]

"Over the past few months, we have received an overwhelming amount of enthusiasm and interest," Sigel wrote to prospective members in an October 2022 email SFGATE obtained via a public records request. "... We will begin selling memberships to the public in late October / early November."

That did not happen. In early 2023, Sigel claimed to prospective investors that he had decided to sell about 100 NFT memberships as part of a pre-sale. There have been no social media posts from any of Sho Group's accounts since late September of last year.

[Their last post] includes the handshake emoji, linking the words "hospitality" with "Blockchain & Web3."

Previously, previously, previously, previously.

Tags: , ,

Breaking: Scorpion stings frog

As I keep saying: maybe using a web browser owned by the world's largest advertising company is a bad idea.

Google gets its way, bakes a user-tracking ad platform directly into Chrome:

Don't let Chrome's big redesign distract you from the fact that Chrome's invasive new ad platform, ridiculously branded the "Privacy Sandbox," is also getting a widespread rollout in Chrome today. If you haven't been following this, this feature will track the web pages you visit and generate a list of advertising topics that it will share with web pages whenever they ask, and it's built directly into the Chrome browser. It's been in the news previously as "FLoC" and then the "Topics API," and despite widespread opposition from just about every non-advertiser in the world, Google owns Chrome and is one of the world's biggest advertising companies, so this is being railroaded into the production builds. [...]

As you can see in the pop-up, all of Google's documentation about this feature feels like it was written on opposite day, with Google calling the browser-based advertising platform "a significant step on the path towards a fundamentally more private web."

The argument here is that someday -- not now, but someday -- Google promises to turn off third-party tracking cookies in Chrome, and the new ad platform, which has some limitations, is better than the free-for-all that is third-party cookies. The thing is, third-party cookies mostly only affect Chrome users. Apple and Firefox have both been blocking third-party cookies for years and won't be implementing Google's new advertising system -- it's only the Chromium browsers that still allow them.

That's actually what started this whole process: Apple dealt a giant blow to Google's core revenue stream when it blocked third-party cookies in Safari in 2020. While it was a win for privacy, Google's not following suit until it can secure its advertising business. The Federated Learning of Cohorts and now the Topics API are part of a plan to pitch an "alternative" tracking platform, and Google argues that there has to be a tracking alternative -- you can't just not be spied on.

Previously, previously, previously, previously.

Tags: , , , , ,

StarLink

Matt C Jackson:

This image includes all of the satellites captured by my camera during less than 17 minutes of shooting.

I originally planned to include all of the satellites from a 3-hour timelapse, but after painstakingly masking satellites into images for about 6 hours, I had gotten through less than 17 minutes' worth of images.

Each image in the timelapse series was 2.5 seconds, iso 5000, f/1.4, and I was shooting with a 3 second interval. I processed 326 frames from the series, totaling 878 seconds or 16.3 minutes.

James Gleick:

Elon Musk secretly used control of his Starlink network to cripple a Ukrainian military operation while it was under way, in defiance of American foreign policy.

He is an oligarch working against U.S. interests, benefitting his fellow oligarchs in Russia. His biographer seems to think this is just Musk being Musk, quirky and idiosyncratic.

Sam Lawler:

I just had to update my numbers for a lecture, so here's your periodic reminder: Starlink is now 55% of ALL active satellites in orbit. [...] Why did our governments effectively gift Low Earth Orbit to one awful dude? This is so bad.

Brianna Wu:

I want an apology from all the mansplainers that mocked my belief that privatizing NASA and relying this heavily on SpaceX would undermine the national security policy of the United States.

Previously, previously, previously, previously, previously, previously, previously, previously.

Tags: , , , , , , ,

Plato's Cave Regrets to Inform You It Will Be Raising Its Rent

Plato's Cave Regrets to Inform You It Will Be Raising Its Rent

We do not undertake this lightly. As the costs of maintaining a cave meant to trap you in your ignorance increases year after year, we want you to know, from the bottom of our hearts, that we, too, are suffering. We get that times are tough, and we hope you can extend that sympathy to us, the managers of your cave.

Please rest assured that cave costs are increasing everywhere. We manage many other caves like that of Polyphemus the Cyclops and the childhood home of Zeus. So, trust us: we know caves.

We hope you will continue to enjoy living in our cave. We believe you are a valued part of the Plato's Cave community. Credit, cash, or Venmo all work.

Previously, previously, previously, previously, previously, previously, previously, previously.

Tags: , , ,

Wayland and screen savers

Wayland does not support screen savers: it does not have any provision that allows screen savers to even exist in any meaningful way. If you value screen savers, that's kind of a problem.

Why doesn't it? Well, I suppose the designers of Wayland have no joy in their cold, black hearts simply do not value screen savers.

I suspect that some day someone will graft screen saver support onto Wayland. I have thoughts on this.

Adding screen savers to Wayland is not simply a matter of "port the XScreenSaver daemon", because under the Wayland model, screen blanking and locking should not be a third-party user-space app; much of the logic must be embedded into the display manager itself. This is a good thing! It is a better model than what we have under X11.

But that means that accomplishing that task means not just writing code, but engaging with whatever passes for a standards body or design committee in the Wayland world, and that is... how shall I put this... not something that I personally feel highly motivated to do.

However, as I am the world's foremost expert on screen savers on Unix-like operating systems, here are a few simple admonitions for young and old.


Under macOS, old-school X11 and Wayland, the graphical boot sequence is basically the same, and uncontroversial:

  1. Kernel runs init;
  2. Init runs a "graphical session", which sets up the frame buffer;
  3. The session displays a login prompt;
  4. After authenticating, the desktop environment is launched (Finder, etc.)

When you are logged in and the screen is locked, things go differently. Under macOS, the same "graphical session" process that managed the login window handles locking and authentication. Importantly, if this program crashes, you are logged out.

Under X11, you run XScreenSaver, which is a user-space program that tries really hard to keep the screen locked and never crash. It is very good at this, but that it needs to try so hard in the first place is a fundamental design flaw of X11.

So here's how locking and blanking should work under Wayland. I am not terribly familiar with Wayland or its terminology, but I can guarantee that if it diverges from this outline in any particular, grave design mistakes have been made and must be corrected.

There are three idle timeouts at play:

  1. Blank after: when to blank the screen or run a graphical saver;
  2. Lock after: when to require a password to return to the desktop (must be >= blank after);
  3. Power save after: when to power down the screen (must be >= blank after)

How those interact is fairly obvious. This logic should be embedded in the main loop of the session manager:

    if not blanked {
        if idle >= power save after {
            power down
        } else if idle >= blank after {
            launch screen saver
        }
    } else if user activity {
        if powered down {
            power up
        }

        if blank start time < lock after {
            kill screen saver
            unblank
        } else {
            prompt for password
            if verified {
                kill screen saver
                unblank
            } else if was powered down {
                launch screen saver
            }
        }
    } else if powered up and idle >= power save after {
        kill screen saver
        power down
    }

The meat of it, of course, is "launch screen saver". Under macOS, how that works is, the system instantiates a configured subclass of a ScreenSaverView window sized for each monitor and tells each of them to start animating. I assume that Wayland-heads will want to do this by sending DBus messages to some daemon that has registered itself as "I am the screen saver".

When it it time to start drawing, that screen saver manager just needs to know set of rectangles into which graphics should be drawn, whether that's a set of window IDs, or geometry specifications, or whatever.

Things to keep in mind:

  • The display manager should prevent any other program from drawing to the screen while it is blanked or locked: no dialogs, popup windows, notifications, etc. The only thing that should be allowed to draw to the blanked screen is the screen saver. (Make it an option if you must, but I assure you that for every person who likes it that a dialog box can pop up on top of their screen saver, there are a thousand more who consider that a security bug.)

  • Enable an option to slowly fade the desktop to black when blanking, interruptible by user activity.

  • Enable an option to slowly fade from the screen saver to the desktop when unblanking, interruptible by keys and clicks but not by mere mouse motion. Both of these options are probably easier to implement in the display manager than in the screen saver daemon, but either is fine.

  • Bear in mind that the screen saver daemon might choose to run the same display mode on more than one screen; or a different one on each; and might choose to stop one display mode and start another after a timeout while the screen remains blanked. It may do this by forking sub-processes, so any screen-access authorization must be inheritable.

  • Make it possible for for the screen saver to access the current desktop image, or the desktop image as it appeared pre-blanking. Many people rightly consider this a security exposure and leave it turned off, but many others enjoy it that their screen savers can hack their desktop image. It is a popular feature.

  • Do not consider a single pixel of mouse motion to be enough reason to power the screen back on. People who live near cats, trucks or slamming doors do not appreciate that.

Good luck! You'll need it.

Previously, previously, previously, previously.

Tags: , , , , ,

DNA Lounge: Wherein we NEUROBLAST

If you didn't pick up your copy of the NEUROBLAST HyperCard DiskZine at last night's CYBERDELIA, you can still read it online in glorious 1-bit emulation. This issue includes music, comics and game controller reviews, Kate Libby's poetry, plus a couple of contributions by yours truly. Hack the Planet!

Tags:

Happy Bell Riots Day, to all who celebrate


Previously, previously, previously, previously.

Tags: , , , , , ,

  • Previously