This is a very dangerous, and unfortunately widespread, generalization. The shitty ones are the loudest ones, and I’m sorry that most of your experience with linux users has been with them. I promise, much of the community are kindhearted individuals who simply use linux because of its ideals, or because they’re developers, or privacy enthusiasts, or those who bought a steam deck and think the lack of windows is pretty neat.
Then try podman! The podman desktop application by redhat is probably one of the nicest interfaces for container orchestration i’ve seen in a while, if not a little bare. Podman is rootless by design and there’s basically no configuration needed (for non-commercial purposes, anyway) besides loading up the gui, downloading your images, and spinning up whatever software you need.
Unfortunately, the custom graphics driver only supports OpenGL 3.3 (from 2010) and OpenGL ES (embedded systems) 3.2 (via Zink, via Mesa)
Edit: Just realized i forgot to actually answer the question. I don’t believe they’ve yet added support for the video encoding/decoding engine, but once that arrives i believe it should be comparable to MacOS
I’ve never used AdGuard, and I don’t know exactly what the ease-of-use is or how configurable it is, but I think that Pi-Hole is a better option nonetheless. It’s built by the community instead of a corporation, and likely has more/better documentation than its peers.
The other user didn’t answer your question fully, but heuristic algorithms are very good for this purpose! if you’re able to identify some specific things in players behavior that only occur when they are cheating, you can easily create a machine learning system to identify that behavior, incorporating things like batch punishment (such as VAC or Hypixel’s Watchdog) to make it more difficult for cheat devs to identify the reason, or a manually-reviewed appeal process to account for errors in the model.
I suppose you’re right, but forging that kind of thing would be difficult, also considering the PKI already in place. If someone has their own email server and they sign/encrypt their email, and host their public key on a key server somewhere, it’s highly unlikely that all three would be compromised. and even if that fails, you could just meet up with them and exchange flash drives with keys.
What’s stopping someone from just sending public keys or something through Signal and encrypting their messages that way? There’s no way to enforce this with such simple loopholes present. We shouldn’t be focusing on breaking privacy and instead invest in helping existing victims in ways that actually matter.
You can move the ebook file to where qbittorrent is trying to download it to, and then recheck. It’ll then recognize that the file is there, and should work as a seed.
nothing actually happened, it was like fake news/misinterpretation or something, since if the earths core stopped/reversed we’d be dying of UV radiation rn
i think a skeleton is just multiple bones together that are attached. A pile of bones isn’t a skeleton, it’s a pile of bones