Skip Navigation

Posts
7
Comments
803
Joined
2 yr. ago

  • If it can be read (i.e. used) it can be copied. Self-destruct is a possibility, thermite FTW ;). There are encryption technologies that will resist even this level of resources however, I'm guessing 1024-bit encryption is good until Q-day, probably more with a quantum ready algorithm, although none of those have been tested yet.

    That's when they bring out the rubber hose...

  • Certainly wouldn't hurt, tunnel out via vpn to swaziland or whatever. I'm still going to be searching locally, but if all they know is I'm looking for bikes and hopefully don't link it to my shadow profile, I can probably live with that. Still, don't they require ID and phone number and shit these days ? IDK, I really don't follow them.

  • bicycle, FWIW, but it's a more general problem...

  • wish there was music

  • I like yaya@erewhon.com (sorry to the admin, it means nowhere, I assume it's like /dev/null) Just like everyone should be using 01/01/1970 for a birthdate

  • Well said.

  • It'll be ASI before ppl acknowledge AGI

  • And when I switched mobos from Intel to AMD, it just booted (Arch then). Couldn't believe it, just went.

  • Or you plug in the most prolific wireless mouse on the planet, that’s been around since 2000 (Logitech), and it doesn’t work. Now pick any random piece of hardware and this is the stuff you run into. You go down the rabbit hole of searching for a solution

    Have you not heard of logiops? Sure it needs a bit of config file editing, but now I'm a click and a shake away from switching activities, and music and... Honestly, it rocks

  • And then you find ventoy...

  • Get yourself an old lenovo laptop t440p/t480. You're missing out.

  • Have you met Anaconda?

    But no, you're right...

  • That's cool, something like arxiv...

  • You're not wrong, but it's not good enough to simply make it available somehow today, you want it publicly searchable.