Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)ON
Posts
0
Comments
791
Joined
7 mo. ago

  • The thing is, this change isn't new, it's been coming for a while (as in years, it started with at least Android 13).

    Though it's weird, some apps still get full access, such as Resilio Sync, though other similar apps such as Nextcloud and Syncthing don't.

    I recently setup a phone and when installing Resilio it asked for permissions to the entire SD card, so clearly there's still a mechanism, but only some apps are permitted to ask for it.

    Something fishy going on.

  • Something without official moderation will be effectively moderated by a plurality: whatever single largest active bloc in a community will control it.

    This is an intriguing idea, thanks for posting about it. It may end up functioning in ways we can't predict, and that should be interesting.

  • Check out Jmp.chat

    It's not directly what you're looking for, but it does offer VOIP via XMPP. Voice calls are crazy cheap, like 0.1¢/min, or something (I forget, it's so silly cheap I just don't care).

    You can use it stand-alone, or port your phone number in and now everything (calls/sms) go through XMPP. This is how I found them, as a solution to crappy SMS being tied to a physical device. Now my (crappy) SMS is on any XMPP client I use - phone, laptop, desktop, iPad, etc. And all calls are VOIP from any device, so long as the client supports it. I don't think there's a Windows client that yet supports voice (Gajim is the go-to for XMPP on Windows), but there's: Android (Cheogram), Linux (Gajim) and iOS (Snikket).

  • If security were at the front of development efforts, this would be far less of an issue. I've said it since the 90's.

    Tcp/IP was intentionally released without encryption with the argument that routing hardware lacked the necessary performance to handle it (which wasn't incorrect, just misleading).

    Windows at least was originally built as a single-user system on a disconnected computer. Though Window NT and it's children have no excuse for not having stronger security models from the start (especially since it's essentially a fork of DEC Alpha).

  • As others have said, use tools like borg and restic.

    Shop around for cloud storage with good pricing for your use-case. Many charge for different usage patterns, like restoring data or uploading.

    Check out storj.io, I like their pricing - they charge for downloading/restore (IIRC), and I figure that's a cost I can live with if I need to restore.

    Otherwise I keep 3 local copies of data:

    1 is live, and backed up to storj.io

    2 is mirrored from 1 every other week

    3 is mirrored from 1 every other week, opposite 2

    This works for my use-case, where I'm concerned about local failures and mistakes (and don't trust my local stores enough to use a backup tool), but my data doesn't change a lot in a week. If I were to lose 1 week of changes, it would be a minor issue. And I'm trusting my cloud backup to be good (I do test it quarterly, and do a single file restore test monthly).

    This isn't an ideal (or even recommended approach), just works with the storages I currently have, and my level of trust of them.

  • I have no explanation. Really shocked me that idle was that low, and I ran the meter on it for a week with it mostly just sitting there, and some file copy action. I could see in the power chart when I copied files, then it would fall back to 12w. Nuts.

    I have to make a config change soon (add a drive and a fan), I'll put the meter back on for a week.

  • Because no one wanted to?

    You haven't, right? Why? As you said, you don't have the programming skills (neither do I).

    It's always just that simple - someone with the expertise doesn't feel like doing it. Nothing more, nothing less.

    Sometimes, people like you and me get motivated enough to go learn how to do these things, or find people with the skills.

  • I don't get why companies use this stuff, it just exposes them to liability - if an employee does something unlawful, the company could be held liable since they clearly knew since it's in the monitoring database.

  • This all started 15+ years ago.

    I vaguely recall this transition with a Call of Duty game, when you could no longer host your own, for a game where that really wasn't necessary, unlike MMORPG.

    And today with the high bandwidth home connections, hardware capability, or even just using a VPS, you could still host with appropriate performance.

  • Um, it's the Catholic Church, progressivism shouldn't be expected anyway.

    I'm not saying this as a dig on Catholicism - if you study world religions, they all have their code, their rules. Progressivism isn't part of Catholicism. Expecting otherwise is silly.

  • Hell, using consumer grade, free tools (handbrake) I can convert a DVD to mkv and reduce the file size upwards of 75%, and still be perfectly viewable on a current 65" TV.

    I can only imagine the capabilities of Google/YouTube. It would be fascinating to see a high level diagram of how they handle a video.