Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)ST
Posts
0
Comments
639
Joined
2 yr. ago

  • Do not blame immich for running on shitty hardware. Just alone latency of the hard drives makes it slow as hell not even talking about a completely under powered CPU that is already at its limit to run a NAS and additional heavy services like Plex.

    A SSD cache is a must for loading small files which is a must for a Photo cloud cause of thumbnails, previews etc.

    Talking about features, maybe you should specify what you actually want and need instead of speaking only generally.

  • Not much information on the data. But still some critique of the data:

    1. the source claims

      "use ad blocking tools at least sometimes" so not all the time

    2. It is only 16-64

    Both of those metrics exclude lots of data for example, when you scroll down you see that yes a lot of ppl use ad blocker on the PC but not on phones or tablets. Also ppl below 16 have a very low usage rate also ppl above 64.

    I think actually ad block usage by sites visited with and without ad blockers would be nice too.

    But thank you for the link, guess ad blockers are indeed more popular than i thought.

  • Too bad, i deleted everything on reddit, would.have loved to comment on every HGST fanboy and Seagate hater i had discussions with the last few years.

    TLDR buy the cheapest drive you can find (new)

  • Ad block users are already the minority.

    Adblockers are a must have for protecting against mailware and phishing attacks. Google and other ad services have proven to be incompetent in protecting their service against those kind of attacks targeting users.

  • Actually worse than I thought.

    So basically the USB is the point of entry? When you could permanently fuse the data connection in the SoC it would be a huge improvement in security. OFC you could only use the port for charging anymore.

  • If you expect ongoing maintenance, are you saying you feel entitled to the devs’ continuing work in perpetuity, and at no cost? Because that’s called slavery and we have laws against it.

    Stop putting words in my mouth.

  • They only need the biggest contributors. Small contributions like single line or even a few lines edits etc. are not eligible for copyright. Also minor contributions can be easily rewritten.

    Most ppl you will get with a paycheck.

  • How do you think encryption works?

    What do you think does a lockscreen?

    As i guessed. You are evading the question by again babbling nonsense and questioning my knowledge instead of actually proving anything you are saying.

    You have shown that you have a bad understanding of what you are actually talking about (see the 'cracked' TPM discussion) and constantly shifting the discussion away from what you are saying : "Basically every device can be accessed without major problems" and what i am trying to explain to you.

    You are acting in bad faith.

    Bye

  • If you think TPMs are always encrypted, a key can be encrypted "with itself" and still be any use to you and android system pin is secure you are right. Might also believe in santa

    Not sure what you are rambling about the TPM.

    Then prove that the Lockscreen is insecure.

  • Isn't it an open secret that powerful entities (like spying institutions) can get into pretty much every system if they have physical access? Why is this not plausible

    You stated in your original comment: "pretty much every system". So no, any modern phone if android or iOS is by default encrypted.

    If the key for the encryption is on the device, and either stored in an unencrypted TPM or unencrypted storage, its not a matter if breaking the encryption (quite impossible) but breaking the software/hardware (quite possible for someone with good enough forensics and skilled programmers)

    TPMs are by design encrypted.

    Keys are not stored unencrypted at least not when you encrypt your storage with modern solutions and set it up reasonably. You use either your TPM to store the key or store it on the drive and have it encrypted by itself or use a KDF.

    Also also: encryption only helps if the device is off, which is seldom the case with phones.

    No this assumption is wrong. You still would need to circumvent the Login into the device which is mostly secured by a pin or password or biometrics.

  • No. The TPM was not cracked. The communication was sniffed, which is unencrypted. This requires a Device to be modified and then successfully unlocked to get exploited also this does not affect devices where the tpm is integrated in the SoC.