Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CA
Posts
7
Comments
202
Joined
2 yr. ago

  • I run Gentoo as my main distro, and have for a couple years now. It's a pretty stable rolling release (IMO more stable than Arch), and since you're already an advanced user, the experience should be pretty rewarding!

    The wiki is great, and the installation handbook is top notch.

    You get to control exactly what features each package is compiled with, so no bloat at all.

    KDE 6 just landed too!

  • Chase Rule

    Jump
  • That's a ridiculous rationale. If the Lemmy developers actually cared about the integrity of users' posts, they wouldn't have released software without support for cryptographic signing.

  • There are two ways to layer a VPN and tor:

    1. Tor over VPN; or
    2. VPN over Tor.

    In the first option, you gain little. Tor already encrypts your traffic, so your ISP can't see inside them. Technically, Tor over a VPN hides the fact that you're using Tor from your ISP, but Tor's snowflake does something similar if you need that.

    In the second option, you're revealing your VPN account information, which could theoretically be associated back to you. Tor adds nothing over just a VPN in this case.

  • Copyleft means: "if you modify the program and share it, you also have to include the source code for your modifications."

    The owner of the copyright (usually the developers or their employer) can still change the license later.

  • First, same advice as everyone else. Change your passwords. Password managers are great. I like keepass.

    Regarding the email, this looks like a Hotmail/Microsoft/Outlook account. Their security page sucks ass. It lists every time someone unsuccessfully tries to log in. "Unsuccessfully" as in they tried your email with an incorrect password. Of course hackers are going to try to break into your account. You really only need to worry about successful logins that aren't you.

  • 3.5e just had some much room to explore. Yeah, some parts sucked or didn't make sense, but I think that really led to some interesting characters and fun moments in games. I haven't played 5e much precisely because it's so smooth in comparison.