Skip Navigation

User banner
Posts
4
Comments
662
Joined
2 yr. ago

  • I was honestly surprised by win11. The last time I've daily driven a windows machine was the dark ages of 8.1. My expectations were pretty low thanks to the hate people spewed about it online.

    What I got was a preinstalled SSH client, easy to install SSH server, customizable terminal app with tabs and nice features related to WSL, The WSL itself! Easy to install and switch between different distros, notepad remembers unsaved work, and it finally has tabs! Explorer? Tabs! Media playback? Windows finally got the media control widget, like a normal OS! A lot of small quality of life bits I was used to on my linux desktop. They're even working on finally deprecating that mess of a control panel!

    The only thing that botheres me, is that the UI is clearly being designed by someone with a football field sized monitor. Luckily scaling it back down is still possible. The same thing plagues gnome as well as some commercial prodiucts I use.

  • You, and 62 other people did not read the article.

  • Steam provides it's own linux userspace runtime. The game developers just target that to avoid the problem you describe.

  • stupidity is a once-off

    🎶 ...this iiiiis my one an only wiiiiiiish! 🎶

  • What is it with the silent T?

  • Permanently Deleted

    Jump
  • Sounds like fun, but I wish we had a real multiplatform GUI framework that does not look like ass and does not perform like ass, so we can put the whole shameful electron era behind us.

  • snob librarian’s thing

    And I couldn't figure out why a certain pirate streaming platform does this. I choose scifi category, and it's filled with fantasy and anime.... Your comment might be a clue as to who's behind the platform. A ring of radical outlaw librarians!

  • Pffft, the young generation, not hardened by the 6 different download buttons on a torrent search engine... /s

  • The only thing worse than public voting is public voting that's falsely advertised as private.

  • uname -a

    Updates depend on the specific distro. Some, like debian, keep the major version the same throughout the entire lifetime, just backporting the security fixes, others, like arch, follows the official major releases more closely.

  • TIL: Some people actually like their laptop to wake up after openning the lid!

    I've used Elitebooks with elementary for years and found the wakup after pressing a button logical.

    What pissed me off about probooks/elitebooks was that they woke up to inform me about the low battery, then went back to sleep due to low battery, then wake up, sleep, wake up, sleep, wake up... and the agony went on until the sweet death. I've never felt so sorry for a non living object before or after.

    Oh, and also elementary can't go to sleep from the lockscreen, on any hardware. One of those those bugs that I'm always sure will be taken care of in the next release, but it never is.

  • you still need good security configuration of the exposed service.

    In a sense that security comes in layers, yes. But in practice, this setup will prevent 100% of bots scanning the internet for exposed services, and absolute majority of possible targeted attacks as well. It's like using any other 3rd party VPN, except there's not a central point for the traffic to flow through.

    From the attackers point of view, nothing is listening there.

    I've used a similar setup in the past to access a device behind a NAT (possibly multiple NATs) and a dynamic IPv4. Looking back, that ISP was a pure nightmare.

  • This is not a guide to hide from the government or ISP. Just a way to tunnel to your home server without publishing the sshd for random strangers. Personally, I'd just publish the ssh and be done with it.

    I would rather live without the correlation attacks

    The more people using Tor, the less useful targeted disconnects become.

  • Which is still just as open, but also a massive calling card for anyone trolling around the TOR network

    Luckily, it is no longer possible to easily sniff the new v3 addresses by deploying a malicious relay. Any attack to even reveal the existence of a hidden service would require a very specialized setup. And we're just talking discovery, not the ability to connect and attack the actual service running there.

  • just connecting to Tor is very much a huge exposure imho

    Exposure of what, to whom?

  • Privacy preserving tool has to prioritize privacy. Otherwise it's actively harming their users. What good would it be for to have an appeal to a larger audience, if it meant sabotaging the main point of the app?

  • Permanently Deleted

    Jump
  • this usually errors out on some missing dependencies.

    apt-get -f install

    should get them and continue with the installation.

    However, as other have said, get an app like gdebi or eddy, and install the .deb throug that.

  • "GhostWrite is the result of an architectural flaw, a hardware bug in the XuanTie C910 and C920 CPU. These are only two of many RISC-V CPUs, but they are widely used for a variety of applications. According to the research team, vulnerable devices include:

    Scaleway Elastic Metal RV1, bare-metal C910 cloud instances

    • Milk-V Pioneer, 64-core desktop/server
    • Lichee Cluster 4A, compute cluster
    • Lichee Book 4A, laptop
    • Lichee Console 4A, tiny laptop
    • Lichee Pocket 4A, gaming console
    • Sipeed Lichee Pi 4A, single-board computer (SBC)
    • Milk-V Meles, SBC
    • BeagleV-Ahead, SBC"

    https://www.tomshardware.com/pc-components/cpus/ghostwrite-vulnerability-exploits-architectural-bug-in-risc-v-cpu-to-gain-root-access

  • Unbacked tokens. You mean like Tether?

    Exactly like Tether. USDT was never backed 1:1 by USD. They don't even try to deny it anymore. They admit it's backed by "various assets, including BTC", which smells like a market manipulation.

    How does Taler promote taxation?

    "Customers can stay anonymous, but merchants can not hide their income through payments with GNU Taler. This helps to avoid tax evasion and money laundering."