Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)EL
Posts
2
Comments
405
Joined
5 yr. ago

  • PLZ Add Publisher Launcher, it's unfair that friends find me on steam and not my super favorite publisher fancy go clicky web 3.0 cloud store with digital lucrative dlc lootboxes for my simple consoomer satiation.

    PLZ make it so if cheats r detect that GameApp.exe explodes the battery in their laptop.

    Scratch that, explode the Solomonite.

  • This is a fascinating concept.

    If files are removed from the Index it would only seem natural that they can be undeleted until their physical address is recycled and overwritten.

    In fact I remember something like this pre Windows 95 era where files were crossed out. Undeleting them was like magic.

    This is why the windows term "Recycle" is more appropriate because the data remains until the space is reused or zero'd out.

    This is the kind of reexamining we need, does our current iteration make sense from an engineering perspective or is it just a evolution of a bunch of archaic stuff from a time that doesn't represent the present tech world at all.

    I would be okay with replacing rm with recycle and shred as their function is more clear in the name.

  • True, I still think it's fair to criticize the package managers and distros for not anticipating this common scenario and having the ability to roll back easily. How many millions of Linux users have experienced this issue? I'll bet a few.

    Debian, Gentoo come from another generation and sometimes it shows, I mean snapshots weren't even a thing yet AFAIK.

  • This was definitely one of my least favorite things when I used Debian.

    It shows that we need to think about how users are performing tasks and how to intuitively make their usage more successful. The OS should try to get out of the way and always have the ability to easily revert in the case of platform failure.

  • Step 1. Built Internet to get away from TV

    Step 2. Corporate Greed TV moves over and ruins Internet.

    Step 3. Build New Internet to escape Old Internet Ruined by TV bloodsuckers.

    Step 4. Go back to step 2 and replace tech names with next itteration.

  • Even owning Smart devices and having them always plugged in may potentially be a vector, Rob did a good breakdown on how this is achieved.

    https://odysee.com/@RobBraxmanTech:6/radio:64

    Did you know that your IOT devices are secretly communicating with each other? This includes IOT devices that are not in your home. Did you know that what your IOT devices do may be transmitted to third parties? Did you know that your TV may also have the capability and may currently be transmitting your activity far and wide?

    There are secret communications occurring between IOT devices using protocols like Bluetooth LE, Zigbee, Thread, 802.15, and LoRa that you likely didn't expect or was not explained when you bought these devices.

    Just like Amazon Echo has been conscripted to work with the Amazon Sidewalk Mesh network, other networks are in operation

  • I think your best bet is to assume that everything you don't control is a vector.

    The modems run binary blobs you don't control.

    A standard modem with a singular hookup to a router is as good as it gets. Maybe you are contemplating the modem as a combo -- if it is also a router and wifi, you can bet the ISP sees that as "Their Network" and not "Your Network" and any WiFi capabilities could be used to reverse hack insecure devices theoretically like smart TV or IoT.

    You could put the modem router combo in a Faraday cage to dampen the signal theoretically.

    That may not be answers to the query but I think the smart short answer is: yes, unless verified no.

    Edit: to go further, theoretically they can capture any traffic and if they get the encryption key decrypt the traffic.

    Or maybe with a quantum computer decrypt with ease. And if you have any leaks or there are backdoors then who knows what the consequences could be, cough cough xz