Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IR
Posts
0
Comments
210
Joined
6 mo. ago

  • There's not a need to have vaultwarden up all of the time unless you use new devices often or create and modify entries really often. The data is cached on the device and kept encrypted by the app locally. So a little downtime shouldn't be a big issue in the large majority of cases.

  • Permanently Deleted

    Jump
  • Not a new thing, and I can definitely see good uses for this information. What they should have done is made it so that the one being tracked gets a log and real time notification any time someone is tracking them. This would alleviate some of the toxic spying behavior simply by making it transparent rather than covert.

  • A desktop environment is a waste of resources on a system where you'll only use it to install and occasionally upgrade a few server applications. The RAM, CPU power, and electricity used to run the desktop environment could be instead powering another couple of small applications.

    Selfhosting is already inefficient with computing resources just like everyone building their own separate infrastructure in a city is less efficient. Problem is infrastructure is shared ownership whereas most online services are not owned by the users so selfhosting makes sense, but requires extra efficiencies.

  • Not really. I can't think of a major social media software company that isn't exploitative. If that's where their specialty lies, then they either learn new skills which takes time, requires partially resetting your career, and money only to have that company then absorbed by an exploitative big company in a decade and do it all again, or just keep your job that started as a decent company and got corrupted already.

  • Unfortunately, not everyone has a choice in who they work for in end-stage-capitalism. Work is about survival, not ideology. The majority of Americans are not far-right capitalists, but the vast majority of CEOs are, and it's not really possible to survive long enough to start a small business in most of the US without investment from a far-right capitalist or inheritance (usually also from a far-right capitalist family member).

  • I have a separate boot partition so the rest can be encrypted with luks. That's all that's needed in a large majority of scenarios. Most other setups end up needing to resize something at some point which in many cases is a total pain.

    On my primary PC I do have a second hard drive for documents and other long term storage files that I want to access more often than on the NAS. This way it's nearly impossible to lose those files of I reinstall something and it can act as a temporary backup storage for settings files when I do reinstall stuff rather than having a partition that wastes space or runs out of space.

  • It's not that you can't at all, it's just that you'd either need to give up a lot of the functionality of a lot of sites or at least reduce the usability of many sites and your browser or configure whitelist and such for every site manually and deal with breaking changes when websites update.

  • Everyone having to prove they're an adult just means the end of privacy on social media. Tracking everything you do online becomes extremely easy when your real ID is attached to your advertising IDs. And breaches become leaks of more significant data used in age verification.

  • Permanently Deleted

    Jump
  • I think this is a great idea and a great goal. It will take time and the process will not be easy as there's always subjectivity. But I think if you make sure to include everyone, but also don't waffle too much once the subjective stuff is given proper attention, it can be great.

  • How do you connect? Is there a domain? Is that domain used for email or any other way that it might circulate?

    Also, depends on if the IP address was used for something in the past that was useful to target or not. And finally do you use that IP address outbound a lot, like do you connect to a lot of other services, websites, etc. And finally, does your ISP have geolocation blocks or other filters in place?

    It's rare for a process to just scan through all possible IP addresses to find a vulnerable service, there are billions and that would take a very long time. Usually, they use lists of known targets or scan through the addresses owned by certain ISPs. So if you don't have a domain, or that domain is not used for anything else, and you IP address has never gotten on a list in the past, then it's less likely you'll get targeted. But that's no reason to lower your guard. Security through obscurity is only a contributory strategy. Once that obscurity is broken, you're a prime target if anything is vulnerable. New targets get the most attention as they often fix their vulnerabilities once discovered so it has to be used fast, but tend to be the easiest to get lots of goodies out of. Like the person who lives on a side street during trick-or-treat that gives out handfuls of candy to get rid of it fast enough. Once the kids find out, they swarm. Lol

  • Google is a Reddit partner now, so they probably don't want discussion of anything that removes them from the loop, thus privacy is very limited to "privacy from everyone but Google" or whatever corporate blob is currently funding Reddit. This is why Reddit is dead to me, basically it is now all about profit and communities can only exist if they contribute to that goal.

  • It's rarely a good idea to log in as root, doubly so if it's a system with sensitive data or services that could easily be disrupted accidentally. And even more important if multiple users log in. How will you know who broke things to teach them if they don't log in first. The only time I log in to any system as root other than a test system is when I need to sftp to access files or some other system that doesn't have a way to elevate permissions.

  • Even if Copilot was suspended, the idea was put into the heads of managers and executives. My work laptop current has three applications constantly locking files as they track everything I do and every file that gets touched and upload it all to the servers. Git now takes a ridiculous amount of time to check in and push files since it creates tons of small changes to the cached files that a the tracking applications block further changes or uploads until they can record the information. It takes about 30 seconds to a minute to check in a single small file. Something that used to take a second or two at most. Worst part is if I'm in a WebEx meeting, the fighting over caches in it and git and any other processes,often causes deadlocks that crash the machine. I'm constantly apologizing for being late for meetings because the laptop crashed and had to reboot. It's gotten to the point that they finally gave me a much faster laptop rather than just excluding cache and git folders and such from the tracking because the people who want literally everything tracked don't know what cache or git is, much less how much useless data they're gathering or how the AI that analyzes it all is going yo get distracted by the garbage and not find any useful data anyway. Microsoft needs to get in the game to push the others back out.

  • At work we have 6 environments other than production. At home just one. I created a way to ease deployment of the environment from scratch using a k0sctl config and argocd and the data gets backed up regularly if I need to restore that, too.

  • Also, not sure if it's this database or another leaked database, but I get a lot of targeted phishing messages that know exactly what forms I've filed for my wife's family for their immigration over the years. And I've heard similar anecdotes from others. Only started this year, so definitely something this administration has either broken the security of to speed up deportations or possibly purposely allowed to leak to foreign agents and thus their hacking groups.

  • Note that often it's more efficient to move infrequently accessed memory for background tasks to swap rather than having to move that out to swap when something requires the memory causing a delay in loading the application trying to get the RAM, especially on a system with lower total RAM. This is the typical behavior.

    However, if you need background tasks to have more priority than foreground tasks, or it truly is a specific application that shouldn't be using swap and should be quickly accessible at all times, or if you need the disk space, then you might benefit from reducing the swap usage. Otherwise, let it swap out and keep memory available.