Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IR
Posts
0
Comments
212
Joined
6 mo. ago

  • I think it's unlikely to be enforced for normal use. If you use them for spam or to store a ton of data or some other abusive usage, they might shit down your accounts, but it would be pretty customer-unfriendly to do that for someone with just two accounts and not abusing it. Most privacy respecting services are too young to have gotten to the screw customers, only short-term profit phase of capitalism.

  • I don't think it's Rust exactly. I think Rust is just newer and this attracts developers with less experience with licensing. It's not really something developers want to think about very much so they often just use the default. Heck, most code on github, etc., didn't have any licenses at all for a really long time until businesses realized they couldn't use the code without them due to copyright laws being applied by default but patents not being default in many countries, etc.

    There are consequences to using copyleft as opposed to more permissive libre licenses, and vice versa, that may not be well understood by a lot of developers in general until they get into a situation where it matters. Either their code can't be used by people they wanted to sue it, or companies are abusing the code without proper attribution, etc.

  • Permanently Deleted

    Jump
  • Censorship isn't bad in itself. It's a necessary evil just like imprisoning someone who imprisons others. Both are removing freedom, but one was for the benefit of an individual and the other is for the benefit of everyone else in the society. Regulation of freedoms is always necessary.

    Problem is these days the far-right tries to say all regulation is too costly. But if one innocent person loses their rights compared to millions of innocent people losing their lives, its a big difference. Similarly, someone abusing their right to speak losing their right is not the same as someone using their right to speak responsibly, losing it.

  • Depends on what you're backing up. Is it configs for applications, images, video, etc? If it's application configs, you can set up those applications in a virtual machine and have a process run that starts the machine, restores the configs, and makes sure the applications start or whatever other tests you want. There are applications for doing that.

    If it's images or videos, you can create a script to randomly pick a few, restore them, and check the integrity of the files. Usually just a check of the file header (first few bytes of the file) will tell you if it's an image or video type of file and maybe a check on the file size to make sure it's not an unreasonably small size, like a video that's only 100 bytes or something.

    All this seems like overkill though in most scenarios.

  • Last time I checked, it depended on where you live and if the laws in that area require them to allow you to delete certain information. It's on the a cache thing, it's in your account. You can set up a new account, but if you use other Meta applications like Facebook, WhatsApp, Threads, etc, you may have to abandon those as well.

    Might be possible to use a VPN or something to pretend to be in a country that they allow to have more detailed deletion of data, but I'm not totally sure if it's just your current location or if the account has to have been created in that location or of you can change your account-level location, etc.

  • Generally the key fobs have a circuit and antenna inside and the circuit has a code that it broadcasts when it is near the transceiver. Some systems are more complex, but at the lowest level the system disrupts a magnetic field around the transceiver in a certain way to generate the code or is powered up by the transceiver and transmits the code using that power. That way no battery is required and it can fit inside a thin card or fob. Some older ones have a very small battery to increase range or create a more complex or modifiable code or for proximity use rather than touch.

    That code is then authorized or not to open the door in the security system. And yes every time the fob is used, it is logged. And depending on if the fob has a battery, it is possible it tracks leaving. If they don't have to touch the fob to a panel and just need to have it on them, then it logs any time they approach the door regardless of entering or leaving. If it requires touching or bringing it close to a panel and they don't have to do that when leaving then it probably doesn't log them by proximity.

    Whether or not the log has the person's name or just the code or ID of the fob depends on how old or cheap the system is. But there's definitely some document somewhere that lists the peoples' names and which fob they were assigned if it's not in the system. So it's easy enough to find out.

    Any system that has the same code in every fob would be either super old or super cheap and unlikely to be used on secure doors. Having unique codes means that if a fob is lost or stolen it can be deactivated among other things. Which is a no-brainer for security if there is no real significant cost. The only reason older systems didn't is because the tech couldn't create long enough codes on the circuits that existed. And super cheap systems don't want to create too many different codes since it's cheaper to mass produce the same one over and over. Basically why car fobs can often open other people's cars. Either they're old or the car company's too cheap and it's not their security at risk, so they don't care.

  • If you want to keep your LDAP as the source of truth, then Keycloak is also a very good option. I did that originally, but decided I only had a couple of things needing LDAP and that wasn't worth keeping it around. Authentik was a good way to emulate an LDAP but with a different back end. But Keycloak is definitely my recommendation in your case.

  • Keycloak. Took me a bit to learn the basics, but it has been way easier to troubleshoot than Authentik and has more features. If you need something that mimics LDAP rather than syncing with an existing LDAP, then Authentik is pretty good. I don't use LDAP, though.

  • Most could, but most are also designed not to because adding a virtualization type of layer allows for ways to circumvent it. Anticheat needs to trust the environment it is running in so it can rely on the information. Wine is designed to replicate things it trusts in Windows, but not actually necessarily replicate the way the kernel actually does those things, so the things they are relying on might not mean the same thing as the do in Windows. So they'd need to analyze and possibly implement things a bit differently. This takes time and money and for companies like this, the customer isn't the user, so they have little reason to cater to users needs. Pro gaming and a few online game companies are their primary customers and they generally don't want to support Linux anyway.

  • Usually it uses your IP address first, bit it's not the only information in cases where the IP address is a known VPN or similar. Are you saying you were tunneling over TOR the first time?

    When you switched to VPN you didn't mention what browser. If it's one that supports advertising IDs, that could be used, for example.

    And when you connected to copilot did you get a captcha popup? If so, did you have to actually solve a captcha or click a button? If not, then it likely is getting information from somewhere that you are trustworthy.

    Clear all browser data, make sure enhanced tracking protection is not disabled for the site. Go to a site that tells your IP address and verify it's the Tor endpoint to verify the setup there is correct. Then try again.

    Also, assuming you're not clicking through any popups to allow tracking info or logging in to any accounts on this browser beforehand. If you log into a Microsoft account or any other account for a site that Microsoft gets info from first, it can use those logins to track you. You can disable this in the browser, but so many sites will break without it.

  • Nope it doesn't add anything for me. The _netdev option tells mount to wait until the network is connected before attempting to mount. And the nofail option tells it not to error or block the process that called it if the mount doesn't work or is delayed.

    Now if the mount contains your etc or other critical config files, it could cause problems and maybe you want to wait, so don't want the nofail. And of course this kind of thing is somewhat OS specific depending on what boot system and service manager, etc., is used, so YMMV, but on Fedora, Rocky, and Ubuntu, it has worked for me for many years.

  • Try adding the nofail and _netdev options in your fstab entry. I have this on a few computers that connect to nfs shares including my laptop that obviously can only connect when I'm at home or on VPN. Example:

    server:/path /mnt/path nfs4 defaults,nofail,_netdev 0 0

  • I haven't used OpenSUSE before, but I don't really experience those issues, though I don't use caps lock that way. I use Fedora with Plasma for desktop these days since Ubuntu is heading too corporate for my taste and plain Debian is missing too much hardware support. I'm sure Fedora will eventually, too, but I also use Rocky on all of my server installs so I prefer RHEL-based over Debian-based, for consistency anyway. Install and setup has always been smooth for me. The Discover app is there for installing stuff. It lags a lot, but otherwise makes installing things pretty easy. I'm sure there must be an equivalent for OpenSUSE. That said, Linux does rely on the command line a lot more than windows. In Windows the command line is bolted on, but in Linux it's more that the GUI is bolted on, though that has smoothed quite a bit and even on Windows the v7 powershell has smoothed out command line a little bit even if powershell commands aren't that intuitive IMHO. At least this version understands some dos formatted commands. I use Windows 11 for work.

  • I never used Twitter really because Facebook filled that need and more. I might eventually go to Friendica, or at least have considered it. Basically, at the time, I was looking for two kinds of communication/conversation. One topic based and one user based. The user based side has two parts, friends and content producers. Since i don't have many friends on the fediverse, that side isn't as easy to fulfill. Lemmy covers the topic based, and Mastodon covers the user based for content producers well. If I get more friends converted, I'd probably be more interested in Friendica.

  • Primarily Lemmy and Mastodon to replace Reddit and Facebook respectively. Those are the only social media platforms I used extensively, really, anyway. And I'm hosting a Mobilizon instance to replace the lost event organizing of Facebook that moved to chat rooms on Signal for now.

  • I use Arthurian legend related stuff. Servers and desktops are locations. My portable devices are the names of swords. IoT devices are more explicitly descriptive since I won't need to type in, but it's more important to recognize them when I see them, like lightswitch-livingroom.