Skip Navigation

Posts
5
Comments
251
Joined
2 yr. ago

  • IBM Model M's melting point is too low to protect against people that abuse the pen holder as an ashtray tho, and mine got shipped to me without protective packaging lol. It works, but a bolt mod and a destructive deep clean was necessary. Yes, Model M's can get permanent dents and turn yellow if you put enough lit cigarettes on it. Restoration videos don't show Model M's as abused as this one.

  • Yeah, I also love the pen holder of my IBM Model M. I don't know about others, but I always keep a pen at my desk. So I may as well use the pen holder built into my keyboard.

  • Love to see the pen holder in use :P

  • Damn, if only Austria put that effort into digitization instead of domain seizures that benefit foreign publishers...

  • I Know What You Download From A Select Few Public Trackers We Monitor

  • Software supply chain attacks exist, you know?

  • What you forgot to mention is that someone bought the original piracyisacrime.com domain as printed on your DVD. They made it redirect to The IT Crowd piracy scene :d

  • Pull people off GitHub? I get the impression from others that contributing to Mozilla projects, particularly Firefox, is a painful experience. But afaik one former Mozilla project uses GitHub for everything: Rust, the programming language.

  • I feel like that anger should be directed at the people who made the software, not the people who use it.

    The foolproof solution here is to... give people the option to restore what they deleted without contacting tech support. It's obviously needed.

    Nobody can expect anyone to read multiple warnings asking them if they're really really sure whether they want to perform a reversible action they set out to do.

    That's a textbook example of a poor design that breeds more people desensitized to warnings.

  • I doubt they care about CT checks per se, they’re just afraid that Digicert fucking up will break their critical government services.

    Right... uh. Listen, my government used a local/regional CA. Do you want to know what happened? My government got the privilege to emergency re-issue all of their TLS certificates with a different CA because the local/regional CA forgot to renew its own CA certificate. Everything was down. Government websites, government services, eID SSO authentication, etc. You had one job!

  • Gut-driven design. People could conduct usability tests, but neither their "data-driven" management, marketing, design, nor the development department care about that since it's only "worthless" "additional" workload. Nevermind that usability testing reveals valuable insights about the people the business is supposed to generate value for. Or that usability testing identifies flawed designs before developers write any protoype code, designers draw sketches, etc. Or that usability testing nullifies unnecessary meetings about hypothetical scenarios littered with incorrect assumptions about reality. Usability testing is undervalued.

  • KDE feels like an unpolished Windows desktop to me. I find it difficult to do things the KDE way when everything feels like Windows on first glance, but doesn't 1:1 behave like Windows. It's a disjarring experience for me, and probably others who migrate from Windows to Linux. I also think that Gnome has better touchpad gesture support than KDE, which makes Gnome the logical choice for companies that sell Linux laptops.

  • I see you've never been on the Phoronix forum.

  • Why would the secret services need a front company?

    Governments here must use public tenders to buy services, and they pick the offer with the lowest price. Secret services can eat operational costs to place an extraordinarily competitive bid, but governments usually have anti-spying regulations. Hence, secret services bid with front companies.

    But why bid in the first place, you may ask? eGovernment services are an attractive target due to the sensitive information at stake, and the potential to influence laws related to the eGovernment services. Secret services implement eGovernment services in a way that allows them to gain intelligence.

    But how can they implement services in such a way, you may ask? Ask forgiveness, not permission. Of course, bullshit justifications play an important role here. E2EE? Why do that? Do you not want to scan files that go through the system for viruses? Real justification for why De-Mail stores sensitives emails in plaintext.

    Governments now have the following options:

    • Discard their paid work and forget about the initiative.
    • Discard their paid work and contract someone more expensive than the original bidder.
    • Pass laws to allow how the insecure service operates.

    Remember De-Mail? Yeah, that exists. Exceptions that allow insecure storage of sensitive emails as long as it's De-Mail. Exceptions that allow De-Mail providers to send legally binding emails on behalf of everyone. No, I'm serious. If anybody comprises De-Mail providers, they can practically send legally binding emails on behalf of everyone, as long as they don't leave behind any trails of course.

    But sometimes, like here I suspect, secret services hit the jackpot. They've got such an insecure implementation that the laws required to allow the service to operate nullifies the security of a large portion of the internet. Now, if enforced, they can intercept traffic like they used to back when everyone ran on http without the s. Long live SIGINT.

  • I appreciate universal package formats, but I'm looking for solutions that generate native packages.

  • I'm curious why they want this instead of mTLS certificates? This smells like secret services counseled Europe using a front company. But that wouldn't surprise me, since similar events happened multiple times in the past.

  • dxvk async ftw

  • Nowadays, they close these bug reports as wontfix with the reason that Linux is only unofficially supported through Steam Proton.