Skip Navigation

Posts
7
Comments
813
Joined
2 yr. ago

  • I think user friendly distros (like Mint) are very user friendly if you're just doing simple things like web browsing or using Steam. Mint (and other distros) have a realy nice software centre that can install a lot of software with a single click from https://flathub.org/ , which removes a lot of headaches that there used to be with installing software.

    However, when things go wrong (which they do sometimes because computers are complicated), you may have to troubleshoot and play around with the command line.

    ... But that's honestly happened a lot with Windows in my experience as well. Only with less command line and more running esoteric exes.

    Honestly, given that most Linux distros are free anyway, you may as well try it out and see if everything works. Worst comes to worst, you find something doesn't work and end up installing Windows over the top of it.

  • I think realistically any software you'd want to install as a flatpak would otherwise only be available as a package for a specific version of Ubuntu. Flatpak gives devs a way to package proprietary or cutting edge software in a distro-agnostic way, which is a good selling point for them. It's also nicer than managing apt repos and ppas.

    The extra space usage is annoying, but it's not that big a deal. My mint install with a few flatpaks is still smaller than my Windows install.

  • I have a server that has multiple services running under multiple users that each store data. I want to be able to bundle all this data up and send it to another server for backups.

    At a high level, how do I manage permissions for this? Currently I run the backup as root, then chown it to a special backups user which can log in through ssh. But this all feels clunky to me.

  • I've been using Sidebery. Decent little addon for a tab sidebar.

  • Was before my time, but iirc C and other (then) high level languages were supposedly able to put programmers out of jobs.

  • Could an ant sized lion actually hurt you? Their teeth are built to wrap around and grip thinner pieces of the body. If they are shrunk down, I don't know how efficiently they could work their way through skin. It'd be like trying to bite a wall or something.

  • Anything involving safety.

    As an example: Phone or laptop batteries.

  • Tbh I'm kind of worried seeing a software group get into hardware. There are a lot of hidden costs and production issues which provide difficult challenges. I hope they succeed, but I worry this will just flop and cost them a lot of money.

  • Oh wow, in the opening paragraph they say that there's a huge conspiracy covering up the "truth" behind Cosmic's reception. And that they are the one voice of reason to enlighten people about The Truth...

  • Was bullied constantly by other people in high school. Caused a lot of trauma I'm still trying to solve...

  • My understanding is that at least some WoW players switched to ffxiv, which does seem to be popular and well updated. If you're looking for a new game, might be worth a look?

  • I mean, at least I'm not paying $200* for the privilege of being advertised to... I'd like an option to disable it permanently in the popup but it seems mostly reasonable?

    \* This is the first price I got for a Windows licence when I searched for it. I know you can probably get them cheaper, but that's the price they're advertising, so eh.

  • They could open up the laptop to insert a small device that reads the usb header. Or just replace the guts of the laptop with something else. Or replace one of the usb leads in your bag with one with a tracker. Or sell a usb-c cable with a tracker for cheap in the gift shop.

    There's a bunch of other ways to compromise your system and some might be easier than putting a backdoored bootloader on your device.

    Also, if it's the TSA, they could almost certainly create a bootloader that was signed by Microsoft to replace any existing one.

  • Okay, so my original post I think I was thinking of TPM rather than Secure Boot. TPM would protect against a hostile OS, I think. I think most of my greviences mentioned above are to do with TPM rather than Secure Boot. But they still apply to either.

    There are ways to put keyloggers in devices stealthily to where they're not perceptible to a normal person. For example, they could replace one of the USB leads in your bag with one that transmits keystrokes over bluetooth. If you're at home, a maid could just plug a keylogger behind your desktop because most people don't check behind their system when they boot it.

    It all feels like a wierd threat model to me. You can either assume that physical access is or isn't covered by it. If you are worried about physical access (beyond your device being stolen), there is a lot more you need to do to secure it. "It's better than nothing" isn't really that convincing to me with regards security models; either you're protected or you aren't.

  • On a video in a video list page there should be a "..." menu next to the title. It has options for "hiding" the video and "don't recommend channel". I can't comment on how effective those are, but they might give the algorithm some hints about what you want to watch.

    In addition, if you have stuff on your watch history that you don't want to see more of, you can go to https://www.youtube.com/feed/history and remove them. Allegedly that stops them being used to decide what videos are recommended.

  • So I interpreted this question differently to most other people here, interestingly enough.

    So when you call someone, on your headset, you hear a ringing dial tone thingie as the phone "rings" on their end. The question is: If their phone is on silent, do you still hear that noise on your headset?

    I imagine so - it's probably used for many automated systems to detect when you pick up or similar.

  • The thing is... If someone has access to your system enough to replace your bootloader, they could probably just slip a USB keylogger between your keyboard and computer. Or set up a small hidden camera. Or plug all your devices into a raspberry pi to spoof the login screen.

    It strikes me as odd that people assume that an attacker with a few hours physical access is going to bother going down the "change the bootloader" route when there are other, easier routes available.

    Ironically, the only practical use case I can see for Secure Boot is when you have a dual boot setup where you don't trust one of the OSes. Which I'm betting wasn't Microsoft's intention at all.

  • I have my home folder encrypted and I enter my password on boot. I'm not really sure what benefits Secure Boot has in environments where you have to enter your password anyway. And in environments where you don't have to enter your password, someone could just steal your system anyway and boot it to get your data.

  • So... How would a requirement to testify be enforced? If witnesses were thrown in jail for not testifying, couldn't cops use that to threaten a "witness" into making a false statement?

    How would you tell a witness who was hiding something from a witness who didn't see anything?