Shit, that’s where my sex drive went. Can I have it back please?
Shit, that’s where my sex drive went. Can I have it back please?
The missing word is “boob”, for the record.
Bah, real power users only need a magnet and a pin.
Linux is whatever the Linux Mark Institute says it is.
You don’t need reproducible builds. You can get by if you trust whoever compiled it, like your distro’s maintainers or the pidgin developers.
The risk of mis-ordering your layers is a security issue.
There are two ways to layer a VPN and tor:
In the first option, you gain little. Tor already encrypts your traffic, so your ISP can’t see inside them. Technically, Tor over a VPN hides the fact that you’re using Tor from your ISP, but Tor’s snowflake does something similar if you need that.
In the second option, you’re revealing your VPN account information, which could theoretically be associated back to you. Tor adds nothing over just a VPN in this case.
Don’t mix tor plus VPN.
If you’re using tor browser without tor for some reason, carry on.
Copyleft means: “if you modify the program and share it, you also have to include the source code for your modifications.”
The owner of the copyright (usually the developers or their employer) can still change the license later.
Sunny with a zero percent chance of an original joke.
Eh, it’s also much easier to slap a client-side detector on because you can use generic detection methods. When you’re doing it server-side, you have to rely a lot on statistical analysis and it’s all game specific.
In the end you can, of course, reduce it all to not shelling out money, but there is some nuance too.
Let me preface this by saying I don’t see the value of 99% of NFTs either, but it is technically possible to make one that stores the image on the blockchain or on IPFS. Most don’t, obviously, but it is possible.
That’s absolutely true. What’s hard and what’s easy in programming is so completely foreign to non-programmers.
Wait, you can guess my password in under a week but you can’t figure out how to pack a knapsack?
Right? That’s the thing. Car thieves don’t care if the tool is illegal; they’re already planning on stealing a car.
If you make the tool illegal, you’re just making it harder for security experts who do care about the law.
Corrupted initramfs?
Yes we should allow them, because the problem isn’t that this tool is available. The problem is that cars and other devices aren’t more secure.
If you broke into a bank vault with a screwdriver, you don’t ban screwdrivers; you get mad at the bank.
I’d like Gentoo ebuilds to run in a fully isolated namespace/container with only the dependencies explicitly enabled by portage configuration. Something like a mix of nix but with the ebuild syntax.
You use cards for offline authentication (bars/festivals/etc.), and use a different process for online authentication.
Proving someone has the physical card in their possession (which is what a reader does) isn’t really useful for proving identity when you can’t also check the picture.
I run Gentoo as my main distro, and have for a couple years now. It’s a pretty stable rolling release (IMO more stable than Arch), and since you’re already an advanced user, the experience should be pretty rewarding!
The wiki is great, and the installation handbook is top notch.
You get to control exactly what features each package is compiled with, so no bloat at all.
KDE 6 just landed too!