Shit, that’s where my sex drive went. Can I have it back please?
Shit, that’s where my sex drive went. Can I have it back please?
Maybe confused with xz
: https://nvd.nist.gov/vuln/detail/CVE-2024-3094 ?
Bah, real power users only need a magnet and a pin.
Linux is whatever the Linux Mark Institute says it is.
You don’t need reproducible builds. You can get by if you trust whoever compiled it, like your distro’s maintainers or the pidgin developers.
The risk of mis-ordering your layers is a security issue.
There are two ways to layer a VPN and tor:
In the first option, you gain little. Tor already encrypts your traffic, so your ISP can’t see inside them. Technically, Tor over a VPN hides the fact that you’re using Tor from your ISP, but Tor’s snowflake does something similar if you need that.
In the second option, you’re revealing your VPN account information, which could theoretically be associated back to you. Tor adds nothing over just a VPN in this case.
Don’t mix tor plus VPN.
If you’re using tor browser without tor for some reason, carry on.
Copyleft means: “if you modify the program and share it, you also have to include the source code for your modifications.”
The owner of the copyright (usually the developers or their employer) can still change the license later.
First, same advice as everyone else. Change your passwords. Password managers are great. I like keepass.
Regarding the email, this looks like a Hotmail/Microsoft/Outlook account. Their security page sucks ass. It lists every time someone unsuccessfully tries to log in. “Unsuccessfully” as in they tried your email with an incorrect password. Of course hackers are going to try to break into your account. You really only need to worry about successful logins that aren’t you.
It’s FOSS. It’s pretty normal for it to be a passion project or a community effort.
Let me preface this by saying I don’t see the value of 99% of NFTs either, but it is technically possible to make one that stores the image on the blockchain or on IPFS. Most don’t, obviously, but it is possible.
I am aware. What processing is only possible in the cloud, and not locally?
Edit: My apologies, I didn’t realize you weren’t the same person I originally replied to. Please disregard!
Until homeomorphic encryption becomes a thing, cloud can’t be secure or private.
Why do you need homeomorphic encryption? Isn’t client-side encryption good enough for most use cases?
There’s a whole sexual kink associated with those collars. I’m just sayin’
Mailing lists are pretty awesome. They’re like a decentralized forum. There are even good web UIs!
That said, submitting and reviewing patches over email suuucks.
Watching TNG for the first time now and loving it way more than Disco :)
There’s so much to look forward to! It is a bit dated and I watch it through rose-colored glasses, but even with that in mind, it’s a good show.
Using your shared libraries is always a good thing, no? Like your distro’s packages should always have the latest security fixes and such, while flatpaks require a separate upgrade path.
Access to your entire filesystem, however, I agree with you on.
Of course. I just think it’s important to mention that there are societal reasons why there is a higher percentage compared to the general population of qualified whites applying for a job.
I run Gentoo as my main distro, and have for a couple years now. It’s a pretty stable rolling release (IMO more stable than Arch), and since you’re already an advanced user, the experience should be pretty rewarding!
The wiki is great, and the installation handbook is top notch.
You get to control exactly what features each package is compiled with, so no bloat at all.
KDE 6 just landed too!