Tangential note: NIST has collaborated with the NSA, while denying said collaboration. Even currently, there’s suspicions about them collaborating with NSA to chose a non-safe post-quantum E2EE algorithm.
Tangential note: NIST has collaborated with the NSA, while denying said collaboration. Even currently, there’s suspicions about them collaborating with NSA to chose a non-safe post-quantum E2EE algorithm.
That’s the technical explanation for the changes, no an explanation for closing the discussion all together.
@bitwarden bitwarden locked and limited conversation to collaborators
They also locked the thread 16 hours ago (as of writing this comment), with no explanation.
Yes, but both Intel and AMD offer an equivalent (not as mature, though). AMD is FSR and Intel is XeSS
A very useful tip for technical images (i.e., lab report/research): export whatever graph you created as .svg, and do some prettifying touches in InkScape. It is faaaar easier than doing it in code.
Also, always export the .svg, even if you’re not gonna use it. You never know when you want to do a very small correction, and it will save you quite some time.
You can sell it in the second hand market and save the money. Stonks
Disagree. They showed their arguments, and those seem pretty valid to me, even though I disagree. IMO being open, transparent and promoting community discussion is a good sign.
Same here, and I’ve enjoyed it more than my Debian experience.
I’m curious: Is it a bad idea to have iptables
with a default DENY rule? I use a deafult DENY in ufw
, and it uses iptables
under the hood.
Google already gains so much money from their data-mining, privacy-violating spree on almost every person on the Earth. For me, they can burn to the ground, and I’ll very happily take their service free of charge.
For me, it’s not just getting something for free, it is rather a who am I giving this money away?. I’ll happily give Lichess, a Lemmy stance, community projects, FOSS projects, etc. my support, financial or not, but Google, a company I completely view as unmoral, can happily go fuck itself.
View it this way: The Coca-Cola Company killed a bunch of workers in my country (Coca-Cola killings) because they were demanding better working conditions, so I’ll do as much as possible to prevent giving them money, and making them lose money would be quite nice.
Even more, I think it’s basically the only way. Lichess app got removed from vanilla F-Droid because of that.
From Linux, I’ve screen-shared my desktop in the web application for some years without troubles. Not even need to install the app.
You can use Flatseat to config the permissions (including files) that Flatpaks have. It has a nice GUI
I’m very aware of how toxic gaming communities can be, but I don’t see how that refutes my point that Pepe is used with non-hate purposes in the gaming community. Furthermore, I wouldn’t be surprised at all if 90% of the people aren’t aware of Pepe’s relationship with far right, neo-nazis and 4-chan. I still wouldn’t call them any of these words for liking and sharing the frog with the expressive face.
On the other hand, not wanting to deal with people that post/use Pepe in any sort of way is respectable, albeit seems like a giant social bubble to me.
TW: slurs ahead.
This whole thing remins me of “marica” and “maricón”, Spanish words that are used in a few contexts and meanings, the main one bieng “faggot”. Recently, tho, they have increased their popularity in the LGBTQ+ community as a self-describing word, in a “fuck you, homophobics” tone. My point is that dismissing these groups as being too far right over using “maricón” would be devoid of context and interest in others. Note as well I’m not claiming all use of “maricón” is respectable and friendly.
Like the swastika, is not the only use it has. In the gaming/Twitch community, it’s definitely not massively used as a hate symbol.
Even then, AMD, Intel and now Apple CPU chips are suspected to be backdored. NIST has been slow to adapt a standard post-quantun E2EE algorithm, with some rumours of self-sabotage mandated by NSA (like they have already done in the past). The Tor network is extremely vulnerable to traffic correlation by big parties.
Encryption theoretically gives you what you describe, but in reality you still need to put a lot of thrust in things like your own hardware.
Neat post, OP! I think I missed how is Shanon entropy relevant to the calculation. Is it relevant, or was it just a neat extra to add?