Thanks for elaborating. Very much appreciated!
Thanks for elaborating. Very much appreciated!
People still think this is a suicide pod, while it is used by robots to generate electricity.
How is this type of shading called?
I like it very much, as it is a type of shade you cannot achieve with an algorithm (at least not that easy and perfectly). Would love to have a tattoo like that.
Wayland 1.0 was released in 2012.
Now, 12 years later, it still is not production ready. I lost hopes long ago and rather stick to a security flawed but stable X11.
I am very glad with the proposal of the Frog protocol, as Wayland was dead before it could even walk.
Only because he had no windows
Yeah the Open Source version. I doubt that the hosted version is using that. Cloud providers have super fast DB’s that are basically compatible with the MySQL syntax
Well, who is using mysql/mariadb nowadays anyways? If you haven’t made the switch to at least postgres in the past 5 years, you messed up anyways.
Is this the only point, when it comes to security? In my experience, the ease of use is also a factor. Today, VPN clients are just one button and it runs. I2P is almost there, but requires you to setup some configs manually. So is it really worth to drive a tank to just go grocery shopping?
Tomorrow passwords will be cracked in no time, because most algorithms are not quantum safe. Same with password length.
I never said it is not an attack vector. There are dozens if not hundreds. The question is about the probability, which is always a dimension if you manage risks. There is no need to list all theoretical possible attack vectors, if the probability of actually happening only affects 2 people on this planet.
Videos for educational purposes should not sensationalize unlikely attacks, as it only causes unnecessary fear. I’d rather have someone using torrent on VPN than not using anything at all because they are now afraid of the government.
That’s not what I was talking about?
If someone is actually trying to convict you just based on the correlation of the connection times, you probably don’t just share a copyrighted movie. So why mentioning this as an actual threat in the first place?
I‘ve used Android and iPhones for multiple years. Now I am using an iPhone and I am very happy. Main reasons are build quality and software. It just works. And the main advantage is primarily if you use multiple Apple devices. And since Android phones are expensive as fuck, too, I don’t care about the price anymore
And in a parallel universe, a flat planet contains a lot of sphere earthers.
No matter how intelligent and advanced your species is, we all are poisoned by decisions that questions if evolution is really a working concept.
(…) are you trying to help government agencies perfect spying? sounds very cringe ngl
Tell me again which part of your reply is telling me, you are actually interested in an objective discussion, without assuming things and wanting to start a fight for no reason.
I struggle to find that part.
Lovely, thank you very much, kind stranger!
I don’t think my reply was hostile, I just criticized your behavior assuming things, before you know the whole truth. I kept everything neutral and didn’t have the urge to have a discussion with someone already on edge. I hope you understand and also learn that not everything is entirely evil in this world. Please stay curious - don’t assume.
Typical hexbear reply lol
Unfortunately, you are right, though. Science can be political. My science is not. I like my bubble.
It looks nice, but honestly, once I set up everything (which I do on each of the *arr anyways), there is nothing left to be managed. That‘s the whole point of this setup, to get rid of managing things manually.
So even if I love that project and am very appreciative for all the work, I don’t have any use case in my setup that would want me to use this.