If the bottom can be seen at all that is completely unacceptable.
- 1 Post
- 251 Comments
If a ceiling fan is on one of my boys will hide under chairs and couches and basically just skirt around from cover to cover. I think he thinks it is a bird.
poweroff
orshutdown
will work on almost every distro. Even systemd ones (they are usually symlinks but doesn’t really matter because they work).
Huh?
I’ve used Vim for a decade and I would be offended if it made any noise.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Is Firefox still the recommended browser of choice here?English201·4 months agoI still recommend it. I’m not fully happy with the situation but for now I consider it my best option.
- I consider Chromium-based browsers out of the question as they give too much power to Google. This is already showing to be a problem with new APIs and “features” that Google is pushing into the web platform and the bigger the market share gets the more control they have.
- Web browsers are the biggest attack surface that most people have. Displaying untrusted webpages and running untrusted code is incredibly difficult and vulnerabilities are regularly discovered. I don’t yet know a Firefox fork that I trust enough to reliably respond to security vulnerabilities quickly and correctly.
So for now I am staying with raw Firefox. Not to mention that as a disto-built Firefox I have some insulation from Mozilla’s ToS. But I am very much considering some of the forks, especially the ones that are very light with patches and are mostly configuration tweaks.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•PSA/HOWTO: Avoid fake mkv torrents. Avoid getting hackedEnglish1·4 months agoWine will mount your root folder as a Windows drive by default. So if the malware is scanning all connected drives and encrypting/uploading them you still have a problem.
kevincox@lemmy.mlto Privacy@lemmy.ml•What do you think about using Beeper just for SMS?3·4 months agoIt’s definitely an option. It will do the things that you want (as long as your phone is online, but that is the same for any other solution).
sending Signal messages with it would be less secure
Yes, this is because Beeper converts the Signal protocol to the Matrix protocol and vice versa. In order to do this it needs to access the messages. So it needs to decrypt the messages, then re-encrypt them on the other side. This means that the bridge (in this case operated by Beeper) has access to your messages. This is often referred to as “end-to-bridge” encryption, as it isn’t end-to-end anymore.
This is going to be true of any bridge you use that is hosted by a third party. You are always adding one additional trusted party into your communication.
the recommended bridge instructions sends me over to Beeper, since I don’t have my own server
Yes, to practically operate a bridge you need your own Matrix server. This is because the bridge will create a new Matrix user for every remote participant (every phone number you communicate with in this case). Doing this with regular mechanisms would be difficult (as signup is likely restricted in some ways) and inefficient (as each account would need to be checked for new messages separately). Beeper runs their own homeserver so that they can operate their bridges. However Beeper’s bridges are only available to users on the same homeserver (this is not a protocol limitation, just their choice). So in order to use their bridges you need to make an account with them (which you can, it is free IIUC). Beeper also offers custom clients which have special features for interacting with their bridges (for example making it easier to start a conversation with a new phone number).
The alternative would be to run your own server and bridge (or hire someone to it on your behalf).
kevincox@lemmy.mlto Linux@programming.dev•Firefox 137 To Support HEVC/H.265 Video Playback On Linux With VA-API30·4 months agoThis was intentional. The goal was to discourage the adoption of non-free codecs. They were partially successful, now AV1 is very widely supported (basically only older iThings that don’t have hardware decoding support don’t support it) which is a huge win because anyone can now deliver video on the web without needing a license to a proprietary codec. I would consider this fact alone a huge benefit and worth them holding other browsers asses to the flame.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Finally got a copyright warning from ISP - ReminderEnglish2·4 months agoOops, I linked the wrong one and got fooled because the most recent post is actually open again.
!opensignups@lemmy.ml is more active. (Although not bustling either)
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Finally got a copyright warning from ISP - ReminderEnglish1·4 months ago!opensignups@lemmy.world is active enough.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Finally got a copyright warning from ISP - ReminderEnglish3·4 months agoYeah, public trackers definitely raise your chance of a notice by at least an order of magnitude. New content also tends to be more noisy than old content. I also found a drop by selecting “require encryption” although I can’t imagine why it would help (IIUC most of these scanners just connect to everyone in the swarm, not sniff random internet traffic.
kevincox@lemmy.mlto Selfhosted@lemmy.world•Which reverse proxy do you use/recommend?English4·4 months agoI’ve been using nginx forever. It works, I can do almost everything I want, even if more complex things sometimes require some contortions. I’m not sure I would pick it again if starting from scratch, but I have no problems that are worth switching for.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Broken mp4 files?English7·4 months agoThe most likely situation is that the torrent isn’t good. I would also force a recheck of the torrent to double-check that the files on your disk haven’t been corrupted. But if that file is still saying “0 B” remaining (don’t just look at 100% as it may be rounded) after the recheck then I would bet pretty good money on a broken torrent. If this is a public tracker it is fairly common.
However even if it is broken you may be able to play by using a different players. Different apps can skip over different forms of corruption, so you may get lucky.
Nice. There were a few comics that I followed on Twitter due to lack of them posting other places. But it is nice to know that if I find another account that I am actually interested in I will be able to get a feed.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Why is the IPTV scene such a toxic shit hole?English18·5 months agoIf you don’t need to watch Jeopardy live it is pretty readily available via torrents. Probably in better quality and without ads.
Sports are much harder to find. There are trackers but they are much harder to get into and I can’t attest to the completeness (I’m not really into sports) and watching it live is probably more relevant.
kevincox@lemmy.mlto Privacy@lemmy.ml•Bank account requiring Google play account, how to bypass ?3·5 months agoThis is my strategy. If I can’t bank on the website I find a new bank.
kevincox@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Port forwarding and VPNEnglish22·5 months agoThe main issue is accepting incoming connections. When you are behind a NAT (as most VPNs are for IPv4) you need some solution (such as port-forwarding) to make your torrent client connectable. This causes a number of issues when torrenting.
- When someone starts a download they will try to connect to the seeders. If the seeders are not connectable this will fail.
- As a fallback when the seeders notice the leachers they will try to connect to them. If the leacher also isn’t connectable this will also fail.
If neither party is connectable the download can’t happen, so you may fail to get content that you want.
This is extra relevant if you are on private trackers where seeding is tracked, has direct value and is competitive. If you are not connectable every new downloader will immediately connect to the connectable seeders and finish the download before your client even knows that they exist. (reannounces for seeders can be very infrequent, such as hourly, so it will take an average of 30min for you to notice a new seeder and try to connect to them). This makes it very difficult to acquire much upload unless there are very few other seeders.
NAT is evil, all hail IPv6.
#1 items should be backups. (Well maybe #2 so that you have something to back up, but don’t delete the source data until the backups are running.)
You need offsite backups, and ideally multiple locations.
kevincox@lemmy.mlto Privacy@lemmy.ml•Is using an Matrix account from matrix.org private and secure enough to talk with my family members and people in general?3·5 months agoThat isn’t what that document says. It says that they can impersonate you in non-E2EE scenarios. The clients I use warn me when a message isn’t properly encrypted so someone without E2EE keys can’t impersonate someone in an E2EE room.
That being said the general concept is a problem. I would love to see progress where all events from a user are signed by a device key and non-forgable. There is some thinking about this with portable identities (such as MSC2787) where you server is basically just storing and forwarding events but the root of trust is your identity and keys that you control. But none of this will land soon, not for many years.
While I agree, I think that getting more games on Linux is far more useful. When Linux is almost 3% very few studios will care much. If they can do a small bit of testing on Proton and maybe work around a bug or two they are far more likely to do that then make and test a native build. If this then gets Linux usage to 5, 10 or 20% that will drive more native builds.
So I agree that it somewhat reduces the incentive to release a native build. But I think that is outweighed by the benefits of making the Linux gaming experience better today which will have a greater impact on availability of native builds in the future.