• 0 Posts
  • 58 Comments
Joined 1Y ago
cake
Cake day: Jun 12, 2023

help-circle
rss

That’s rookie numbers. My collection of cat pics is about 2 TB. Individual files are reasonable size of course. Clearly nothing can be hidden there.


Broken As Designed is generally broken by default, yes.


Boomers watch broadcast TV. It’s what they grew up with.


So they have also no idea how email works or this was political and the bombing was just a convenient excuse.


The most important answer seems to be missing:

You don’t need to do any distro hopping or even care. Unless you picked a dead one or need something really obscure. They all have the same things and you can install anything on anything. Mostly. Difference is who’s doing your installer and packaging and security and how.

You can, if you want to. And live systems are handy. Try what your like. Learn to change what you don’t. All the tools and docs people have are out there for you and tens of thousands of people are busy making more.


There is a truly baffling amount of people who imagine that Microsoft has suddenly turned into a good company.


Never heard and don’t know any users. I suspect I’m not alone.




Just filtering DNS will not block telemetry. Might block some, but no.





I don’t nas, but I suggest a combination of offline drives, cloud services or remote hosts, and just ignoring data that is easy to recreate like builds and software installs.

The key is to keep the data organized in such a way that you know which parts deserve which strategy.


In a lot of places, a prepaid is just something you can buy, cash, in a shop. No papers please.



I read the title and thought it’s a nazi post about what countries should do instead of being in the union. Sad thing is, these are real.



Any sane country should make a “for the children” or other bs justifications in law or policy proposals immediately punishable.


They’re probably from the “all publicity is good publicity” school of marketing.


Ingsoc is here. It’s just more dull and pervasive and creepy than the flashy story version.


Which means pretty much nothing without also considering who has the encryption keys and who controls the ends.


You don’t. You back things up before they break. Then when they break, you have backups for recovery.

Just stating the obvious, in a vain hope that it would get someone to start, improve, or test, or even just think about their backups.


For some use cases, perhaps. I do trust them to keel over as soon as anything looking like an authority sends a request. I don’t trust them to be as good as their marketing.

No news about scams or particularly evil policies yet, which is far better than many providers.



Brave is a series scammer and every few days somebody seems to be posting about it on Lemmy. It’s really looking like an ad campaign.


If it’s a bot then why the spelling errors?

I simply answered that. Bot output can have spelling errors. Nothing more was said or implied.




They can block or throttle clients that don’t look like what they want. And often do.

They could also start requiring some click path or captcha etc that is hard to script. Or even login (registration is free!). And “DRM”.


When randomly combining two things, it’s usually more reasonable to assume you’ll get the worst parts of both rather than the best. Especially when concerning safety, security, privacy, or other weakest link type endeavours.


Companies also advertise e2ee while they generate and store the encryption keys on their server. So, it is encrypted all the way, but still easy enough to decrypt when needed. Very technically feasible and still strong against third parties.


Brave is a series scammer and somebody keeps spamming posts about it all over.


It also makes it easy to plant evidence which will not be questioned and which leads to an automatic lynching process.



Modern system on chip type processors and their RAM and even ROM are pretty rightly coupled. Modem also. Upgrade would essentially be a full board swap.

Which would be a neat feature, but probably hard to make happen.


I suspect the question isn’t just how sharp or high res or low distortion or whatever your pictures are, but how fast will the camera open and take a picture and how many of those pictures are good enough given the range of lighting and distance people want quick pics of.

If you miss a lot of shots because the camera is too slow or crashes or the files are blurry, text unreadable, out of focus, badly exposed… failures of any kind, then the camera is not usable. That’s still not uncommon in phones.

Lots of people are starting to figure out how useful being able to take a picture at a moment’s notice is.


That’s not juicy enough to reveal they’re listening.


Security and privacy are much like hygiene and responsibility. If someone close to you doesn’t have any, it will put you in risk as well.


There’s a button for that: ⬆️