IngeniousRocks (They/She)

Blocking people is self care! Especially toxic ones!

  • 0 Posts
  • 83 Comments
Joined 5 months ago
cake
Cake day: December 7th, 2024

help-circle
  • Barely a week later and I had to do the thing. My partner uses LMDE and Nvidia 535 is the newest version in their repos, but we need nvidia 565+ for Kingdom Hearts 3.

    Installing from the website wasn’t as hard as I remember.

    1. Blacklist Nouveau.
    2. As root, without an X server running, run the nvidia*.run file from the website
    3. Follow the prompts.
    4. Verify your initramfs rebuilt correctly before rebooting.
    5. Reboot and enjoy your actually current driver.
    6. Bonus step, restore your Xorg.conf backup because you’re on a multigpu laptop and you just borked the Xorg.conf with the installer so mesa doesn’t end up loading and X ends up dead on summon










  • I know it got a lot of hate at the time, and much of it well deserved, but for many games I think the steam controller was one of the best.

    I quite enjoyed mine for Rocket League back in the day, the remappable controls were quite nice.

    Currently I use a SCUF DS4 for my Linux gaming and while I love the Controller in theory, the inability to remap the paddles to a custom button chord instead of just a button that’s already on the controller is frustrating.

    Steam Controller 2 is on my must buy list.


  • Ehhhh I disagree that package managers handle cleanup correctly, I’ve certainly had tons of dotfiles left in ~/ mucking things up when reinstalling apps, even those that have been purged by package managers.

    The package manager, much like the windows installer/uninstaller, relies on the developer to be responsible in declaring how the package is meant to be managed. If users have manual steps at installation, they will have manual steps at uninstallation as well.







  • Since you seem to understand it then:

    How do two clients communicsting over a proprietary network negotiate an end to end encrypted chat channel without sharing keys in an easily decrypted manner?

    It seems to me that some kind of handshake needs to occur where the clients need to agree on a cypher, so how does this happen securely?

    I’m not worried about encryption being broken, it just seems like if you’re handing the keys over the mail, it’s pretty easy to xray the package and copy the key, is the same not true over digital communication?