

Yep, and then there’s probably a good number of people who have no idea of threat modelling who just copy those actions to say they have “good privacy”.
Tbh, I’m closer to the latter.
Yep, and then there’s probably a good number of people who have no idea of threat modelling who just copy those actions to say they have “good privacy”.
Tbh, I’m closer to the latter.
There will be tougher usecases to migrate. Which, depends on how you use Google.
For example, I’ve never read Google News but am having trouble replacing Keep for synced, widgeted notes (groceries etc) on phone, as well as GSheets for synced, collaborative excel-like sheets with good mobile UX.
Also, I would bundle mail and calendar in one (it’s a single button to import both in Proton and those services are tightly coupled) and check your duplicate browser/chrome mentions
The article says it can debug TUIs, similar to what the browser’s debug panel does for web apps. That is useful for TUI developers.
Other than that, I don’t know either what Kitty is missing.
Finally, the end of “it doesn’t work on Wayland” is in sight. Just in time for Windows 10 EoL too
Mikrotik with RouterOS for European-made router without chinese backdoor
With these kinds of things, where you need to manage state (waiting, executing, failed, etc), it is very easy to miss a case or transition and generally better to rely on proven tech.
Let the waiting for network connection and retrying be done by systemd, half the internet runs on it. You can trust that it won’t mess that part up. Write only what is specific to you in your script.
I’ve heard of SwayFX, but it’s pretty niche and I doubt it comes close to the featureset of Hyprland
While the company has a questionable record and a controversial business model, Brave Browser is an open-source browser with good privacy features.
If they don’t keep any private data on any computer that trusts their home network/wifi and don’t do taxes or banking on those, there’s no problem.
But if they do, I maintain that the analogy is correct: their unpatched machine is an easy way to digitally get access to their home, just like an unlocked door is to a physical home.
You keep using the word “maintenance”. All I’m worried about is not installing any security patches for months.
The problem that I tried to highlight with my “cherry picking” is:
So unless you have separated this Orange Pi into its own VLAN or done some other advanced router magic, the Orange Pi can reach, and thus more easily attack all your other devices on the network.
Unless you treat your entire home network as untrusted and have everything shut off on the computers where you do keep private data, the Orange Pi will still be a security risk to your entire home network, regardless of what can be found on the little machine itself.
No it is
https://www.pandasecurity.com/en/mediacenter/consequences-not-applying-patches/
And:
You’re allowing for more attack vectors that would not be there if the system were to be patched. Depending on the severity of the vulnerability, this can result in something like crashes or something as bad as remote code execution, which means attackers can essentially do whatever they want with the pwned machine, such as dropping malware and such. If you wanna try this in action, just spin up a old EOL Windows machine and throw a bunch of metasploit payloads at it and see what you can get.
While nothing sensitive may be going to or on the machine (which may seem to be the case but rarely is the case), this acts as an initial foothold in your environment and can be used as a jumpbox of sorts for the attacker to enumerate the rest of your network.
And:
Not having vulnerability fixes that are already public. Once a patch/update is released, it inherently exposes to a wider audience that a vulnerability exists (assuming we’re only talking about security updates). That then sets a target on all devices running that software that they are vulnerable until updated.
There’s a reason after windows Patch Tuesday there is Exploit Wednesday.
Yes, a computer with vulnerabilities can allow access to others on the network. That’s what it means to step through a network. If computer A is compromised, computer B doesn’t know that so it will still have the same permissions as pre-compromise. If computer A was allowed admin access to computer B, now there are 2 compromised computers.
I used to lose my keys all the time. I don’t want to spend so much time looking for my keys, nowadays I mostly just leave them in the front door, I rarely lock it and it works like a champ.
Does DuckDuckGo do this as well or is that a better option, privacy-wise?
EDIT: answer is here: https://www.privacyguides.org/en/search-engines/#recommended-providers
If you need to hide IP, you just use a VPN. Duh!
And Qwant is not listed on privacyguides?
Welcome to Lemmy @destviz@lemm.ee !
What even is an actual cornball…? Genuine question. Never heard of it.
Of course mass surveillance existed long before the US had a fascist president, no one is implying that it didn’t.
It’s just that fascism is a great reminder why no government should have as much power to invade in privacy as the US has. Especially for those who are not subscribed to this community and forgot about that, so share this with them!
There is a reason why NixOS was invented 21 years ago. Reproducible builds are not simple in most packaging build systems.
And at your next job, at an employer who sees the value of FOSS and a nerd with strong Linux-fu!
Honestly, k8s + GitOps at home is my project that I’m just starting this week. I found a community around it (on Discord 🤮) called Home Operations.
Docker Hub sucks and is VERY strict with rate limits. Try ghcr.io or the aws container registry.
Isn’t gaming the most cache-heavy CPU workload there is? The X3D CPUs have consistently topped gaming benchmarks, even outperforming much more modern CPUs that lack 3D cache.
I’d sooner do it the other way around: frequency for compiling, rendering, transcoding, etc. Cache for gaming!