- 6 Posts
- 64 Comments
Oh really? You’re saying its a security risk?
gwilikers@lemmy.mlto Linux@lemmy.ml•I switched from macos to Linux because it can't stop babying users and being unnecessarily restrictive5·1 month agoWhy would they do that?
Woah. Could you a link to the IRC channel?
gwilikers@lemmy.mlto Privacy@lemmy.ml•That groan you hear is users’ reaction to Recall going back into Windows43·1 month agoTook this crap off my computer and installed Fedora as my daily. If I need to run Windows, I’ll run it in a VM.
Saving this as a copypasta.
gwilikers@lemmy.mlto Open Source@lemmy.ml•US cuts funding to F-Droid, Tor Browser, Let's Encrypt and Tails Linux881·2 months agoImagine trying to explain FOSS to this fucking administration.
gwilikers@lemmy.mlto Linux@lemmy.ml•How do I map "caplock to escape but shift+caplock = normal caplock", like Gnome has?1·2 months agoFrom my understanding, Esc was originally where the Caps lock is on earlier keyboard layouts. That’s why it’s bound to that in Vim. It’s a holdover, so it makes sense to switch them back.
I accidentally deleted my root directory then botched the backup of my home directory by failing to copy my config files over then failed to check that before overwriting the SSD with my backups on it. I have learned many hard lessons today.
Von Braun oversaw the construction of missiles in factories that used forced Jewish (and other targeted groups) labour.
SELinux is an access control system for Linux. Traditionally Linux uses Dynamic Access Control (DAC) which basically means the person who creates a file can determine who can access that file. Thats pretty fine for day to day use but there are some problems with this model in terms of security. One I can think of is that it’s more vulnerable to privilege escalation (a hacker getting access to a higher level account like admin through a lower level account) because it puts the onus on the user to define who can access the file. SELinux was invented by our good friends at the NSA to remedy these kinds of problems. It’s an example of Mandatory Access Control. It works on top of DAC by creating policies that work to prevent things like privilage escalation. It’s also a lot more comprehensive than DAC. It allows for things context based access, taking into account the broader security context of an access attempt, the user’s role, etc.
I’m actually not entirely sure why some people don’t like it. Understandably, some people are wary of anything the NSA let’s out into the public. But as it’s open source and has been integrated into a number of Linux distros like Fedora, it’s unlikely they’ve backdoored it. If I was to hazard a guess, I’d say some people don’t like it for the same reason they don’t like systemd: Linux has often been an OS where user’s like a big degree of control through simple traditional systems and those don’t like the idea of losing some of that control to the complexity overhead involved in these new systems.
gwilikers@lemmy.mlto Self Hosted - Self-hosting your services.@lemmy.ml•Digital Independence5·2 months agoI really appreciate this list and use lots of applications like this but I would find it impossible to complety replace YouTube with PeerTube.
gwilikers@lemmy.mlto Asklemmy@lemmy.ml•Which co-op first person shooters would you recommend?2·3 months agoThanks for this. Removing the split screen from the PC version was one of the worst decisions I’ve seen for a game remake.
Ehhh, I don’t agree with the notion that extremists are bad. The definition of an extremist is ‘A person who advocates or resorts to measures beyond the norm, especially in politics.’ I don’t think animal rights extremists or environmental extremists are bad because I think the norm is morally reprehensible, unacceptable and unlikely to change without a pushing that norm through extremist measures.
gwilikers@lemmy.mlto Technology@beehaw.org•CAPTCHAs are 'a tracking cookie farm for profit that made us spend 819 billion hours clicking to generate nearly $1 trillion for Google1·3 months agoHow’s that work anyway. Fingerprinting?
gwilikers@lemmy.mlto Privacy@lemmy.ml•The Murder of John Lang: A Cautionary Tale on the Importance of Online Privacy3·4 months agoFrom my understanding, dental records are not actually as full-proof as they come of as in the media and there was a great deal of pseudoscience in their popularisation as a tool for identifying people. So perhaps, if the fingerprints are still identifiable, forensics went with them since they are more reliable.
The woke kabal of global elites will abolish traditional biological gender norms. Every character in every piece of media will rewritten be trans. Hamlet? Trans. Jesus Christ? Trans. John McClain? Trans. The global government will keep the population meek with estrogen-laced tofu and anti-gun legislation. Nobody will read Plato; the only philosphers will be Judith Butler and Jaque Derrida. White people and white culture will have ceased to exist. America will be a Communist Islamic Transocracy where conservatives are hunted down by drones that capture them and force them to read Critical Race Theory.
/s
Additional context:
88 is a white supremacist numerical code for “Heil Hitler.” H is the eighth letter of the alphabet, so 88 = HH = Heil Hitler. One of the most common white supremacist symbols, 88 is used throughout the entire white supremacist movement, not just neo-Nazis.
Honestly, same.
On the propaganda campaign(in addition to other things) I’d directly target oil lobbiests and corporate executives. I’d drag them kicking and screaming into the light. Put a face on the ever-faceless corporate interests that fuck our planet up.
Its even worse in SEA. Some countries like Nam have these small dick pick-up driving shitheads but what they don’t have is America’s huge roads and streets.