- 20 Posts
- 607 Comments
kevincox@lemmy.mlto Asklemmy@lemmy.ml•For those that have crossed the US / Canadian border recently: What was your experience like when dealing with US customs?2·3 months agoIt’s been fine. But I’m a decently well off young white dude who has never had trouble with borders anywhere. But I will still avoid it as much as I can.
But your case is wrong anyways because
i <= INT_MAX
will always be true, by definition. By your argument<
is actually better because it is consistent from< 0
to iterate 0 times to< INT_MAX
to iterate the maximum number of times.INT_MAX + 1
is the problem, not<
which is the standard to write for loops and the standard for a reason.
Actually I would pick GIMP.
- Says what it is, an image editor.
- No popups and random interruptions.
- Not only AI editing examples which makes me thing the tool is AI only.
- An overview of the variety of major features it has rather than just AI editing.
- Links to helpful documentation rather than endless marketing pages that say nothing.
Really think only thing I would like to see is some screenshots and examples of using the tool, rather than just info on what it does. But the Photoshop page barely has this, just a few examples of the AI tools.
kevincox@lemmy.mlto Technology@beehaw.org•Apple unveils new Mac Studio, the most powerful Mac ever2·5 months agoIs the limit 2 VMs or two macOS VMs? I thought it was technically a “licensing” restriction.
kevincox@lemmy.mlto Privacy@lemmy.ml•What do you think about using Beeper just for SMS?3·5 months agoIt’s definitely an option. It will do the things that you want (as long as your phone is online, but that is the same for any other solution).
sending Signal messages with it would be less secure
Yes, this is because Beeper converts the Signal protocol to the Matrix protocol and vice versa. In order to do this it needs to access the messages. So it needs to decrypt the messages, then re-encrypt them on the other side. This means that the bridge (in this case operated by Beeper) has access to your messages. This is often referred to as “end-to-bridge” encryption, as it isn’t end-to-end anymore.
This is going to be true of any bridge you use that is hosted by a third party. You are always adding one additional trusted party into your communication.
the recommended bridge instructions sends me over to Beeper, since I don’t have my own server
Yes, to practically operate a bridge you need your own Matrix server. This is because the bridge will create a new Matrix user for every remote participant (every phone number you communicate with in this case). Doing this with regular mechanisms would be difficult (as signup is likely restricted in some ways) and inefficient (as each account would need to be checked for new messages separately). Beeper runs their own homeserver so that they can operate their bridges. However Beeper’s bridges are only available to users on the same homeserver (this is not a protocol limitation, just their choice). So in order to use their bridges you need to make an account with them (which you can, it is free IIUC). Beeper also offers custom clients which have special features for interacting with their bridges (for example making it easier to start a conversation with a new phone number).
The alternative would be to run your own server and bridge (or hire someone to it on your behalf).
kevincox@lemmy.mlto Firefox@lemmy.ml•Has anyone seen Firefox raise all sticky footers like this?9·5 months agoFirefox on iPhone isn’t Firefox in the way that matters here. All iOS browsers are forced to use Safari’s rendering engine. iOS alternate browsers are just different UI and things like bookmark management on top of Safari.
Yeah, this is basically how it goes. It depends what country you grew up in. Canada is the same way, almost everyone who grew up in Canada can swim (not necessarily well, but able to manage). This is partly due to the number of lakes that exist near populated areas so swimming is a common passtime and boating accidents are a fairly high cause of accidental death. There are some countries where it is much more rare.
Nice. There were a few comics that I followed on Twitter due to lack of them posting other places. But it is nice to know that if I find another account that I am actually interested in I will be able to get a feed.
kevincox@lemmy.mlto Privacy@lemmy.ml•Bank account requiring Google play account, how to bypass ?3·5 months agoThis is my strategy. If I can’t bank on the website I find a new bank.
It would be nice if there was a shortcut to go “back to previous site”. Because on one hand using back to navigate around map moves is often very convenient, but sometimes I want to go to the site before the map. Having a two-level history with page and site would be super useful.
This is a case of the streetlight effect. Evaluating the skills needed to do the job is very difficult in an interview setting, so most of the focus going on evaluating skills that are easy to evaluate in an interview (such as people skills).
It isn’t wrong, as all else being equal it is still better to hire the person with better skills that you can measure but obviously is not a strong evaluation of candidate quality.
kevincox@lemmy.mlto Privacy@lemmy.ml•Is using an Matrix account from matrix.org private and secure enough to talk with my family members and people in general?3·6 months agoThat isn’t what that document says. It says that they can impersonate you in non-E2EE scenarios. The clients I use warn me when a message isn’t properly encrypted so someone without E2EE keys can’t impersonate someone in an E2EE room.
That being said the general concept is a problem. I would love to see progress where all events from a user are signed by a device key and non-forgable. There is some thinking about this with portable identities (such as MSC2787) where you server is basically just storing and forwarding events but the root of trust is your identity and keys that you control. But none of this will land soon, not for many years.
kevincox@lemmy.mlto Privacy@lemmy.ml•Is using an Matrix account from matrix.org private and secure enough to talk with my family members and people in general?11·6 months agoProbably yes, it depends on your threat model.
If you are using E2EE on a matrix.org account then your message content, attachments (images) and most other traffic isn’t accessible to anyone but the people in the chat. However Matrix isn’t the most private option, it has a number of leaks such as reactions and chat topics (these are being worked on but aren’t close to happening).
For most people Matrix is a very private and secure option and the fact that it is federated is a huge plus. If you want something more secure you are probably looking at Signal (which you don’t want to use and isn’t federated) or Simplex Chat (which doesn’t have multi-device support).
kevincox@lemmy.mlto RSS - Really Simple Syndication@lemmy.ml•Question: Do most feed readers talk to a server?4·6 months agoThere are local readers, that fetch the feed directly from your device, but many use backend servers for the feed fetching. There are a handful of possible reasons:
- Cross-device syncronization.
- Save battery by checking on the server and only waking the device with a push notification when there are actually new items.
- Obey platform background activity restrictions (especially on iOS)
- Privacy by hiding your IP from the feed operators.
- Avoid missing items on busy feeds when your client goes offline by checking constantly from the server.
kevincox@lemmy.mltocute dogs, cats, and other animals@lemmy.ml•Her nickname shall now be flour7·6 months agoAh yes, recompressing JPEG’s as PNG. Gotta losslessy preserve those artifacts at triple the file size. Perfection.
Closed-source software that sends home tons of information about your system without consent. All communication accessible to a VC funded company that has huge pressure to make as much money as possible.
I’ve been doing this from Firefox forever…
But “with audio” is actually a new feature. Previously I was manually sending the audio through my voice channel which worked pretty well but it would be nice to have a separate stream for the streaming audio.
Probably not enough for me to install the spyware though, I’ll keep using Discord via Firefox.
kevincox@lemmy.mlto Asklemmy@lemmy.ml•Should I be concerned that my HDD, which seems to be working fine, is 8 years old?2·6 months agothose disks were not spinning for maybe 3 weeks total
This is actually a good thing for longevity. Start up and stopping is the hardest part of a drive’s life. So you will see more failures on a personal PC that you turn off every night than a server drive running 24/7. Laptop drives will typically fare the worst as they may be power cycled many times a day, often fully stop when idle for power saving and get shaken much more than other drives.
Of course nixpkgs has it. It was added a few years ago, I can’t vouch for if it is up to date or still working.