that will help to make the terminal slower!
Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045
- 2 Posts
- 1.4K Comments
ReversalHatchery@beehaw.orgto
Open Source@lemmy.ml•Something like mIRC? If I was to describe it would basically be Discord or [matrix], but I want it more casual - no need for acc, just click a link you are in a chat room
1·1 month agodiscord can be used without an account - until they kick you out demanding your phone number.
on matrix too you can have a guest user that works somewhat similarly, but most rooms don’t have that enabled I think. I am not too surprised about that, no idea how could that be effectively moderated. it also needs client support but element web supports it
ReversalHatchery@beehaw.orgto
Linux@lemmy.ml•Linux kernel version numbers (Greg Kroah-Hartman's blog)
31·1 month agohttp? really?
ReversalHatchery@beehaw.orgto
Open Source@lemmy.ml•HDMI Forum is unwilling to disclose the 2.1 specification for open-source (Linux): according to AMD, they had submitted a functional, HDMI 2.1-compatible driver [for linux?], which the Forum rejected.
6·1 month agothis is not new, but its time for the hdmi forum to fade into irrelevance
ReversalHatchery@beehaw.orgto
Open Source@lemmy.ml•Chat Control: EU Council vote is a Green Light for Indiscriminate Mass Surveillance and the End of Right to Communicate Anonymously
1·1 month agowho said they’ll take away social media. the popular addictive services will remain
ReversalHatchery@beehaw.orgto
Open Source@lemmy.ml•Chat Control: EU Council vote is a Green Light for Indiscriminate Mass Surveillance and the End of Right to Communicate Anonymously
1·1 month agothat won’t work anymore, because today not even just to youth, but everyone the only thing that matters is convenience. their friends are not on there? they are not interested! maybe they would try it for fun? too bad, their phone does not allow installing it
better yet: criticizing Debian for the instability of Kali
ReversalHatchery@beehaw.orgto
Privacy@lemmy.ml•Germany are no longer against chat control - (German article)
2·2 months agoselective enforcement could give them way to give you effectively a life sentence for breaking this and that law
It’s not as fancy. No graphs, blinking lights, paneled layout.
apparently it has it all
ReversalHatchery@beehaw.orgto
Linux@lemmy.ml•KDE Linux deep dive: package management is amazing, which is why we don’t include it
2·3 months agoas I understood you are complaining that they don’t have a package manager. they do, but not for system software.
ReversalHatchery@beehaw.orgto
Linux@lemmy.ml•KDE Linux deep dive: package management is amazing, which is why we don’t include it
1·3 months agoyou did not read the article
ReversalHatchery@beehaw.orgto
Privacy@lemmy.ml•Anamorphic encryption against dictators - hiding message inside normal looking ciphertext
1·3 months agoplaintext is the unencrypted form of data. encryption produces ciphertext. encrypting the same data with the same key twice results in the same ciphertext, unless additional steps were taken to insert additional data that does not match (like a nonce) to the plaintext
ReversalHatchery@beehaw.orgto
Privacy@lemmy.ml•Anamorphic encryption against dictators - hiding message inside normal looking ciphertext
3·3 months agothe way it works is that the veracrypt container basically contains 2 encrypted partitions. if it can’t decrypt the first one with the password, it will try the second one, but always pretend to try both so that the time it takes to unlock it does not give it away. by writing to either, you risk overwriting data in the other one (except that you can input both the hidden and main partition passwords and it will make sure to keep the hidden partition unaffected), but otherwise both partitions are fully functional
ReversalHatchery@beehaw.orgto
Privacy@lemmy.ml•Anamorphic encryption against dictators - hiding message inside normal looking ciphertext
1·3 months agothe way it works is that the veracrypt container basically contains 2 encrypted partitions. if it can’t decrypt the first one with the password, it will try the second one, but always pretend to try both so that the time it takes to unlock it does not give it away. by writing to either, you risk overwriting data in the other one (except that you can input both the hidden and main partition passwords and it will make sure to keep the hidden partition unaffected), but otherwise both partitions are fully functional
ReversalHatchery@beehaw.orgto
Privacy@lemmy.ml•Printers leave a watermark on each page indicating the exact printer that it came from. Are there any other examples of these privacy violations that aren't common knowledge?
10·3 months agoor just the individual characteristics and flaws of the lens/sensor/postprocessing software, some of which can be unique per device, and potentially comparable to other photos made with it.
ReversalHatchery@beehaw.orgto
Privacy@lemmy.ml•Printers leave a watermark on each page indicating the exact printer that it came from. Are there any other examples of these privacy violations that aren't common knowledge?
3·3 months agoor any repair show that uses the brand specific diagnostic software, pirated or not
ReversalHatchery@beehaw.orgto
Open Source@lemmy.ml•[Suggest] A cross platform messaging application where self messaging is possible
1·3 months agonote taking apps often dont sync and don’t keep the timestamp when you “sent” it. vikunja does not work offline. a selfmessaging chat app can keep the message until it can send it
ReversalHatchery@beehaw.orgto
Privacy@lemmy.ml•Concerned message from CEO of Telegram about privacy and censorship
1·3 months agoThey aren’t encrypted, hence why I never said they were.
you did, just with different words. without encryption and with centralized servers how would this claim of yours be the case?
If it’s a private group they don’t know what’s happening.
you know, trust and safety teams aren’t looking at the content with the apps when they look for harmful content. they have access to better moderation tools with access to the database, where the messages are readable to them because of the lack of end to end encryption.
ReversalHatchery@beehaw.orgto
Privacy@lemmy.ml•Encrypt your Linux with LUKS, like seriously.
3·3 months agothe thread is visible here, just a single comment was deleted

an arch user doesn’t know that!!
so, that further information is the kernel’s version number. it helps to keep some older versions. but you didn’t set it up to include the version in the filename.
és egyébként bojler eladó. processzorra cserélném.