teawrecks

joined 1 year ago
[–] [email protected] 1 points 1 month ago (1 children)

Debian is the only one there I haven't actually tried myself as a daily driver, so idk if using the terminal is necessary. I've just heard it's solid and I assumed all normal user operations can be done via GUI in gnome or KDE like you can with Fedora.

[–] [email protected] 19 points 1 month ago (3 children)

It's better to ask which distro is dummy proof. Some are made for noobs and windows users, others are not, and they're all based on "Linux".

Mint, Debian, and Fedora are all good starter options, and all are made to get stuff done without having to use the command line.

[–] [email protected] 3 points 1 month ago

I agree. Specifying the same param twice like this feels like it should be idempotent. Sometimes a final cmdline string is built by multiple tools concatenating their outputs together; if each one adds --force without any way to know if it's already been added elsewhere, this could lead to undesirable behavior.

Even --forceforce would be better.

[–] [email protected] 7 points 1 month ago

Dumpster fire or not, it doesn't let you actually see recent posts unless you're signed in anymore. So all the public services that use it (or Facebook) to make public statements are inaccessible.

IMO the US should start a .gov mastodon instance for these types of accounts. Moderation might be a challenge given that there's a fine line between censorship on a private platform, and infringement of free speech on a publicly funded one, but I think we'll need to figure it out eventually.

[–] [email protected] 3 points 1 month ago (1 children)

Not quite the same, but in WoW, you couldn't talk to the opposing faction. So sometimes people would make characters like this just to hang out in the other faction's zones and communicate using only emotes. Good times...

[–] [email protected] 9 points 1 month ago

Ironic given that the term "incel" was originally coined by a woman in reference to herself.

[–] [email protected] 5 points 1 month ago

I remember when the mapping of virtual memory segments clicked for me. I think i said out loud, "that's so clever!". Now it just seems so fundamental to managing memory for user space applications, but I hadn't thought about how it was done before.

[–] [email protected] 5 points 1 month ago (6 children)

Immich is a self-hosted photo hosting service. They're listing this in their docs because people are trying to upload photos with GPS data, hitting this cursed behavior because they didn't give immich Location access (because why would you?), and then filing unnecessary bug reports on them about their disappearing data.

To be clear, no one is against stripping GPS data, that's not what anyone takes issue with, it's the silently part that is unexpected behavior.

[–] [email protected] 23 points 1 month ago (8 children)

It's cursed because it happens silently, such that you might accidentally be deleting gps data you wanted to keep without noticing, for a reason that you probably wouldn't think to check, probably instead erroneously filing a bug on the app for doing it.

[–] [email protected] 3 points 1 month ago (1 children)

As someone who majored in CS and is now in a software engineering position, the people in tech who come from a completely different field are always my favorite. On top of just proving people wrong about the "right" way to get into the field, they've been around, they know how to think about problems from other perspectives, and they're usually better at working with other people.

Honestly, I think more people should minor in CS, or if they did their undergrad in CS, they should have to do their grad work in something else. The ability to compute things is only useful if you're well versed in a problem worth computing an answer to, most of which lie outside of CS.

[–] [email protected] 15 points 1 month ago

they say the 30s is generally where your love for video games go to die.

Such a claim is baseless. Video games have been evolving every few years for their entire existence. Such a claim sounds as ridiculous as someone in the 60s saying that people grow out of watching animated shows in their teens.

Either your priorities have just shifted, or you might be in a bubble where you only see the same old games that have already been done, so nothing piques your interest.

[–] [email protected] 1 points 2 months ago

I'm actually not sure what TPM can guard against, but I think you're right, I think if a malicious OS borked with the bootloader, TPM would catch it and complain before you decrypt the other OS.

Yeah, physical access usually means all bets are off, but you still lock your doors even though a hammer through a window easily circumvents it. Because you don't know what the attacker is willing to do/capable of. If you only ever check for physical devices, you'll miss the attack in software, similarly if you only rely on Secure Boot you'll miss any hardware based attacks. It's there as a tool to plug one attack vector.

Also, my guess is the most common thing this protects against are stupid employees plugging a USB they found in the parking lot into their PC. If they do it while the OS is running, IT can have a policy that blocks it from taking action. But if they leave it there during a reboot, IT is otherwise helpless.

view more: ‹ prev next ›