cmgvd3lw

joined 1 year ago
[–] [email protected] 8 points 12 hours ago (7 children)

One thing that we share with reddit is the emoji usage policy. Keep it to a minimum or use none.

[–] [email protected] 4 points 2 days ago

Might be some omegle screenshots

[–] [email protected] 3 points 3 days ago

Surprisingly modern looking photo

[–] [email protected] 6 points 3 days ago

Federatingly simping for the fediverse chick.

[–] [email protected] 11 points 5 days ago

1000032584 Maybe they can cut down on displaying these footers with irrelevant information for us. They are certainly more than three characters of a pronoun.

[–] [email protected] 3 points 5 days ago

What if she is real? And is reaching out to everybody cause she is lonely?

[–] [email protected] 3 points 5 days ago

Only cool people get nicoled. I got 3.

[–] [email protected] 3 points 5 days ago* (last edited 5 days ago) (2 children)

~~With root permission you can do chroot.~~

Edit, I did some digging and found that its not the normal files that they can access but can modify kernel parameters and can mount devices and access their files etc. If you want to learn more check https://stackoverflow.com/questions/36425230/privileged-containers-and-capabilities

[–] [email protected] 3 points 6 days ago
[–] [email protected] 5 points 6 days ago

Thanks for the 01, I thought one meant 03

[–] [email protected] 1 points 6 days ago (1 children)
  1. What is the benefit of creating users for every service? Wouldn't one be sufficient?
  2. Also just out of curiosity, why not in sodo'ers list?
 

Please suggest a good and relatively affordable private email provider. I am considering tuta, mailbox right now. I know proton has gone rogue.

I cannot self host one and the email provider must be somewhat reputable as I will be using this for my work portfolio. Anything with €1-€3 per month is encouraged.

1
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/[email protected]
 

I was looking for a good and quick file transfer method and stumbled upon Warp on Linux (flatpak). It says the app is open source but I did a quick Lemmy search and someone mentioned the protocol magic wormhole is closed.

Even though I found the application very useful, like I can transfer files even when connected to a VPN service, the closed source nature turns me off.

Also when operating without a VPN, wormhole connects via local network, my desktop is behind a firewall, but the transfer still happen! How does it do that without opening a port in f/w?

Any alternate suggestions are welcome as well.

Edit 1. The domain for the magic wormhole relay and transit server that most open source clients (like Warp) use is magic-wormhole.io. I have to check if they really are open source.

Edit 2. There seems to a mention of the magic-wormhole.io domain in their PyCon 2016 presentation.

 

I am a complete noob when it comes to crypto and would like to buy some and use it for an anonymous transaction. But I don't know how to though.

Can I buy it with my credit card? What are some good wallets or buying authority? Should I go for an international one or stay local?

 

cross-posted from: https://discuss.tchncs.de/post/26495994

  1. Reservoir Dogs (1992): A crime thriller about a group of criminals whose diamond heist goes awry, leading them to suspect one of their own is an undercover cop.

  2. Pulp Fiction (1994): A cult classic that intertwines multiple storylines involving hitmen, a boxer, and a pair of armed robbers in Los Angeles.

  3. Jackie Brown (1997): Based on Elmore Leonard's novel, this film follows a flight attendant caught in a money smuggling scheme, playing both sides against each other to secure her freedom.

  4. Kill Bill: Volume 1 (2003): An action-packed revenge saga about "The Bride," a former assassin seeking vengeance against her former colleagues.

  5. Kill Bill: Volume 2 (2004): The continuation of "The Bride's" quest for revenge, exploring her backstory and relationships.

  6. Death Proof (2007): Part of the "Grindhouse" double feature, it follows a psychopathic stuntman who uses his "death-proof" car to stalk and kill young women.

  7. Inglourious Basterds (2009): Set during World War II, it follows a group of Jewish-American soldiers planning to assassinate Nazi leaders.

  8. Django Unchained (2012): A Western about Django, a freed slave who teams up with a bounty hunter to rescue his wife from a brutal plantation owner.

  9. The Hateful Eight (2015): Set in post-Civil War Wyoming, it follows a group of strangers seeking shelter during a blizzard, leading to a violent confrontation.

  10. Once Upon a Time in Hollywood (2019): Set in 1969 Los Angeles, it follows a fading actor and his stunt double navigating the changing film industry.

 
  1. Reservoir Dogs (1992): A crime thriller about a group of criminals whose diamond heist goes awry, leading them to suspect one of their own is an undercover cop.

  2. Pulp Fiction (1994): A cult classic that intertwines multiple storylines involving hitmen, a boxer, and a pair of armed robbers in Los Angeles.

  3. Jackie Brown (1997): Based on Elmore Leonard's novel, this film follows a flight attendant caught in a money smuggling scheme, playing both sides against each other to secure her freedom.

  4. Kill Bill: Volume 1 (2003): An action-packed revenge saga about "The Bride," a former assassin seeking vengeance against her former colleagues.

  5. Kill Bill: Volume 2 (2004): The continuation of "The Bride's" quest for revenge, exploring her backstory and relationships.

  6. Death Proof (2007): Part of the "Grindhouse" double feature, it follows a psychopathic stuntman who uses his "death-proof" car to stalk and kill young women.

  7. Inglourious Basterds (2009): Set during World War II, it follows a group of Jewish-American soldiers planning to assassinate Nazi leaders.

  8. Django Unchained (2012): A Western about Django, a freed slave who teams up with a bounty hunter to rescue his wife from a brutal plantation owner.

  9. The Hateful Eight (2015): Set in post-Civil War Wyoming, it follows a group of strangers seeking shelter during a blizzard, leading to a violent confrontation.

  10. Once Upon a Time in Hollywood (2019): Set in 1969 Los Angeles, it follows a fading actor and his stunt double navigating the changing film industry.

1
submitted 7 months ago* (last edited 7 months ago) by [email protected] to c/[email protected]
 

I began using invidious after every piped instances refused to play videos lately. But what I read from their docs is that my IP might get exposed to google servers while loading videos from invidious. I use rethink DNS app and in that I can see all the domains that are getting called by my browser.

I tested about five instances and none are calling googlevideo domain as mentioned in the doc. Are they proxying my requests by default or am I missing something?

No, I don't have the option proxy video turned on. I use yewtu.be as my main invidious instance.

 

With the recent WWDC apple made some bold claims about privacy when it comes to so called Apple Intelligence. This makes me wonder if they did something to what Microsoft did with Recall feature, would people be less concerned and to an extend praise their effort?

Do you trust apple with their claims?

1
submitted 10 months ago* (last edited 10 months ago) by [email protected] to c/[email protected]
 

Applications like EndeavorOS Welcome, Tor browser won't show their actual icons on the taskbar after Gnome 46 update. I have observed that applications launched by invoking the binary through terminal using ./ behaves this way. (Not sure about the EOS Welcome) Is there any fix to this?

OS: EndeavourOS Linux x86_64. DE: GNOME 46.1. Icons: Papirus [GTK2/3].

[Edit: This is not a freshly installed system. Icons were working fine till Gnome 45.]

 

Basically the question. I use work profile (created with shelter). The stock android launcher supports this personal/work separation. But I want to know whether nothing phone launcher support this feature. I know you can install a third party launcher like lawnchair for this. But with these 3rd party launchers the gesture support is really bad.

 

Does cloud providers share the IP addresses and the alloted users to these big corps and defect the whole purpose of a privacy frontend? Are there any service (FOSS) that could randomise my servers IP?

Might be a noob question but I want to start self hosting.

 

Preferably a docker image, but given the instructions, I could build an image.
Any suggestions on the best practises are also welcome. Like the type of server (VM/Swarm/K8s) etc.

view more: next β€Ί