

You can access bitlocker drives from Linux too, it’s a bit of a pain but all you need is the recovery key.
You can access bitlocker drives from Linux too, it’s a bit of a pain but all you need is the recovery key.
Ok grandpa, turn off the DirectTV and power down your AM radio. Using a technology that old is guaranteed to land you deep in enshittification-land.
I’ve been watching Jellyfin for a while and I have not seen the first ad,
You wouldn’t need to track them all, any distro’s installed package distribution (statistical, not Linux distro) should be strongly correlated with all of the others.
Just like how you can poll a large crowd based on the opinions of a few thousand people. Arch is a good place to look since all packages are explicitly chosen by the user while in other distros the default software packages ensure that their repo stats will be skewed.
When I’m looking into alternatives, I usually just search social media and note the things people recommend. The software ecosystem is small enough that this method isn’t (yet) polluted by bots promoting software.
It’s “what alternatives exist and how can I find them?”, not “I only install popular apps.
Bots pretending to be tech bros*
Twitter is basically millions of Groks in a trenchcoat at this point.
I don’t believe any kind of analysis that depends on measuring sentiment on social media given that it’s trivially easy to run hundreds or thousands of accounts on a 5 year old graphics card and some vibe coding.
I’ve been too lazy to find/get onto a music private tracker, so my collection isn’t much… but I did setup pipewire devices over the network, so my shop sound system is now an audio device on my desktop. (Pipewire is awesome).
I spend more time building the systems than actually using them. ncmcmcnpp + mpd is the TUI of the distinguished gentlemen and ladies.
I use x-systemd.automount for storage drives. You don’t need nofail with it. Systemd always mounts a tempfs until the directory is accessed so the fail won’t happen until you try to access the directory.
The underlying problem (Shortest Vector Problem) is known to be NP-Hard.
We know, via mathematical proof, that if there is a solution to SVP that’s solvable in polynomial time then it would necessarily mean that it is possible to solve any NP problem in polynomial time.
This would be astonishing, to put it mildly. It would be as if physics suddenly discovered that things could move faster than light and have negative mass. Physics would get wormholes and computer science would get “Arthur C. Clark magic”* programs.
(*“Any sufficiently advanced technology is indistinguishable from magic.” )
RPing when shot and going down. “Help me sarge! Gah. It-it hurts!”
The chopper pilots that spent the entire match ferrying people from base to the front while blasting the weirdest song mix you’ve ever heard.
I vaguely remember getting into a WPA network (that I owned!) using kismet about 15 years ago with relative ease, but I’m struggling to remember details about that process.
The 4-way handshake crack was the only key recovery attack until 2018 when the PMKID-based attack was discovered (here: https://hashcat.net/forum/thread-7717.html). The PMKID crack attack still required brute-forcing the key, but it didn’t require the 4-way handshake so you didn’t have to depend on a de-authentication attack to get started.
At that time there was another WPA vulnerability, if you were using WPA-TKIP, but it only allowed sending a few small packets every 10-12 minutes so it wouldn’t allow you to gain access to the network.
Later there were a few WPS-based attacks but they were slow (4 hours to recover the WPS PIN) and/or limited to specific manufacturers (weak hardware random number generation).
That’s certainly a way of looking at it.
The talent was upset at a conflict between kernel maintainers and posted a personal attack on Mastodon. The comment is now deleted ( https://web.archive.org/web/20250204004048/https://social.treehouse.systems/@marcan/113941358237899362 ).
The Code of Conduct explicitly lists public harassment as an example of unacceptable behavior.
Examples of unacceptable behavior by participants include:
-The use of sexualized language or imagery and unwelcome sexual attention or advances
-Trolling, insulting/derogatory comments, and personal or political attacks
-Public or private harassment
-Publishing others’ private information, such as a physical or electronic address, without explicit permission.
-Other conduct which could reasonably be considered inappropriate in a professional setting
Even if he is correct about about it being a code of conduct violation (it wasn’t), there is way to take action and it isn’t posting an attack on social media.
Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the Code of Conduct Committee at [email protected]. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The Code of Conduct Committee is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.
There has certainly been drama around Rust, but as was said in the thread: “Being toxic on the right side of an argument is still toxic, […]”
Arch is Arch-based, btw
I think 4chan is a pretty cool guy. Eh gets fined by the UK and doesn’t afraid of anything.
It sounds like you’re trying to make something like: https://github.com/cryptomator/cryptomator
It takes the files that you want to store in the cloud and encrypts them into a bunch of individual files (like encrypted archives) and uploads them to the server. When you access the files it automatically pulls down the archives that contain the files that you want.
You just see a regular directory that’s being synced with the cloud, but the cloud service provider only sees you uploading a bunch of encrypted files with nonsense filenames.
Or a Pangalactic Gargleblaster, “it’s like having your brains smashed out by a slice of lemon wrapped round a large gold brick.”
There isn’t a global 30% performance loss. There are specific games/configurations that have performance issues and bugs, but it isn’t all games.
For example, there is a current bug, if you’re using some features in VKD3D(like ray tracing) which NVIDIA has identified and is creating a fix. The problem isn’t Linux specific, if you use VKD3D on Windows it also has this problem.
The second Reddit link is a user confusing a Baldur’s Gate 3 bug, where vulkan was implemented in a buggy way, with a performance problem.
There are always bugs and performance issues that appear and get fixed, that’s the nature of Linux. The social media meme “NVIDIA sucks on Linux” is based on old issues when NVIDIA cards had bugs that broadly affected games and other software to the point where it required a lot of effort (like patching your own software using git).
This is not the case now, NVIDIA works without major issues. The strongest reason to use NVIDIA over AMD would be if you used CUDA to run local AI. AMD doesn’t work with CUDA and the projects that fix this are in the alpha stages.
Gaming-wise, unless you play video games by staring at MangoHUD and comparing your historical frame-time graphs across multiple OSs, it works just fine.
Conversely, just because it doesn’t work for you that doesn’t mean that there are issues. I use Wayland Wine for everything, it works fine for me and even eliminates hitching caused by XWayland.
If you’re using a graphics card driver that’s newer than the version of wine then you could have problems, but this is true if you’re using AMD, NVIDIA or Intel.
Comparing osu native vs wine has nothing to do with NVIDIA or AMD hardware.
Reminder to donate to these organizations, fighting these lawsuits isn’t cheap and there are likely to be many, many more going forward.