Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)P
Posts
0
Comments
328
Joined
2 yr. ago

  • Good old Linus. "If we break userspace or common functionality, we're the problem. "

  • You can boot windows from a USB stick if you really want. It's even branded. "Windows to go".

  • Like a lot of markets big companies engage with, cloud services were operated at near loss levels for years. It's only when they had a sufficiently vendor locked and invested user base that they started cranking the costs, especially in areas you wouldn't otherwise notice. There's a reason everything is micro billed, and it's not to make it easier to lower costs on your end.

  • Yep! I understand, which is why I was clarifying for the previous commenter. As for if telemetry is morally justified, or if we should go back to old fashioned bug reports and some sort of upload system that requires direct user buy-in as the payment for privacy at the cost of reliability, mobility, and scalability is a discussion for someone else haha.

  • Probably telemetry software. Basically mandated for any publicly traded software company these days.

  • Nothing says "figure it out yourself" to a question like a couple of weeks in the ol' gulag.

  • Common is the enemy of correct. As for other languages, feel free to use anything memory safe! At least, that's what I'll be doing when exposing my overpowered calculator to 7+ billion humans.

  • If you use iOS (I can't speak for Android) it actually uses the system music apis, so things like the dynamic island, airplay, transmission of Metadata information over Bluetooth to players (name, song, etc), and background play control all work with Finamp where they don't with the regular jellyfin app.

  • Most brute-force attacks can be hardened against. Again there's no perfect security, just better security.

  • OP, just change your encryption key to whatever you have your password as and set your login to auto login. This will give you the experience you desire as it'll decrypt the disk with your password and log you in automatically once it's decrypted, but if you lock the system (close the lid. Screen lock. Etc) you'll still get a login screen as normal. (Just keep in mind they're technically two separate passwords and will unfortunately need to be changed separately if you do change your password).

  • Perfect security doesn't exist. If they've got the engineering capital required to design and manufacture key retrieval hardware, you lost the moment they gained physical access to your equipment.

  • Seems like I might have dodged a runnaway suv bullet when I canceled my order a few months back. 😗