Skip Navigation

Posts
0
Comments
136
Joined
3 yr. ago

  • He does appear to be a professor in the field

  • This is a really good question!

    I believe the general answer is, until the compressed file is indistinguishable from randomness. At that point there is no more redundant information left to compress. Like you said, the 'information content' of a message can be measured.

    (Note that there are ways to get a file to look like randomness that don't compress it)

  • I don't think there's a way to get the street view images that are needed. Those are owned by google.

  • By default, an enencrypted boot drive is not sufficient to be able to decrypt a LUKs drive. If you have to type in your password to start the computer/unlock LUKs then you should be good.

    If you've setup a keyfile or TPM based decryption of LUKS, then your data is probably not safe (though a TPM based decryption could be if the OS is secure and secure boot is setup properly)

    In this case, if you have another server then you could setup a mutual tang/clevis system where each device gets the keys it needs from the other server on the LAN. Both would be LUKs encrypted. So if one is online the other gets the required key from the online one while booting. But if both are offline then no keys are available and you have to type in a LUKS password to boot. Something like https://www.ogselfhosting.com/index.php/2023/12/25/tang-clevis-for-a-luks-encrypted-debian-server/ but what they do with multiple servers is probably overkill

  • Deleted

    Permanently Deleted

    Jump
  • That's probably only for selling steam keys on another store. You might be able to sell non steam versions for any price you want

  • Deleted

    Permanently Deleted

    Jump
  • The original is something like "it's all Ohio" "always has been". The globe shown is just a large landmass that looks like Ohio. They're probably astronauts since you'd have to be in space to see it. The astronaut killing the other has the Ohio flag on them and is killing them for knowing too much.

  • If there's a 0 day in the VPN software then I'm also probably boned. The chances of that seem on par with the likelihood of an openssh vulnerability? I feel like vpns are useful to secure services without good authentication, but their use in front of an openssh server has never made much sense to me.

  • Sorry for the series of edits. Yeah, just starting timers.target or graphical.target again when you're done without using isolate seems like a pretty good strategy!

  • I think if you switch back to the original target that depends on those services they should start again?

    Like systemctl isolate yourtarget.target and then a systemctl isolate graphical.target to return to normal operation

    Isolate will stop any services that aren't required by the dependency chain.

    Some of these might be user services though, in which case you'd need to create a user target

    It's possible that you don't need to use isolate though, and can just start a target that conflicts and then instead of stopping it, start graphical.target

  • MAAAAM

    Jump
  • I semi-regularly put the milk in the cupboard and usually realize when I try to put the cereal in the fridge and it doesn't fit

  • I think this is only true for some non intuitive definition of "temperature" of the light source. Fireflies aren't a blackbody radiator, while the sun largely is. You absolutely can use non-equilibrium/non-blackbody light sources to heat something to hotter than the source. For example, lasers can heat something extremely hot while remaining "cool" (unless you're considering the non equilibrium temperature of their excited atoms/electrons, which isn't really fair.)

  • I believe a bot/site that mirrors reddit subreddits to Lemmy communities. It's anything @lemmit.online

  • It's pretty trivial for them to block all major instances though, or even all instances federated with all major instances

  • I have like 80gb of photos and videos on my phone, which is the vast majority of my storage space. I think the second category is signal's database, also mostly consumed by sent media

  • You can probably route the audio you want with helvum or qpwgraph. This is what I've used to route screen sharing audio in the past

  • They didn't mention licensing as the reason for the move. The community members in the discourse thread mentioned licensing as their reason for opposing the move. Canonical itself mentioned memory safety and speed as the main reasons, saying the licensing wasn't part of the reason why

  • If you install the language server for your language, then you can get hints, including function arguments and types, in Kate.

    See https://microsoft.github.io/language-server-protocol/implementors/servers/ for a list of server

    I'm not familiar with raylib specifically, but generally as long as you have header files (for C) or stubs (for python) you should be able to get completions for library calls.

    But it seems like you already know about LSPs from your comment. So I'm not sure exactly what your question is? Do they work?

  • I switched this as well and found it solves my SDDM hidpi scaling issues!

  • I'm confused. People are saying this is due to earths curvature, but this is in the northern hemisphere so shorter paths should be more northern, not more southern.

    See this map of the actual shortest distance line (purple) for those two points. The image OP's question seems much more reasonable given this information?