
Matrix, the open protocol for secure decentralised communications

Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045
backups and restores are really fast and easy.
snapshots are not backups. for your own good.
if you only look at the top of the page, it's like saying trump is the white house lab leak
you should perhaps find a little energy and read the whole message. especially the paragraph that starts with "Discussion". because that paragraph is the rule. what do you not understand about this?
they are using zoom? eww
why use crc32 though? do you have some program that only works with that?
that should patch it up, mostly. flatpak gives real isolation. It's not 100% though, things can leak, like I think X11 access is unlimited, so wine programs can read other window contents, capture and inject keystrokes and mouse events if they are prepared to do it. but wayland windows they can't see or even know if they are open. but they may still be able to mess with your bottles config and other things installed for the bottles flatpak container
yeah on windows its.. limited. you can make virtual playback devices (speakers) with programs like vb-cable to separate them. you can then set up monitoring for them so that you hear it and.. you can't mix it with your mic so that's no good.
there was also Synchronous Audio Router. but it's buggy and microsoft made sure it never ever gets an update
I would prefer the setup to be easy on the client side
you mean for the viewers, right? this shouldn't make any complications for them
I see and I support that. but at 2 out of 3 places I have seen, context was missing making it harder to understand your message
Recently there was a discussion about an r/privacy mod, carrotcypher. they have been mod on that sub since before the reddit exodus but they are making very strange decisions, to put it lightly. maybe this is their work too
how do you discuss privacy on android devices if you can't even do so much as mention the name of an android rom. this is truly insane.
rogue has bad reading comprehension, the rule is not only about graphene, and that's not even what it even says about graphene
yes. google apps must stop being system apps. like there is no reason google music and co are installed that way as they don't need amy system permissions
consider requesting a GDPR data request, and when that's completed a GDPR data deletion. the former mostly to have a backup for you, you can skip it if you don't find it important
in my experience liking stupid pages, and political news pages, and sometimes giving various reactions to posts helps. did that for a few weeks last year, but decided that this experimentation does not worth my time
in the past they were using a jitsy integration, they are in the process of migrating to their in-house element call
and even if you remove the Z: drive letter, in my understanding the software can still access your filesystem if it was prepared to call linux specific kernel functions, or if it has a copy of its own glibc or musl and is prepared to use it
pdf files can contain javascript code that can run when it is opened. but when using complex formats (I think almost all video files, pdfs), it can happen that the software that understands it makes mistakes when reading it and making sense of it, and an attacker tries to make use of this to trick your software into doing something that wasn't intended by its creator. this is how it can happen that an mp4 file (or mkv, others, ...) cannot contain executable code (according to specification), and yet it can
in the case of pdf files, bundled fonts may be another source of problems
this comment made sense at one place, but if you just copy it to other responses like here people won't understand what do you mean.
tbh, this seems a bit.. defensive 🧐
a few years ago (actually, probably 5+, how the time flies) they made some kind of data collection mandatory, but at first totally hidden, afaik not even a changelog entry. then people found out and went angry, so unifi made an opt-out setting for it
I don't know what happened after that, but to me they have shown it clearly that they are driven by US mentality (not because of current politics, but generally)
Rewrite It In Rust ™, and then it'll work everywhere.
joking of course. you still need different builds for glibc and musl
Eepsite down?
I cannot access the I2P site on the http://rwzulgcql2y3n6os2jhmhg6un2m33rylazfnzhf56likav47aylq.b32.i2p/ address, either in the web browser but also for news and price synchronization in the wallet. Is this on my side or a serverside issue? In the browser, the I2P router always just responds "Website Unreachable", because its lease set was not found.
For those wondering where did I get the URL, it can be found at the bottom of https://featherwallet.org/
Meta: please don't delete your posts if you later thought that the idea has "failed"
Recently there was a post where the OP pitched an idea for a service related to this community. I don't want to go into details but the post's text has shown that maybe there's some misunderstanding around the technology, and a considerable amount of us also thought that it's not a good idea.
The post was removed (noticed because I couldn't reply to someone) probably because the OP felt shame for their "failed" idea, but I think we shouldn't delete posts for reasons like this.
The post created an interesting discussion around the idea with useful info. It's useful to have things like these for future reference, for similar discussions in the future.
This is an anonymous forum, so there's no shame in recommending things, when you do that politely like it was done in that case.
Matrix, the open protocol for secure decentralised communications
Introduction of the first Managing Director
Why does Ruby Gem 3 install gems to Ruby 2 directories?
I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install
parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/
.
Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.
I have checked the version of gem by running gem --version
.
This is on a Debian Bullseye based distribution.
Google's Web Environment Integrity made me remember this video
"Trusted Computing" - ever heard of it? This motion graphic style documentary explains what the term "trust" has in common with "Trusted…
The video is a short documentary on Trusted Computing and what it means to us, the users.
If you like it and you are worried, please show it to others.
If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.