Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)RE

Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045

Posts
5
Comments
2,021
Joined
2 yr. ago
  • you should perhaps find a little energy and read the whole message. especially the paragraph that starts with "Discussion". because that paragraph is the rule. what do you not understand about this?

  • that should patch it up, mostly. flatpak gives real isolation. It's not 100% though, things can leak, like I think X11 access is unlimited, so wine programs can read other window contents, capture and inject keystrokes and mouse events if they are prepared to do it. but wayland windows they can't see or even know if they are open. but they may still be able to mess with your bottles config and other things installed for the bottles flatpak container

  • yeah on windows its.. limited. you can make virtual playback devices (speakers) with programs like vb-cable to separate them. you can then set up monitoring for them so that you hear it and.. you can't mix it with your mic so that's no good.

    there was also Synchronous Audio Router. but it's buggy and microsoft made sure it never ever gets an update

    I would prefer the setup to be easy on the client side

    you mean for the viewers, right? this shouldn't make any complications for them

  • Recently there was a discussion about an r/privacy mod, carrotcypher. they have been mod on that sub since before the reddit exodus but they are making very strange decisions, to put it lightly. maybe this is their work too

  • in my experience liking stupid pages, and political news pages, and sometimes giving various reactions to posts helps. did that for a few weeks last year, but decided that this experimentation does not worth my time

  • pdf files can contain javascript code that can run when it is opened. but when using complex formats (I think almost all video files, pdfs), it can happen that the software that understands it makes mistakes when reading it and making sense of it, and an attacker tries to make use of this to trick your software into doing something that wasn't intended by its creator. this is how it can happen that an mp4 file (or mkv, others, ...) cannot contain executable code (according to specification), and yet it can

    in the case of pdf files, bundled fonts may be another source of problems

  • a few years ago (actually, probably 5+, how the time flies) they made some kind of data collection mandatory, but at first totally hidden, afaik not even a changelog entry. then people found out and went angry, so unifi made an opt-out setting for it

    I don't know what happened after that, but to me they have shown it clearly that they are driven by US mentality (not because of current politics, but generally)

  • Feather Wallet @monero.town
    ReversalHatchery @beehaw.org

    Eepsite down?

    I cannot access the I2P site on the http://rwzulgcql2y3n6os2jhmhg6un2m33rylazfnzhf56likav47aylq.b32.i2p/ address, either in the web browser but also for news and price synchronization in the wallet. Is this on my side or a serverside issue? In the browser, the I2P router always just responds "Website Unreachable", because its lease set was not found.

    For those wondering where did I get the URL, it can be found at the bottom of https://featherwallet.org/

    Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ @lemmy.dbzer0.com
    ReversalHatchery @beehaw.org

    Meta: please don't delete your posts if you later thought that the idea has "failed"

    Recently there was a post where the OP pitched an idea for a service related to this community. I don't want to go into details but the post's text has shown that maybe there's some misunderstanding around the technology, and a considerable amount of us also thought that it's not a good idea.
    The post was removed (noticed because I couldn't reply to someone) probably because the OP felt shame for their "failed" idea, but I think we shouldn't delete posts for reasons like this.

    The post created an interesting discussion around the idea with useful info. It's useful to have things like these for future reference, for similar discussions in the future.
    This is an anonymous forum, so there's no shame in recommending things, when you do that politely like it was done in that case.

    Matrix @lemmy.ml
    ReversalHatchery @beehaw.org

    Introduction of the first Managing Director

    Linux @lemmy.ml
    ReversalHatchery @beehaw.org

    Why does Ruby Gem 3 install gems to Ruby 2 directories?

    I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/.

    Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.

    I have checked the version of gem by running gem --version. This is on a Debian Bullseye based distribution.

    Technology @beehaw.org
    ReversalHatchery @beehaw.org

    Google's Web Environment Integrity made me remember this video

    vimeo.com Trusted Computing

    "Trusted Computing" - ever heard of it? This motion graphic style documentary explains what the term "trust" has in common with "Trusted…

    Trusted Computing

    The video is a short documentary on Trusted Computing and what it means to us, the users.

    If you like it and you are worried, please show it to others.
    If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.