@7heo@lemmy.ml
@7heo@lemmy.ml avatar

7heo

@7heo@lemmy.ml

This profile is from a federated server and may be incomplete. Browse more on the original instance.

7heo, (edited )
@7heo@lemmy.ml avatar

Genre. “Les phrases dans l’image sont correctes.”. Ou pas…

Sérieux, y’a moyen d’éviter de sortir des conneries grosses comme la lune avec l’aplomb de Chatte J’ai Pété, des fois? Ça nous changera, tiens. 😮‍💨

Edit: yeah, the correct phrasing would indeed be “Ça, c’est un tuyau” (“Pipe”, in French, exclusively means “Smoking pipe”, and as a slang, “Face”, or “blowjob”). In the spirit of the joke, “Ça, c’est une pipe” would be acceptable, but only understandable by people who know the English term. However, “C’est une pipe” is absolutely wrong contextually: the lack of the contradiction implied by “ça” creates a semantic disconnect and the two images seem completely unrelated. Not only does it break the humorous device, but it also is absurd enough to be mildly irritating. So, no, the “phrases pictured” are not correct.

7heo,
@7heo@lemmy.ml avatar

I suspect one of the ways that Google detects the invidious instances is with the instance’s behavior: if a lot of different clients use a given instance, it makes it stand out.

Therefore using your own instance is a good way to get around that problem. I think I’ll try that as well.

7heo,
@7heo@lemmy.ml avatar

I mean, in 2024 half of the IT landscape takes minutes to deploy if you can run docker containers… 😅

“It works on my machine!” - “then we’ll ship your machine” meme

7heo, (edited )
@7heo@lemmy.ml avatar

Seeing as other answers are either links, or wall of texts, I’ll try to keep it short and approachable:

  • Encryption, asymmetrical or symmetrical, relies on private keys being private. Once those keys are compromised, the encryption also is (read on).
  • By default, in the most simplistic form, it doesn’t matter when the content was encrypted, the private key can decrypt it. There are solutions to this problem, making encryption time (or iteration) sensitive.
  • For an attacker with enough means, the private keys can always be exfiltrated, and content can be intercepted, but usually there are much simpler solutions for snooping on encrypted content: the devil is in the (implementation) details (this link is an illustration, and by no means an exhaustive list).
  • Cryptography is always simpler to go around than to break. So never be satisfied with a cryptography only (or protocol only) audit. There are near infinite of ways to neutralize encryption with a single line of code in a client.
  • The architecture is also essential. Client-Server encryption has entirely different use cases than Client-Client encryption (EE2E).
  • And finally, Schneier’s law:

Any person can invent a security system so clever that she or he can’t think of how to break it.

7heo,
@7heo@lemmy.ml avatar

They would not even understand, they practice narciss-ism even more often than rac-ism.

Also, talking about inclusivity, this is a (probably not fully exhaustive) list of all the "-ism"s. That is how much of an ignorant cretin people using this neologism are.

7heo,
@7heo@lemmy.ml avatar

Just to add to the QEMU/KVM comment: you can also run an android emulator. The install process is a bit annoying (and contains too many “trust me bro” downloads from Google servers), but it is simple enough and you should be done in around 2h, modulo your uplink.

And at that point, using scrcpy actually helps with the keyboard input.

7heo,
@7heo@lemmy.ml avatar

It depends how critical the data is.

SSDs and flash are great for speed, but as other comments have mentioned, they can eventually lose data more than other mediums. However this reportedly isn’t likely to happen over the normal rated timespan of the devices, unless there is a critical defect.

Magnetic storage will likely last longer, and as it is a much older tech, is less likely to have firmware bugs and other problematic surprises. Plus, as you can see on diskprices.com, the cheapest medium per TB remains magnetic storage.

Then there are tapes. The drives sure cost a hefty sum, but if you have loads of data to backup, this is likely the cheapest option.

Finally, optical. Optical is great in the sense that is is physically a ROM, so data cannot get compromised by mishandling or other staff mistakes; but it still can have issues with the reflective layers peeling away from disks.

So, in the end, I would personally not recommend using SSDs for data backups, out of precaution. Sure, SSDs will likely retain all data just fine for years to come, but I want to be able to store data for as long as possible, with the peace of mind that only magnetic storage will afford me. Plus, if your data is worth backing up, it is worth whatever extra price or effort you will have to do with.

As for the other options, well, they all have their use case, but I don’t see much advantage for them in the general use cases. Just make backup copies of your data on magnetic drives, in a few physically different locations, with proper access control.

7heo, (edited )
@7heo@lemmy.ml avatar

I had SSDs go bad, and mechanical hard drives too. The major plus for me is that with HDDs, it is somewhat predictable, while with SSDs it has always been sudden (in my experience, at least).

However, there are more parameters to consider. The storage temperature, the relative humidity, to backup frequency, etc. In the end, if you want a 100% time proof solution without caring for the costs, engraving a crystal, storing it underground in a lead-lined container, is probably the surest way to go. Everything else is a compromise.

what's a good downvoting guideline to follow?

downvoting everything i disagree with seems excessive and unhealthy, considering i can just ignore and move on. Beehaw doesn’t have downvotes at all, reasoning that you can ignore it and move on or report it, and it seems to work fine for them. i do think downvotes have a use though, i’m just not sure what it is. what do you...

7heo,
@7heo@lemmy.ml avatar

My general guideline is to ignore what I don’t like, downvote what I find harmful. Of course, the first one is emotionally motivated, while the second is rationally so; and therefore doing this requires a conscious choice. So, when I’m too tired, I might fail at doing this. But that’s the intent anyway.

7heo,
@7heo@lemmy.ml avatar

Also got ADHD and the way I managed enjoying running was listening to music (for the rhythm) and “zoning out” (aka meditating). What also works out is focusing on an idea you wanna think about, but you run (pun intended) the risk of getting to interesting findings and needing to note them ASAP…

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #