The original post referred to it as a mental illness, and claimed that was a reason to ignore their contribution. I was simply pointing out the silliness of that logic. I dont think its a mental illness, amd I have absolutely no problem with the trans community.
I didnt say anything about trans people in my original comment, and deliberately didnt quote the original post as its language disgusts me. Again, sorry for any offence caused, it was not intentional.
Heya folks, some people online told me I was doing partitions wrong, but I’ve been doing it this way for years. Since I’ve been doing it for years, I could be doing it in an outdated way, so I thought I should ask....
I routinely 100% my root volume accidentally (thanks docker), but my machine has never crashed, it does tend to cause other issues though. Does having a full /usr, /var or /tmp not cause other issues, if not full crashes?
Managing all that seems like a lot of effort, and given my disk issues havent yet been fatal, ill probably not worry about going that far. Thanks for the info though.
Last time i used LVM was way back in fedora 8 days, when it was the default partition. It was super annoying to use, as gparted didnt support it, and live cds often had trouble with it. Having to read doco to resize it was pretty not good for a newbie to linux. Has it improved since?
Yup, for sure, but while a nation state can risk exploitting a zero day to turn on your microphone, an ad tech company certainly can’t. As soon as it get patched they’d be ruined.
They are literally publically claiming that they have a zero day (or at least a zero day level capability). Google/Apple would be all over it trying to fix it. Cyber security researchers would be all over it as well.
NSA can get away with using 0 days for years because they keep quiet about them, and dont use them frivilously.
None of those compelled speech examples include national security though, which has its own level of rules and courts. (I am not American or a lawyer, so i may be wrong).
And if a company can be compelled to hand over customer data, why wouldnt they be hand over access to the systems that update the canaries?
The other issue is thar once a canary is triggered, it cant be reset, which means that XXX agency can trigger the canary with something meaningless, and then its forever untrustworthy.
You may well be correct, and they are sufficient, but i am not convinced that canaries work, especially against the higher level adversaries.
A failed warrant canary is effectively a triggered warrant canary. If its triggered, you have to assume the company has been issued a warrant, and is therefore vulnerable.
Wikipedia does claim that patriot act subpeonas can penalise any disclosure of the subpeona. But i am not a lawyer, and afaik this is untested (or at least undisclosed :/ )
In September 2014, U.S. security researcher Moxie Marlinspike wrote that “every lawyer I’ve spoken to has indicated that having a ‘canary’ you remove or choose not to update would likely have the same legal consequences as simply posting something that explicitly says you’ve received something.”
I think my point is that a gag order with a long time out essentially kills the canary, even if it doesnt affect the vast majority of the services users.
Thanks for your response though, I appreciate the additional information.
Someone please correct me if I am wrong, but I was under the impression that warrent canaries were a broken concept. Anyone with the power to submit a warrant to a company also has the ability to prevent the company from triggering their canary.
Sometimes less is more (lemmy.world)
deleted_by_author
18+ [Content Warning: Transphobia] From the very same people who tell us to "boycott Wayland"
Transphobic comments...
Do Posts Expire?
I’ve tried to comment on older posts, but I get an unknown error warning on some of the older ones. Some only a day old
One single partition for Linux versus using a partition table?
Heya folks, some people online told me I was doing partitions wrong, but I’ve been doing it this way for years. Since I’ve been doing it for years, I could be doing it in an outdated way, so I thought I should ask....
Is it normal that some domain name registrars and hosting companies have an unsecured connection? (image.noelshack.com)
How marketing companies use "Active listening" voice data to target advertising to the EXACT people businesses are looking for
This just blows my mind and makes me feel sick to my stomach that such company’s like CMG Local Solutions do this sort of thing even exist! 🤢🤮...
MIcrosoft teams
Hi . i am forced to use microsft teams but i see that desktop app was discontinued . what are the alternatives ?
Simplifying warrant canaries - Purplix canary (lemmy.nz)
Github: github.com/WardPearce/Purplix.io...