Comments

This profile is from a federated server and may be incomplete. Browse more on the original instance.

ReversalHatchery, to piracy in DAS or NAS for an Arr Setup w/ Plex?

NFS

waiting for locked database

I agree that sqlite is slower through the network than a database server that was made with that in mind, but I think in your case the majority of it was something different.
I’ve recently read in the Jellyfin docs about problems with fs locks on an NFS share, and the point is that NFS does not enable locks by default or something like that, and you have to configure it yourself.

ReversalHatchery, to linux in I'm ditching htop for btop, look how cool it is

I think they mean the variable width of the graph’s columns. If you watch it as the graph moves, there are gaps at every 2 columns.

I don’t understand though the thing about font priorities.
And also, would that just change all fonts? Unless you mod the font to only have the braille characters…

ReversalHatchery, to privacy in ProtonMail Complied with 5,957 Data Requests in 2022 - Still Secure and Private?

At the same time it’s also important that the provider only complies with requests where it legally has to. I trust Proton to act this way.

ReversalHatchery, to privacy in Here's what telegram's founder say about Whatsapp's privacy

They tell whatever they want until their claims can be validated with the source code. If we take it for granted that they use an original, unmodified version of the signal protocol programming libraries, there are still multiple questions:

  • how often do they update the version they use
  • what are they doing with the messages after local decryption (receiving), and before encryption (sending)
  • how are they storing the secret keys used for encryption, and what exactly are they doing with it in the code

Any of these questions could reveal problems that would invalidate any security that is added by using the signal protocol. Like if they use an outdated version of the programming library that has a known vulnerability, if they analyze the messages in their plain data form, or on the UI, or the keypresses as you type them, or if they are mishandling your encryption keys by sending them or a part of them to wherever

ReversalHatchery, to privacy in Is this even legal? Hiding data deletion behind login (after email request)

Password reset requires saying when the account was created (month and year) and “tech support” can’t help here either.

Did you try the date of their first email?

ReversalHatchery, to privacy in Requested Review: AppCrypt by Cisdem

You can do that without this software too. Create separate windows accounts for every member of the family, preferably offline accounts (which are not attached to a Microsoft account and an email address), and put a password or a pin code on yours.

ReversalHatchery, to privacyguides in Does Google still hold contact data after deleting from Google Contacts?

I don’t think there’s a factual answer to this question.
My take on it though is why would they delete it? They can make use of it in various ways, and in new ways every once in a while, and it’s not like as if you could prove it in court or even just find out that they didn’t delete your data.

ReversalHatchery, to linux in What's with all these hip filesystems and how are they different?

are there applications where zfs/btrfs is more or less appropriate than ext4 or even FAT?

Neither of them likes to deal with very low amounts of free space, so don’t use it on places where that is often a scarcity. ZFS gets really slow when free space is almost none, and nowadays I don’t know about BTRFS but a few years ago filling the partition caused data corruption there.

ReversalHatchery, to linux in Just read Madaidans Insecurities. Do you know how much is still relevant?

I remember reading there, when it wasn’t on github pages but it’s own website, the recommendation to keep your critical dotfiles permissioned to a different user account of yours. I don’t think that’s bad advice. Yes it is probably not needed if you use the system as a pro sysadmin for server purposes, but for desktop use it’s just natural that you’ll run a lot more programs in a much less controlled manner.

Of course there were ones that I thought they went overboard, but it has at least a few good pieces, if not more, I don’t really remember.

ReversalHatchery, to memes in "OpenAI Staff Threaten to Quit Unless Board Resigns"

I can also google that the earth is flat

ReversalHatchery, to privacy in Feeling like Privacy is a lost war.

Even you were comfortable giving your address and name to 4 other parties

They have never said that, did they?

ReversalHatchery, to privacyguides in Why Not Store Encrypted Emails in Plaintext Locally?

Protonmail now supports searching in the content of all your mail, though.
Or at least the web client. It will ask you to download all your mail, and it will make an encrypted search index on your computer.

ReversalHatchery, (edited ) to piracy in Is BT over Tor still not recommened?

I think they meant the former, but if there were downvotes that’s still weird

ReversalHatchery, to memes in True next-gen graphics

I wouldn’t think that the city on the planet where the screenshot was made (and I don’t remember the name) was procedurally generated

ReversalHatchery, to piracy in Special Ubisoft announcement

You wouldn’t own a house!
You wouldn’t own a car!
You would be happy!
Because we said so.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #