cmgvd3lw

joined 1 year ago
[–] cmgvd3lw@discuss.tchncs.de 5 points 8 hours ago

Thanks for the 01, I thought one meant 03

[–] cmgvd3lw@discuss.tchncs.de 0 points 8 hours ago* (last edited 8 hours ago) (1 children)

What? You got what?

[–] cmgvd3lw@discuss.tchncs.de 1 points 8 hours ago (1 children)
  1. What is the benefit of creating users for every service? Wouldn't one be sufficient?
  2. Also just out of curiosity, why not in sodo'ers list?
[–] cmgvd3lw@discuss.tchncs.de 3 points 16 hours ago (1 children)

Are they breeding face huggers?

[–] cmgvd3lw@discuss.tchncs.de 22 points 19 hours ago (3 children)

One of the main advantage of podman is that, it respects the firewall rules. Docker don't do that. Also having rootless podman means if somehow the container went rogue, it cannot have access to your root directory and perform malicious actions.

Also podman is a drop in replacement for docker. It does not need much configurations to setup. If you need compose, you might need to install podman-compose as well.

[–] cmgvd3lw@discuss.tchncs.de 27 points 1 day ago

Put a nsfw tag please

[–] cmgvd3lw@discuss.tchncs.de 30 points 1 day ago (2 children)

Totally, we don't want numbers for the sake of numbers. We need passionate people who are ready to ditch other mainstream ones for federated alternatives. Then only we can grow.

[–] cmgvd3lw@discuss.tchncs.de 9 points 1 day ago (3 children)

Lemmy also has bots though. Luckily you can block them.

[–] cmgvd3lw@discuss.tchncs.de 5 points 1 day ago (1 children)

If this isn't an edit, I would like to know what happened next in this image.

[–] cmgvd3lw@discuss.tchncs.de 10 points 2 days ago (2 children)

Why don't we let AI play the game and we do all the work instead?

 

Please suggest a good and relatively affordable private email provider. I am considering tuta, mailbox right now. I know proton has gone rogue.

I cannot self host one and the email provider must be somewhat reputable as I will be using this for my work portfolio. Anything with €1-€3 per month is encouraged.

22
submitted 3 weeks ago* (last edited 3 weeks ago) by cmgvd3lw@discuss.tchncs.de to c/opensource@lemmy.ml
 

I was looking for a good and quick file transfer method and stumbled upon Warp on Linux (flatpak). It says the app is open source but I did a quick Lemmy search and someone mentioned the protocol magic wormhole is closed.

Even though I found the application very useful, like I can transfer files even when connected to a VPN service, the closed source nature turns me off.

Also when operating without a VPN, wormhole connects via local network, my desktop is behind a firewall, but the transfer still happen! How does it do that without opening a port in f/w?

Any alternate suggestions are welcome as well.

Edit 1. The domain for the magic wormhole relay and transit server that most open source clients (like Warp) use is magic-wormhole.io. I have to check if they really are open source.

Edit 2. There seems to a mention of the magic-wormhole.io domain in their PyCon 2016 presentation.

 

I am a complete noob when it comes to crypto and would like to buy some and use it for an anonymous transaction. But I don't know how to though.

Can I buy it with my credit card? What are some good wallets or buying authority? Should I go for an international one or stay local?

 

Many YT privacy frontends are down it seems. YouTube is cracking down on these servers fast. Both Invidious and Piped services are not working now.

So how are you watching videos now? Just plain youtube[dot]com with unblock and VPN?

 

cross-posted from: https://discuss.tchncs.de/post/26495994

  1. Reservoir Dogs (1992): A crime thriller about a group of criminals whose diamond heist goes awry, leading them to suspect one of their own is an undercover cop.

  2. Pulp Fiction (1994): A cult classic that intertwines multiple storylines involving hitmen, a boxer, and a pair of armed robbers in Los Angeles.

  3. Jackie Brown (1997): Based on Elmore Leonard's novel, this film follows a flight attendant caught in a money smuggling scheme, playing both sides against each other to secure her freedom.

  4. Kill Bill: Volume 1 (2003): An action-packed revenge saga about "The Bride," a former assassin seeking vengeance against her former colleagues.

  5. Kill Bill: Volume 2 (2004): The continuation of "The Bride's" quest for revenge, exploring her backstory and relationships.

  6. Death Proof (2007): Part of the "Grindhouse" double feature, it follows a psychopathic stuntman who uses his "death-proof" car to stalk and kill young women.

  7. Inglourious Basterds (2009): Set during World War II, it follows a group of Jewish-American soldiers planning to assassinate Nazi leaders.

  8. Django Unchained (2012): A Western about Django, a freed slave who teams up with a bounty hunter to rescue his wife from a brutal plantation owner.

  9. The Hateful Eight (2015): Set in post-Civil War Wyoming, it follows a group of strangers seeking shelter during a blizzard, leading to a violent confrontation.

  10. Once Upon a Time in Hollywood (2019): Set in 1969 Los Angeles, it follows a fading actor and his stunt double navigating the changing film industry.

 
  1. Reservoir Dogs (1992): A crime thriller about a group of criminals whose diamond heist goes awry, leading them to suspect one of their own is an undercover cop.

  2. Pulp Fiction (1994): A cult classic that intertwines multiple storylines involving hitmen, a boxer, and a pair of armed robbers in Los Angeles.

  3. Jackie Brown (1997): Based on Elmore Leonard's novel, this film follows a flight attendant caught in a money smuggling scheme, playing both sides against each other to secure her freedom.

  4. Kill Bill: Volume 1 (2003): An action-packed revenge saga about "The Bride," a former assassin seeking vengeance against her former colleagues.

  5. Kill Bill: Volume 2 (2004): The continuation of "The Bride's" quest for revenge, exploring her backstory and relationships.

  6. Death Proof (2007): Part of the "Grindhouse" double feature, it follows a psychopathic stuntman who uses his "death-proof" car to stalk and kill young women.

  7. Inglourious Basterds (2009): Set during World War II, it follows a group of Jewish-American soldiers planning to assassinate Nazi leaders.

  8. Django Unchained (2012): A Western about Django, a freed slave who teams up with a bounty hunter to rescue his wife from a brutal plantation owner.

  9. The Hateful Eight (2015): Set in post-Civil War Wyoming, it follows a group of strangers seeking shelter during a blizzard, leading to a violent confrontation.

  10. Once Upon a Time in Hollywood (2019): Set in 1969 Los Angeles, it follows a fading actor and his stunt double navigating the changing film industry.

 

Was browsing on the GrapheneOS website and came across a new thing called WebUSB, which is essentially a JS API through which GrapheneOS web installer worked.

This got me wondering, if website could read what's plugged into my computer like my phone or disks, isn't that a huge risk to privacy? I don't know how this works (haven't used it) so I would like to know about its privacy.

AFAIK Firefox doesn't allow this API, so that's a relief (I use librefox), but what about other browsers? I am getting a bit paranoid.

[Also, are there other APIs like these; which are a privacy nightmare that websites could use?]

26
submitted 7 months ago* (last edited 7 months ago) by cmgvd3lw@discuss.tchncs.de to c/privacy@lemmy.ml
 

I began using invidious after every piped instances refused to play videos lately. But what I read from their docs is that my IP might get exposed to google servers while loading videos from invidious. I use rethink DNS app and in that I can see all the domains that are getting called by my browser.

I tested about five instances and none are calling googlevideo domain as mentioned in the doc. Are they proxying my requests by default or am I missing something?

No, I don't have the option proxy video turned on. I use yewtu.be as my main invidious instance.

 

Couple of months prior, I read an article on Mozilla, where they did a research on automakers and found none comply to good privacy measures. I am planning to buy a used car. I want to know how the data is collected and transmitted.

The car comes with a connected app though I am not planning to use it. It also has apple car play and android auto. Should I use those? The article states some manufacturers even records sexual activities. How are they transmitting these informations? Through connected phones?

My use is fairly basic, I want to use the Bluetooth audio system in the car for listening to music on my phone. I use maps on my phone.

What about car servicing? Can they access stored information?

 

With the recent WWDC apple made some bold claims about privacy when it comes to so called Apple Intelligence. This makes me wonder if they did something to what Microsoft did with Recall feature, would people be less concerned and to an extend praise their effort?

Do you trust apple with their claims?

 

(timestamp-link) iPad Pro M4 Hands on - Why I just bought it.
Review from a top YT reviewer, Mrwhosetheboss. How do you guys feel about it?

 

Applications like EndeavorOS Welcome, Tor browser won't show their actual icons on the taskbar after Gnome 46 update. I have observed that applications launched by invoking the binary through terminal using ./ behaves this way. (Not sure about the EOS Welcome) Is there any fix to this?

OS: EndeavourOS Linux x86_64. DE: GNOME 46.1. Icons: Papirus [GTK2/3].

[Edit: This is not a freshly installed system. Icons were working fine till Gnome 45.]

view more: next ›