ReversalHatchery

joined 2 years ago
[–] ReversalHatchery@beehaw.org 1 points 8 hours ago* (last edited 8 hours ago)

I mean with something easier than OBS, but which works on KDE or any other desktop. something like OnTopReplica on windows

[–] ReversalHatchery@beehaw.org 2 points 8 hours ago

sure! I use the libredirect addon: https://github.com/libredirect/browser_extension/ works in firefox on desktop and mobile

it redirects various privacy invading services to privacy preserving alternative frontends that are ran by volunteers. by default it only redirects youtube, so you would need to toggle on reddit too. Currently it only uses 1 redlib instance by default, you may select more to be used in the addon's settings.

redlib and other frontends are distinct projects. their project page often has a list of public instances. here is redlib's page: https://github.com/redlib-org/redlib
but you normally don't have to look at it because libredirect updates its instance list automatically

sometimes an instance is temporarily blocked by reddit, if that happens you can quickly switch to a different instance in the addon's menu.

redlib and other frontends usually have some cpnvenience settings, be sure to check them out. but they need cookies allowed, and they are not synced across instances.

[–] ReversalHatchery@beehaw.org 2 points 8 hours ago

this does not necessarily need goofle code. It's just slight theming. limited to ugly pale colors, if I had to guess

[–] ReversalHatchery@beehaw.org 2 points 10 hours ago* (last edited 10 hours ago)

Probably. I think they may fine homeserver operators in the EU, maybe even raid their homes or jail them. But to me its unclear whether hosting it, or also using it will be a criminal offence.

Hopefully neither, and we can jail the real terrorists, those who want to get this implemented.

[–] ReversalHatchery@beehaw.org 1 points 17 hours ago (2 children)

isn't it possible with some external utility? OBS can capture individual windows with pipewire, and it can render that to a new window, so it must be possible with something easier too

[–] ReversalHatchery@beehaw.org 2 points 17 hours ago

once I noticed failures on my ventoy pendrive because a specific bootable system had unexpected bugs each time I booted it. after I have rewritten it from backup, it was working fine again.

but bitrot works this way not just on pendrives, but SSDs and HDDs too. the system won't know unless it tries to read the file. SMART selftests may help. but even then, what good it is if it does not let you know actively?

[–] ReversalHatchery@beehaw.org 3 points 17 hours ago* (last edited 17 hours ago)

are you sure that it has that access?

on my phone the "select file to open" button just opens the system built in file browser, which is used to grant apps access to individual files or directories.

[–] ReversalHatchery@beehaw.org 1 points 17 hours ago

I think internal storage access was behind a permission too for very long, if not always. and I mean a toggleable permission that is default off.

[–] ReversalHatchery@beehaw.org 6 points 17 hours ago (2 children)

I don't think re-registration is a problem for most of us. we just don't want to go there on a daily basis anymore. especially since all apps have been kicked out other than that garbage, data mining official app.

nowadays if I go there, I only do because I'm following a link, and then I always use a redlib instance to view the content

[–] ReversalHatchery@beehaw.org 2 points 1 day ago (2 children)

you don't need the whole usb drive to fail. It's enough if a sector or two went corrupt, and you won't be able to open (or even see) a directory, or copying a file will stop in the middle. maybe files disappear too, and then at best they get recovered to FOUND.001 or such directory without path and name, maybe also just partially, or interleaved with other lost or deleted files' fragments

but surely microsoft keeps multiple copies! they are infallible!!

okay, all good then. the reason of my suspicion is that I'm not confident about the practical legality of warrant canaries. thought maybe you couldn't say it according to spec, so maybe tried to publish an invalid one by including a little "mistake".

 

I cannot access the I2P site on the http://rwzulgcql2y3n6os2jhmhg6un2m33rylazfnzhf56likav47aylq.b32.i2p/ address, either in the web browser but also for news and price synchronization in the wallet. Is this on my side or a serverside issue? In the browser, the I2P router always just responds "Website Unreachable", because its lease set was not found.

For those wondering where did I get the URL, it can be found at the bottom of https://featherwallet.org/

 

Recently there was a post where the OP pitched an idea for a service related to this community. I don't want to go into details but the post's text has shown that maybe there's some misunderstanding around the technology, and a considerable amount of us also thought that it's not a good idea.
The post was removed (noticed because I couldn't reply to someone) probably because the OP felt shame for their "failed" idea, but I think we shouldn't delete posts for reasons like this.

The post created an interesting discussion around the idea with useful info. It's useful to have things like these for future reference, for similar discussions in the future.
This is an anonymous forum, so there's no shame in recommending things, when you do that politely like it was done in that case.

 

Introduction of the first Managing Director

 

I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/.

Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.

I have checked the version of gem by running gem --version. This is on a Debian Bullseye based distribution.

 

The video is a short documentary on Trusted Computing and what it means to us, the users.

If you like it and you are worried, please show it to others.
If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.

view more: next ›