Now run an emulator within an emulator for extra acceleration.
Now run an emulator within an emulator for extra acceleration.
I’ve used it for the exact same purpose, great minds think alike. It’s perfect for that scenario given there’s no internet.
I just don’t use it much otherwise because apps like Signal are far easier to move my friends and family on to and they’re more than good enough. The metadata privacy Tor would provide would give me a lot of peace of mind but I know it’ll never happen.
deleted by creator
I really liked how coupling is described as “knowing.” I find we talk about “does x need to know about y?” more than we do “is x overly coupled to y?” because the former is a relatable indicator of the latter.
I was going to say that Cloudflare uses nginx but I found that’s no longer true.
I use a UK keyboard, |
is pretty easy to access and is Shift+4.
I’m guessing you mean more exotic keyboards. I’ve used a Swedish keyboard while helping a friend and I had to ask where every key was. You probably just learn the combinations eventually.
I feel like this is overlooked far too often. I rarely see anyone use data structures outside of (array) list and hash table and any attempt to use something descriptive of the problem is often shot down because of “familiarity,” which is sort of self-fulfilling.
I get away with flagging lists which should be sets, though.
I think you’re asking if it’s possible for your government to be a man-in-the-middle? Depending on which government you live under, the answer is likely no but more importantly the answer will always be; it’s not worth their effort to find out what you’re watching.
YouTube’s public key is signed by a certificate authority whose public key (root) is likely installed on your device from the factory. When you connect to YouTube, they send you a certificate chain which your browser will verify against that known root. In effect, it’s information both you and YouTube already share and can’t be tampered with over the wire.
Technically, those signatures can be forged by a well resourced adversary (i.e. a government) with access to the certificate authority through subversion, coercion, etc. At the same time, it’s probably easier to subvert or coerce you or YouTube to reveal what you watch.
Yep, employers under capitalism only understand leverage. Job hop, play multiple offers against each other, negotiate a higher salary and have the power to walk. It feels sleazy but it’s self preservation. It’s only as sleazy as their incentive to pay you as little as possible.
“Hard work” was the wisdom passed down but I think it came from confirmation bias. If your employer gives you good raises just to keep you, you’ll feel you deserve it instead of attributing it to a very good job market for workers.
It’s cool, we figure it out after a year or so in this environment (if nobody has told us.)
Just wanted to add a bit about Proton since you mentioned it and I use it quite heavily.
Pros:
Cons:
Otherwise these two are largely like-for-like for e-mail. There’s no benefit to Proton being hosted in Switzerland and I didn’t move to be warrant-proof or anything silly. The idea is really just moving emails away from an advertising company and paying for a quality service.
I was really surprised by the general positivity on Mastodon and it was the first thing I noticed when I signed up. There’s sometimes a little drama, but it’s not the overarching theme by any means. I’ve had a lot of laughs there.
Yeah and this still wouldn’t cover something like xz-utils because I would only be aware of end user projects and not the libraries behind them. I’d have to draw up entire dependency graphs.