

Gimp, krita, inkscape, scribus covers my needs well


Gimp, krita, inkscape, scribus covers my needs well
Real meme is in the comments
Tell me you’re new here without saying you’re new.
My work has a process for requesting software. Over the last five years, I’ve been slowly getting open source alterntives approved, using them, and telling coworkers they’re approved. It’s just one super specialized software left.
Here, you’ll probably like this book: https://drive.google.com/file/d/0B8qUyTkGux7eYkNES2gtNHBLcFE/edit?resourcekey=0-hxPdlh0Y1k6UnRqKYV-2iA
https://en.wikipedia.org/wiki/I2P
I2P and Tor both aim to provide anonymous internet browsing but differ in their architectures and methods. Tor (short for The Onion Router) uses a system of layered encryption to route internet traffic through a network of volunteer-operated servers. This creates a series of encrypted layers (hence the onion analogy) that mask the user’s IP address and data content from any would-be observers.
In contrast, I2P uses a garlic routing technique, where multiple messages are bundled together into a single encrypted packet. This method enhances privacy by making it more difficult for anyone to analyze the traffic and link the data back to specific users.
Also, Tor supports access to the open internet (clearnet), while I2P only allows access to websites and services (known as eepsites) within its own networks. Outproxies, which are similar to Tor exit nodes, can be used to access the clearnet with I2P. However, this reduces privacy as your data leaves the network and is a less common use case.
Based on OPs experience this is the best solution.
If they want to learn, I found plex + plexamp was pretty easy to get going.


Is there an actual open source alternative to visio?


The logic in the flowchart appears to take in data and mainuplate it based on normalization and ratios to fill the day. So it outputs a report with time that doesn’t precisely match the tracked data, but looks nicer for the boss.


Ok, technically still vulnerable in the sense that if you transfer a huge file in excess of other parts of the bundle, it might be identifiable by a bad actor, but that’s really misleading, since i2p has a lot of built in logic that makes that scenario pretty unlikely.


You linked an article that doesn’t say anything to back up your claim. Why do you say i2p is vulnerable to timing attacks?
Ubuntu used to do ads pretty well, even before microsoft got better at them, haven’t used that distro in a while, so can’t confirm if that’s the case still, but you might want to check it out.
are those real? I don’t believe anyone ever said “it’s like linux but it works.”
Great question. Gmail is still OK, but if love to degoogle more.


It’s a little different than that, isn’t it? More like: " look at what I built, here’s a step by step guide that makes it work. Do with it whatever you want." Some people want to use it for their job. Others might use it for personal use, or to build more open source projects.
I use it and find it works just fine.
What’s wrong with freecad?
I wish lemmy had more niche interest groups, like marvel champions card game. Then there’d be something to talk about that isn’t how we should force others to give a percetage of their earnings to the goxernment.