

It’s not FOSS (IIRC) but I think Resolve is fully available on Linux?
It’s not FOSS (IIRC) but I think Resolve is fully available on Linux?
Yes, that is surprising; I’m fairly certain they were involved in developing Bonjour also
I was notified about 3 or 4 breaches just last year, some from companies I’d never even heard of but had my info.
If you’re okay with writing a little HTML and just don’t want to deal with writing/designing the CSS, I recently found out about HTML5 UP, which has a bunch of Creative Commons Attribution 3.0-licensed templates. It’s fairly straightforward to modify the content if you understand the HTML, and then you can host it for free as a static page at any number of places like GitHub Pages or Cloudflare Pages.
If you don’t want to have the CC-By attribution on the webpage, the designer also offers a service called Pixelarity with the same templates and more for a $19/quarter non-renewing subscription. You can continue using the templates even after the subscription expires and can keep making new sites with any template you already downloaded, you just don’t get any updates or tech support when the subscription expires. Upload to one of those free static hosts and it’s dramatically cheaper than Ghost or WordPress, and probably less work than a static site generator for something that’s not changing often.
What’s the deal with Linux and Nvidia? Do the official drivers suck, or is it people not wanting to use a closed source driver but not having good open source drivers? I might have access to a good gaming PC soon but it has an Nvidia card.
I liked this read when considering legal ramifications for hosting content. It is U.S. focused so it might not be applicable to someone in another country.
I’m no expert but given the repeated efforts from governments around the world to get backdoors added to encryption and frequent pushback from big tech, or at least Apple, I’m more inclined to think there currently, or recently, aren’t backdoors. At least, not easy ones, not official ones. As an example, recall a few years ago there was a terror-related attack in the U.S. where someone tied to Muslim extremists went on a shooting spree before taking his own life (I’m not bothering to look up the details and my recollection could be flawed). The attacker used an iPhone and the U.S. government took the opportunity of strong public outrage to try to force Apple to create a tool to break the encryption on the iPhone so they could examine its contents. Apple resisted and the effort went to court, with the decision eventually being that Apple did not have to break the encryption. The government then revealed that they had access to a third party tool that they used to break into the phone and recover its contents. That’s pretty much been the pattern before and since: a government will try to find a cause that seems likely to gather widespread support and use that to get a backdoor they promise not to abuse, and the companies push back to varying degrees. All the while there seem to be third party tools that exploit various flaws, including zero-day flaws to gain the access the companies won’t provide. My impression is that at least a couple times a year there’s a story about an Apple security update patching these holes and notifying certain users if they may have been targeted.
It’s possible that’s all just theater put on by the U.S. and allies to help Apple or Google tell governments the U.S. doesn’t trust, “see, we can’t even give the U.S. government we’re subject to access, so we certainly can’t give you access.” Given some of the cases that have been used to try to force access, though, I’m more inclined to think the government really doesn’t have the easy access some might like.
Of course, it’s also possible that some of the flaws used by zero-day exploits to gain access are intentionally planted, either by the software companies or by an individual programmer acting at a government’s behest. The later patches could be to maintain appearances to outsiders, since there always seem to be additional flaws. Still, programming is hard enough and operating systems are complex enough that I’m more inclined to say that usually these really are just human error and not something malicious.
None of that is to say that anyone should fully trust these encryption systems. Used properly, they’re probably good enough against ordinary hackers, people just looking for financial rewards. You can keep your family photos, important records, school notes, etc. on them without worrying too much. Financial records you might want to doubly encrypt, just so they’re not so easy to exploit if there is a breach and data dump. If you’re doing something any government cares enough about to really investigate, they’re probably going to find a way into your computer, phone, or cloud service, depending on how motivated they are. Maybe not some impoverished “third-world” governments, but most of the big ones have some resources. I’d be extremely cautious about things that could actually send someone to jail, either in your own country or one that is less friendly.
These are browser engines, or at least software for rendering HTML but not necessarily the actual browser. I don’t know them all, but top left, Gecko, is the engine for Mozilla, center is Web Kit for Safari, bottom center is Chromium for Chrome, Brave, Edge, etc., and bottom right is Trident, the old engine for Microsoft Internet Explorer.
I suppose there’s a reason a Brit wrote 1984?
Your website hasa banner that says it uses cookies and that by using it I acknowledge having read the privacy policy, but if I click More Information it takes me to a page the wiki says want created yet.
I kind of think going no encryption is arguably better than agreeing to a backdoor, since it should make it clear to consumers that they can’t trust it as safe and should probably use an alternative that would be more secure. I don’t know how many trustworthy alternatives really exist on iOS, though, not least because Apple has allegedly used their position to discourage competitors to iCloud.
This is the second reference I’ve seen to this today, so I had to look it up and see that it is (was) in fact real.
I’m annoyed at the top line of the terminal showing the bottom line of the video
As a solid outsider, this whole Rust thing seems like it keeps simmering under the surface in a way that could one day boil over and seriously damage the entire Linux project.
I don’t have a machine capable of running Asahi today, but I also don’t feel like I need it now. Reading this and reading marcan’s resignation makes me feel like I should find some way to chip in to Asahi now so that whenever Apple eventually stops supporting my hardware, Asahi will hopefully still be there and ready to keep the hardware going. I figure I probably have about 6 years of Apple support, but I’m also suspecting Apple might support the ARM hardware longer than they ever did Intel or PowerPC, so I might have even more time.
I’m guessing this is nothing to do with the plant that can grow on amusing terra cotta sculptures?
Pull the plug on your computer sometime to try it out?
I have not used them myself, but M-DISC sounds like what you’re looking for. There are a few other alternatives listed on that Wikipedia article, too.
I was just looking into this and going to post a similar question to the community. I saw a post recently about Friendica and thought that and Pixelfed might be things I’d be interested in self-hosting my own accounts, since I’d probably want those to be things I keep followers-only and connect only with people I know IRL. I’ve only used shared web hosting before and Friendica looked straightforward enough, but Pixelfed seemed much more involved. I’ve never done anything with a VPS before; I think I could do it but if anything went wrong I might be in trouble. Would that be an okay starting point or is that jumping in the deep end? I assume I’d be able to host both on the same VPS?
“Apple is being thoughtful about doing this in a (theoretically) privacy-preserving way, but I don’t think the company is living up to its ideals here,” observed software developer Michael Tsai in an analysis shared Wednesday. “Not only is it not opt-in, but you can’t effectively opt out if it starts uploading metadata about your photos before you even use the search feature. It does this even if you’ve already opted out of uploading your photos to iCloud.”
Reading the article, the service itself is interesting and it sounds like Apple might have found a way to process the data while preserving user privacy, but the fact that they unilaterally opted everyone in without giving them a choice is the biggest problem.
Yes, but you said you were using Resolve for color grading. My understanding is you should still be able to use that on Linux, but I haven’t tried it yet myself.