

Are you just SAVING as these file extensions, or EXPORTING as each type of file extensions.
Not the difference, and see in the File menu that you need to use the EXPORT function to change actual file type.


Are you just SAVING as these file extensions, or EXPORTING as each type of file extensions.
Not the difference, and see in the File menu that you need to use the EXPORT function to change actual file type.




The simplest and most pragmatic option.


How is this a “Glass House” situation?


Interesting if true…


Just flipping through…this person is either not a seasoned “Software Developer”, or possibly self-titled.
All of the confusions and problems described here would immediately be identified by someone who has experience in building and debugging software. The logic is confounding.
Why a dev who had moved to MacOS would even need a justification to just then move to Linux is also very confusing.


This again? 🙄


Yeah…this seems like OP is doing this in extra hard mode, and there are simpler ways to handle the problem.


Unless there is a mapping between a UID of a user across many different machines (something like a domain controller), you’re not going to be able to set proper permissions by user. You need to use a generic group, or provide global read access at a minimum.
I’m not 100% sure why you’ve chosen this route, but there are MUCH simpler ways of doing this that don’t involve VMs and NTFS volumes.
At this point, you’re butting up against 3 levels of nested permissions, including the VM. My suggestion would be to make sure all the files on the NTFS volume have global read access, then go into the VM and attempt to set NTFS permissions on the files (they are different). If that becomes too tedious, you could just try setting 777 on all shared files. It’s unsafe, but may get you through until you find a more…workable solution for what you’re doing here.
I think the overall solution is to just not need this Windows VM, so look at moving these sites off to Nginx or something ASAP.


I did answer your questions, but if I missed something, feel free to ask and I can clarify.


Every YouTube interactions the possibility of ads now.


The clients (apps) enforce key symmetry for your own keys, server identity, and the exchanged with the other person part of a conversation. Constantly. There is no way to MITM that.
The clients are open source, and audited regularly, and yes, builds are binary reproduceable and fingerprinted on release.
That’s not to say someone can’t build a malicious copy that does dumb stuff and put it in your phone to replace the other copy, but the server would catch and reject it if it’s fingerprints don’t match the previously known good copy, or a public version.
Now you’re just coming up with weird things to justify the paranoia. None of this has anything to do with Signal itself, which is as secure as it gets.


The closest you’re probably going to get to a half decent looking WYSIWYG editor is something templatized top to bottom. Odoo, Ghost…things like that.


Nothing in particular. They all seem about the same to me. Check top rankings on GitHub perhaps.


It blocks on all the major engines. DDG included.


This will change your life: https://ublacklist.github.io/docs


I don’t use any Meta products, so not sure how you mean. If you are a user that has been sending e2e messages, then you can surely decrypt said messages if you’re a participant in those messages transactions.
Ain’t nobody gonna buy your stupid Nazibots either, di ckhead. You are universally despised.