

Fark still exists?!
If only I could read it… endless captcha loops for me.


Fark still exists?!
If only I could read it… endless captcha loops for me.


It has newer packages than Debian. And even though Debian releases new stables every couple years, at least historically, it has kept old package versions around for way longer than that. Before I started using ubuntu sometime in the '10s, it was normal for a debian stable package to be upwards of 10 years out of date.
And it wasn’t like today where you have containers/VMs, PPAs, flatpak/appimage/snap/etc… if you needed a newer version of a package for whatever reason, often you couldn’t just compile it yourself or use the testing/unstable one because it had cascading dependencies that were also newer, so you were just screwed. Being able to have a “stable” release with newer packages was a huge draw for Ubuntu.


TL;DW Mind your OPSEC, and AIs aren’t magic. It can only find what information you willingly give up in the first place.
The authors of this paper also refuse to publish their exact testing methods “for safety.”


Those benchmarks compare Wine NTSYNC against upstream vanilla Wine, which means there’s no fsync or esync either. Gamers who use fsync are not going to see such a leap in performance in most games.
If you’re using lutris or proton/etc., you’re probably already using esync/fsync.


My bet would be ulterior motive.
What’s next, gender? Race?


techlore has burned bridges with every group/platform they have attempted to partner with


Linux is not an operating system, it’s just the kernel and has no concept of users/accounts or logging in to anything.
A great many Linux-based distros (“operating systems”) are not under US jurisdiction.


I have to yet to find any fingerprint-evading solution that works on Linux and can actually beat creepjs reliably… besides disabling javascript completely, which puts you in a whole new (much, much smaller) set of people that can still be fingerprinted with non-JS solutions including html/css/header methods as well as TLS fingerprinting like JA3/JA4.


It still works, you just have to provide a unique user-agent. There’s also x0.at which has a web upload form as well.
It doesn’t, pretty sure the repo is a joke. Their code doesn’t do anything special, just runs the program you give it.
Yep, the project must be a joke because the code doesn’t actually do anything besides run the specified program normally.


Only if your OPSEC was already bad… LLMs aren’t magical, they’re just piecing together information you already gave away freely.
Also the authors of this paper refuse to show their work “for safety.”


I wouldn’t blanket call the removal of PFS a “failure” as they put it… it does make the protocol much simpler (and hence easier to understand/audit as well) and it’s not always a necessity for every single person’s threat model… which is an important phrase the article doesn’t even mention.
IMO arguing about security or privacy without both people first defining their threat models… is like claiming apples are objectively better than bananas in every way.


If they did, it’s still entirely possible to use your own e2ee for messages between friends on any app just by using an encrypted keyboard app on your phone (like KryptEY).
it’s not paranoia if they’re really out to get you


assuming it actually listens to you. in the past people have had settings randomly turn back on.
deleted by creator


URLs can have newlines too
also Japan: “what’s a11y?”