• 0 Posts
  • 182 Comments
Joined 3 years ago
cake
Cake day: August 6th, 2023

help-circle










  • I can’t believe you’re dissing systemd indirectly by dissing the reaction of systemd users to the reaction of the users that hate systemd.

    To any neutral observers out there: See!?!! This is the kind of crap we get from the haters.

    /s of course, I have no skin in this game. Any time I mess with init systems, I have to look up usage, no matter the system involved, and I haven’t run into anything too onerous.


  • The Gnome overview is simple enough to use that people think there’s nothing to it.

    I’ve never had a better tool for interacting with apps, and I’ve worked with a lot of tools / DEs. There are some that are arguably more fun, or that clearly give better customization options.

    …but just being a clean tool that works, provides what you need, looks good doing so, and gets out of your way? Gnome, hands down.









  • The universality or lack thereof don’t really matter to me as much as the accuracy and viability of an opinion.

    …but to the point…

    The OS has access to everything on the OS, and that means whoever made the OS does (technically) as well. That is true. But it does not make it pointless to use encryption. It means that you have a vulnerability, and anyone who is in the position to exercise that vulnerability can do so. …but:

    • anyone who is not in the position to exercise that vulnerability obviously can’t, but they could read plaintext by sniffing your connection - unless you use e2ee.
    • The ones who are in a position to exercise that vulnerability must either know you are a target of interest or create a massive monitoring program, monitor everyone, and find you via that method. Both of those circumstances have constraints, and while you are in a safe space due to those constraints, it’s still worthwhile to use e2ee, as that may keep you out of the areas where a bad actor’s affect on you is not constrained.

    Security is cat and mouse. If you’re actually caught up in that you the point where you are a real target or task potential target, get Graphene, and be mindful how you use it, or avoid smart phones altogether.

    If not - assume that you’re not on their radar until there’s a realistic indicator that you are. …and use best practices, like e2ee, wherever you can.