I remember playing Minecraft on Ubuntu 14.04, does that count?
I remember playing Minecraft on Ubuntu 14.04, does that count?
KDE does fractional scaling really well, GNOME has big issues though.
Probably, since GNOME is a poorly written piece of shit
Sounds more like a GNOME problem
Actually, it’s the desktop environment that doesn’t know how to handle scaling. It’s mostly a GNOME issue, I never had any issues on KDE.
Electron and Xwayland don’t cause problems. GNOME is the only source of problems on Linux.
Do you use bash? If not, which one do you use? zsh, fish? Why do you do it?
Mostly fish, because it just feels much more modern than bash, it has good built-in autocomplete and I don’t have to install millions of plugins like of zsh.
Do you write #!/bin/bash or #!/bin/sh? Do you write fish exclusive scripts?
Occasionally I also write fish scripts. Just replace sh with fish.
What should’ve people told you what to do/ use?
general advice?
As @crispy_kilt@feddit.de already suggested, use shellcheck.
is it bad practice to create a handful of commands like podup and poddown that replace podman compose up -d and podman compose down or podlog as podman logs -f --tail 20 $1 or podenter for podman exec -it “$1” /bin/sh?
I don’t think so
You don’t need to worry about whether it’s relockable, but it’s important that it can be unlocked in the first place. Just don’t get it from a carrier and you’ll be fine. Buy the phone from some store like Best Buy.
To answer your second question: It uses USB-C.
The standard seems to be complete and utter garbage. It was garbage from the very beginning, which is why I never understood why people were getting so incredibly hyped up about RCS support.
Well yeah, it’s not a proper long-term solution. But making a twitter account with a burner email from Guerrilla Mail is surprisingly easy, I guess that will be the only option going forward.
Basically every bank blocks Tor and many even block VPNs. Also, Tor Browser is not particularly secure. It’s been designed for fingerprinting resistance and network anonymity through the Tor network. The Tor Browser is based on Firefox, which lacks many important security features like site isolation, Control Flow Integrity or any meaningful sandboxing. I absolutely hate Google and their monopolistic business practices, but Chromium is by far the most secure browser. Especially when it’s running on a secure mobile operating system. GrapheneOS goes even further than Android and deploys a hardened memory allocator (which was actually ported from OpenBSD), which significantly reduces the risk for memory coruption. On the newest generation of mobile SOCs (ARMv9), GrapheneOS enables memory tagging by default. Again, find me a desktop platform with MTE. This once again proves my point that mobile devices are simply more secure. Every single piece of hardware and software in your phone has been built with a strong focus of security.
Or, better, use monero.
I absolutely agree on this one. Look at the Lemmy instance I’m on. I’m a big fan of Monero, but unfortunately there aren’t many places that accept XMR.
No, Tails doesn’t solve this issue at all. It’s built for maximum anonymity, not security. It also uses Tor for all connections, which will get your bank account locked immediately. Qubes is a good option for security, but it’s way too complicated for most users. Stop making up some random shit and accept that mobile devices running modern operating systems are reasonably secure and definitely more secure than your ordinary desktop.
Americans have something even worse: SMS
I’m talking about the security model of the platform, not the way you use your devices. If you do your online banking in a browser on your computer and your system gets infected with malware, that malware can access all the files on your computer. Including application data of your browser. It can access your cookies, which your bank’s website uses to store your login information. Such an attack is impossible on a mobile device, since apps can only access their own data, and inter-process communication is heavily restricted. Additionally, mobile operating systems like Android have complex permission systems, as well as kernel-based mandatory access control like SELinux/SE for Android. Your typical desktop OS has none of that. Android also has a strong implementation of Verified Boot, which makes sure that malware can’t persist on your system partition, even after your device gets infected. I recommend this video if you want to learn more about mobile device security: https://youtu.be/yTeAFoQnQPo
A phone is more secure than most desktop computers. https://youtu.be/Wd4Pa03LvLk
GrapheneOS even significantly improves Android’s already pretty good security model.
Oh sorry, my bad. I meant it’s not some third party app that has to be installed with root privileges, but rather just a well integrated part of the system, which uses Android’s permission system to deny internet access.
I remember having used Shotcut many years ago
If the machines are on the same network, try LocalSend
GrapheneOS has a built in Firewall that doesn’t require root privileges. Also, you don’t trust the GrapheneOS devs who arguably create one of the most secure operating systems on the planet, which is open source and can be verified by everyone, but you trust Calyx devs who regularly go months without releasing any Android security patches and include highly privileged third party apps in their operating system. Makes a lot of sense.
Underrated comment