

“you can’t make some one think there way out of something, they did not think their way into”.
he would have to think before he talks, but like all B.S.ers, he never thinks he just keeps vomiting bs till you get tired of him talking and agree.
A mess of a girl, free on the internet. A spicy meatball indeed :3


“you can’t make some one think there way out of something, they did not think their way into”.
he would have to think before he talks, but like all B.S.ers, he never thinks he just keeps vomiting bs till you get tired of him talking and agree.


absolutely, without question, and charged casinos in Niagara Falls for their views of Canadian river lol

not always possible in small spaces and single cook


the law wouldn’t hold up in court anyway. its not practical for any ecosystem outside online sites.
accounts and users are the same thing, despite what the law says. it also doesn’t different a person from a user, meaning a compromised system that is complying with the law, its actions represent the user, and the account holder is held responsible.
its made to absolve meta/Microsoft/google from their actions in targeting kids with intentionally addictive content and making the “account holder” at fault.


are you sure it’s even a person, not a bot? because this all screams either bot or seeking internet fame as the “hero to kids”.


because it’s all part of a larger project to collect usable data. you can’t force standards, but you can force laws.
if you build a standard and no one follows it. then it’s wasted time and money. Meta, Google and Microsoft all have a vested interest in user data. more so with law enforcement buying it in bulk to build identity profiles of /individuals/.
if tomorrow they got added to the law to store and transmit a string of your government ID, would you be more resistant?
the issue is, VPNs hide your ISPs assigned IP. till now there has been a higher difficulty in differentiating traffic from the same IP with similar metadata. the more user specific metadata that’s added, the easier it is to differentiate devices and users.
this makes targeting specific devices with malware for spying significantly easier. at the very least.
but at a bigger point of view, it gives provable cause because the way the law is written implies every user that installs the OS becomes a OS distributor and every user is a minor by definition, even if the API flag says otherwise.
I recommend you read that again and if the words “probable cause” don’t come to mind you don’t understand the risk of a “minor” identifying as a adult.


yes. every time in the history of gnu software when a function is added without a purpose its for a later feature.
otherwise there is no need for the form? since when do we leave empty forms in software that can be used to store strings, that hold no meaning…
only two uses for this. to implement the full API later or to have a string the user normally does not see that becomes a perfect place to store malware. full stop.
complying with the API is a act of absolute stupidity…


not really, the law is written that complaince makes you complicit. every user is a child. there is no adult users.
above all else, even if the API is used properly, unless it’s giving false positives, it creates a metric that can be tracked to form patterns. these are all a advanced method to identify individuals to unmask online identities…


it’s government backed, their for the government knows every time it’s used and it identifies you…
when a service requests to use it, it becomes correlation data… this is data both the government and the application developers can use to identify you on the internet.
It may mean nothing today, but I can and will if either the application switches developers to a nation who uses this information for nefarious means. or if your government changes policies to something intentionally nefarious.
blind trust is never good.


it’s almost as if global markets should see the US markets as rogue and cut off their value. treating all US stocks as void.
would solve the problem overnight.
my life partner, had a coworker suddenly die in their sleep, for no decernable reason. they were 32 and in near perfect health. exercised, are healthy, had good work/life balance and didn’t use drugs…
reality’s is cruel, there is a reason billionaires set the retirement age so late…
live today, tomorrow is not garuanteed. that’s why they are working you to death today.


?? I’m not following. sure you can run arm based CPUs as a mobile device, but performance of large applications or x86 applications is poor.
there is also the addressable memory space issue that exists due to most arm core designs targeting phones… the bus is super limited, despite the architecture technically supporting much much more.
current RiscV cores suffer this same flaw as well.
the reason arm cores have better battery life is they are designed with phones in mind… not a desktop cpu. x86 mobile CPUs are cut down desktop CPUs with tdp restrictions. there is a massive difference as a result.
we are talking completely different design philosophies. it’s like comparing a ebike to a sports car… sure the ebike gets great energy economy when you scale the batteries. it’s half petal powered and has tiny draws on lightweight frame. it’s apples to oranges.
motorcycles would be more apt, but for arm, none really exist outside of obscenely priced workstations.


Microsoft was '81 for acquiring DOS (and that’s technically a lie, they didn’t have the source code for several years later. but it’s how they convinced IBM)
both MS and Apple were living BASIC at this time. Basic is not a operating system, it’s a pre-compiler environment. it’s designed to let you run code directly without machine code. as assembler and C was not a thing or rather licensed yet.
BSD specifically Netbsd exists as they were part of the invention of C code. BSD was ported from assembler/machine code to be portable with C.
MSdos, which Microsoft acquired by buying Qdos (aka 86dos), was written by a developer who stole most of the code and copied the rest from a existing operating system (which I cannot recall at this time). both were In negotiations with IBM. just Microsoft lied through their teeth to get the contract and won.
apple at the same time had fallen behind. the Lisa and apple II were still running a basic interpreter on top of ROMMON. Wozniak who wrote ROMMON and later large portions of apples next two OSes including OSx. kept pushing to get a actual Unix like Operating system on the device.
however Steve jobs was cruel, and demanded no new changes… it’s why Wolfenstein was nearly out before a true OS existed from Apple… Steve had a long history of trying to control advancement through forcing model version advancements with weaker hardware than the previous so you would be encouraged to upgrade.


Unix dates back to the 1960s. you have to count back to the BELL/AT&T days as it was available to educational institutions.
apple was still using BASIC on Thier first machines long after netbsd


one of the things I’ve been happy about in the last 24mo, is the HDR and NVIDIA support. until last year I was still using my old 2070 (non super) as I was waiting to upgrade.
that became more and more rock solid on the open NVIDIA driver.
when KDE put HDR into stable and then proton got HDR. now Firefox and Chrome. I’ve been in bliss. I don’t even get this good of HDR support on windows and I still have that on a secure NVME for work lol
there is 2 apps for modifying Logitech kbd controls. I don’t use either, but I would take a look at some wikis if you try again. personally I just avoid logi for anything but mice and webcams. also avoid Razr for anything, backdoors in their drivers are just plain stupid.
motherboard sensors I can get, I have a issue with mine with lmsensors, I’m a longtime Linux user so I can navigate to fix that with some dkms kernel modules… but I totally get how and why this would be a issue and full blame lmsensors for being too bloody slow mainlining sensors… license shenanigans are a pain.


?? in the past yes. but there has been lots of videos on the topic. people talking about how they filter it with firewall rules on their routers, etc.


by the first device intended to run full applications from external developers and interact with a active web.
this even puts palm, blackberry and early windows mobile devices barely outside of the cutoff sadly. they simply weren’t designed for the “extensions” people used to make them bridge into becoming a “smart phone”.
most of that list also is post-iphone/iPod too, which makes it kinda moot.
it’s kinda why windows phone, iOS and Android are treated as the “first” of their kind. as that was Thier intent from the start.


lol yes, that’s the point. narcassism only ever has one winner.


what year do you think it is?
I am using my VR headset playing half-life alyx, while using my premium Logitech mouse, Elgato stream deck and streaming to YouTube.
nothing has any issues. all of my messaging services have apps and just work “out of the box”. setup took me maybe 20 minutes. most of it was just going to my phone for 2fa.
only time this is ever a issue is obscure, windows only applications that use special hardware authentication like some old CAD software. or some silly editing software like Adobe cloud who intentionally block Linux. (also older adobe software is better anyways and works. Linux alternatives exist and work equally as good.)
I remember how it was 5 & 10 years ago. struggling at each step. but it’s not the case today. on the rare occasion I need to spend time diagnosing something, it’s usually because the company behind it did something disgusting, that makes me want to stop using their services anyways.
it’s rarely ever hardware or software that doesn’t use online services.
and Epstein, don’t forget about Epstein…