![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
Is there a problem with your Lemmy client? My comment renders fine on Raccoon.
Is there a problem with your Lemmy client? My comment renders fine on Raccoon.
Maybe Logseq, too.
+FOSS like Joplin and unlike Obsidian
+plaintext markdown files like Obsidian and unlike Joplin’s janky database
-less feature-rich than obsidian
-block-based instead of note-based, so a slight paradigm-shift is required
I started on it instead of Obsidian
This is the way. I started on Obsidian, and Logseq is painful in comparison. It’s a good product, but I got accustomed to too many nice conveniences over the past couple of years.
That is irrelevant. We are more concerned with relative market share than raw numbers. For example, many devs will not develop towards a browser or OS that has less than 5% market share. If/when Linux market share hits 5% and even 10%, we expect marked increases in developer interest to support our OS of choice. As far as I’m aware, nobody really sets such metrics based on raw user counts, so that is a less important number for us. Your Statistics 101 course should have taught you to make sure the statistics you are measuring are relevant.
If you continue using our website, we’ll assume that you are happy to receive all cookies on this website.
You literally have an “x” button in the top-right of your web browser (or similar exit feature if you’ve disabled or moved that).
Where is data recovery $100? In my country, data recovery is like $1000 USD to look at your drive, and then they tell you how much they can recover and a full quote.
Ooh, that’s a fair claim! I don’t use Sidebery like that, so I have never run into that issue!
I’ve never trusted browsers to reliably remember history and restart where I left off, so I make heavy use of Sidebery’s snapshot feature.
If we’re talking about a great implementation of the feature, it would be ‘Sidebery’.
God’s, that’s beautiful!
You trade a little system stability for bleeding-edge package access.
Computers have ruled the planet for longer than the Greeks ever did. The history lesson is appreciated, but we’re living in the future, now, and the future is digital.
K/M/G/T/P = decimal prefixes. K is 1000. M is 1,000,000. etc.
Ki/Mi/Gi/Ti/Pi = binary prefixes. Ki is 2¹⁰ (1024), Mi is 2²⁰ (1,048,576), etc.
It’s a disambiguation of the previous system where we would use KB to interchangeably mean 1000 or 1024 depending on context.
The American way would probably be still using the units you listed but still meaning 1024, just to be confusing.
American here. This is actually the proper way. KB is 1024 bytes. MB is 1024 KB. The terms were invented and used like that for decades.
Moving to ‘proper metric’ where KB is 1000 bytes was a scam invented by storage manufacturers to pretend to have bigger hard drives.
And then inventing the KiB prefixes was a soft-bellied capitulation by Europeans to those storage manufacturers.
Real hackers still use Kilo/Mega/Giga/Tera prefixes while still thinking in powers of 2. If we accept XiB, we admit that the scummy storage vendors have won.
Note: I’ll also accept that I’m an idiot American and therefore my opinion is stupid and invalid, but I stand by it.
we might be terrorists, but we still take our shoes off when we walk in the house.
Nethack DROD
They’re rad, and you don’t notice the crease when the screen is displaying anything. I’ve had the zFold4 and now the 5 and I love it.
You might start googling things like “OSINT handbook” or “OPSEC guide” and see what people put together to protect yourself from data-mining, fingerprinting, and various other ways to protect your personal information.
Open Source Intelligence (OSINT) is the practice of using freely-available resources to collect information on something/somebody. Learning about the tools used to perform OSINT searches is a good first step to determine which databases you may want to scrub yourself from.
Operations Security (OPSEC) is a military term that involves the security and protection of any data – classified or unclassified – that could potentially be used against you. OPSEC sounds exactly what you’re looking for, but I mention both terms because looking at potential attacks from both a red team (attacker) and blue team (defender) is a good practice to make sure you’re not missing any vulnerabilities (in other words, even if your only goal is defense, it is beneficial to think like an attacker and visualize how you would attack yourself).
One such result of a search shows John Troony’s Opsec for the Paranoid gist.
Some example of people-finder sites like LexisNexus from his document would be:
## People-Finder Sites
- BeenVerified: http://www.beenverified.com/
- DOBSearch: https://www.dobsearch.com/
- Intelius: http://www.intelius.com/
- LexisNexis: http://www.lexisnexis.com/en-us/products/public-records.page
- Spokeo: http://www.spokeo.com/WhitePages: http://www.whitepages.com/
- WhitePages: http://www.whitepages.com/
But the nearby sections in that document may be of use to you, like “Opt out of Data Mining”.
OSINT/OPSEC is a giant rabbit hole you can go down, and you can get as paranoid as you want – scrubbing social media sites or poisoning the well of sites that collect data indiscriminately and don’t let you remove it, all the way to the ultra-paranoid burner phones and entire false identities (as long as you hopefully stay within the bounds of what is legal in your country or at least keep your laws in mind when you do step outside of the law). If you are interested in stuff like that, you might start looking at things like The Hitchhiker’s Guide to Online Anonymity.
Ooh, I moved to hyprland a few months ago and fell in love, but sway will give me static layouts? My singular gripe with hyprland is I want to keep my RDP app fixed to a size and never resized for anything, because when that window resizes inadvertently, I have to MFA half a dozen connections. I mostly like the dynamic tiling, but I’d like to fix one window on one workspace and never have it resize.
Oh, yuck. Yeah, I have a Samsung phone, too, and can’t figure out how to strip exif data from screenshots. You might be stuck with a third-party exif-stripper app.
Oof. I did not know about that. That’s unfortunate!