• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle




  • Thanks for the advice, but a distro change for me would be a huge annoyance. I haven’t have issues with my laptop’s 1060 nvidia on Arch, and never had issues with the proprietary driver.

    My worry is that even though mature GPU are probably well supported, I bought a relatively new one (4070 super ti) so maybe the new models have some issues due to having more features/being more extreme. Most complains here are about 30/40 models after all.



  • I already unsubscribed and start sailing when the account share thing happened, but people are willing to take anything these days… so good for netflix I suppose.

    101 businessman logic: slowly stretch it until numbers go down, and then back down a bit, just to keep trying stretching it further in a later time. Repeat.

    infinite growth guaranteed.

    This is why at this point I don’t trust any subscription type thing, they are all destined to end up in that cycle, which, good for them, I think it’ll have to explode eventually, or not, who cares, I’m already out anyway


  • One that I can remember many years ago, classic trying to do something on a flash drive and dd my main hdd instead.

    Funny thing, since this was a 5400rpm and noticed relatively quick (say 1-2 minutes), I could ctrl-c the dd, make a backup of most of my personal files (being very careful not to reboot) and after that I could safely reformat and reinstall.

    To this day it amazes me how linux managed to not crash with a half broken root file system (I mean, sure, things were crashing right and left, but given the situation, having enough to back up most things was like magic)


  • One thing to think about is the encryption quality of a zip file, which I ignore.

    One danger that I see is that you have the risk of having the passwords on the clear all over the place many times. Not an expert so don’t quote me on this, but password managers are careful avoiding passwords on the clear as much as possible.

    I don’t trust any online service for that, I am using keepass/syncthing for myself, with android as the only client decrypting (as I always have my phone with me). one example of advanced security measures is that while using the app I can’t take screenshots, and I hope/expect that it uses images backed by secure memory to show them to me and is careful with things like RAM and temporary files (didn’t check personally though, although being open source I could)

    Having to be sure that your zip app handles that seems like a hustle honestly. On top of having random passwords without the biases I would add for each separate site.



  • you seem to know what you are talking about and I looked into this very long ago, maybe you can help me understand.

    From what I can understand reading most of the article this forces browsers to accept the certificates, but it doesn’t force the websites to use them, right?

    So what is stopping Firefox from showing a warning (like the lock icon being orange, but it could also be a more intrusive message) stating that the certificate was issued by a country and/or doesn’t fullfil modern security standards in case one of these CAs is used?

    On top of that, the CA doesn’t really encrypt the private key of the domain, it just adds a signature stating that the message with the salt and the public key are legit, right? everyone seems to think the government itself will be able to passively see the traffic, but if I remember correctly they would have to gateway the whole transaction (I’m guessing the browser will also have a cache of keys and this could become a bit tricky to do in a global way)

    But of course we all know how technologically illiterate governments are (there could be one good, but there will be some “less good” for sure). So yeah, it does sound like a horrible idea to begin with. Because if a CA starts being insecure nowadays browsers can just remove them and go with their life, but if there is a law forcing browsers wouldn’t be able to.

    I’m just curious about the specifics in case I’m outdated on what I remember.


  • making sure a small part is very secure vs having to verify every domain I visit? yeah, let me keep using the current system… are you aware of the amount of domains you connect to every day?

    Also, I might be wrong, but if I remember correctly browsers/OS-es tend to come with a list of trusted certificate keys already, which makes adding compromised keys to that list not as easy as you suggest. (I don’t even know if that happens or if they just update as part of security updates of OS/browsers)