![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
deleted by creator
deleted by creator
Bonus when you disable software flow control: In addition to Ctrl+r to reverse search through commands, you can search forward via Ctrl+s
deleted by creator
deleted by creator
Yes, OEM unlocking is an option that you can toggle in the developer settings in the 11. I haven’t done it personally, but it looks like it’s the standard process via fastboot.
IMO it’s not even about something making sense, we’re just very accustomed to fahrenheit, so it feels more natural to us.
I’ll be the first to admit that I have no idea about what’s warm and cold in Celsius. I know 0 is quite cold, 20 is room temperature, and 100 is near instant death.
Holy based. I always thought it’d be funny to get into a little cyber war with someone, so thanks for the laugh.
Using podman-compose, I usually have a section like:
volumes:
- ./local_folder:/container/folder
Specifically, I have to use either an absolute path or a relative path with “./” to prevent it from treating a directory as a volume name.
Yeah, I’m confused by this video (which is from nearly a year ago, btw). It looks like a gnome shell overview more than anything.
Pretty good privacy. It’s an unexciting name for a public/private key encryption program.
I believe WhatsApp uses the same protocol (or at least the same crypto algorithms), though I’m not sure if they were involved in its development.
Good point on the metadata. Signal has the “sealed sender” thing, which (I think) helps with the metadata problem somewhat.
My practical answer: Nah, it’s probably not going to nuke your files.
My software engineer answer: Never trust us to not make a mistake. It doesn’t take much to accidentally nuke a directory.
As the other commenter mentioned, your best bet is being selective about which services you use to communicate.
Unencrypted (plain text) is the worst, since data is easy for a third party to sniff (think of it as a wiretap). For example, HTTP and SMS are unencrypted.
Encrypted is a good start, since third parties can’t sniff your traffic, but the server handling your communications can usually see everything that passes through it. For example, HTTPS is an SSL-encrypted variant of HTTP, and services like Facebook messenger are encrypted, but Facebook can still see all of your messages, since it’s stored on their servers.
End to End Encrypted (E2EE) is the golden standard. Only the endpoints (i.e. you and your friend) can see the content of your messages, and all traffic is encrypted in a way that even the server cannot view it. Signal is end to end encrypted, as are many other modern messaging platforms (WhatsApp is E2EE in theory, as is Google Meet, but we can’t verify this ourselves).
Well, not the highest one. This was a state supreme court, fortunately.
Seems like a fine feature to me?
Except you have to pay for rewinds. They probably give you one or two freebies, but then you’re screwed if you legitimately made a mistake swiping in the wrong direction.
Or worse… expelled
Agreed, for me containers are really nice for playing with new software without dirtying my host install.
I’m using droidify and couldn’t find signal in there either.
I think it’s cool in concept, but it’s more of an activism tool than a convenience tool. I’m my experience at least, it didn’t block as much as I’d like.
deleted by creator