I tried to download one and it accused me of being a bot and looped me through a capcha twice in a row and I gave up. *shrug* Otherwise seems like a good idea. Good luck.
I tried to download one and it accused me of being a bot and looped me through a capcha twice in a row and I gave up. *shrug* Otherwise seems like a good idea. Good luck.
The end result is exactly the same.
The difference is that you can install an iso on a computer without an internet connection. The normal iso contains copies of most or all relevant packages. Although maybe not all of the latest and most up to date ones, the bulk are enough to get you started. The net install, like the name suggests, requires an internet connection to download packages for anything except the most minimal, bare-bones configuration. The connection would hopefully be nearly as fast if not faster than the iso and be guaranteed to have the latest updates available which the iso may not. While such a fast connection is usually taken for granted nowadays, it is not always available in some situations and locations, it is not always convenient, and some hardware may have difficulty with the network stack that may be difficult to resolve before a full system is installed or may require specialized tools to configure or diagnose that are only available as packages.
In almost all cases, the netinst works great and is a more efficient and sensible way to install. However, if it doesn’t work well in your particular situation, the iso will be more reliable, with some downsides and redundancy that wastes disk space and time.
Things like windows updates and some large and complex software programs and systems often come with similar “web” and “offline” installers that make the same distinctions for the same reasons. The tradeoff is the same, as both options have valid use cases.
To be fair, in the case of something like a Linux ISO, you are only a tiny fraction of the target or you may not even need to be the target at all to become collateral damage. You only need to be worth $1 to the attacker if there’s 99,999 other people downloading it too, or if there’s one other guy who is worth $99,999 and you don’t need to be worth anything if the guy/organization they’re targeting is worth $10 million. Obviously there are other challenges that would be involved in attacking the torrent swarm like the fact that you’re not likely to have a sole seeder with corrupted checksums, and a naive implementation will almost certainly end up with a corrupted file instead of a working attack, but to someone with the resources and motivation to plan something like this it could get dangerous pretty quickly.
Supply chain attacks are increasingly becoming a serious risk, and we do need to start looking at upgrading security on things like the checksums we’re using to harden them against attackers, who are realizing that this can be a very effective and relatively cheap way to widely distribute malware.
Joke’s on Reddit, I’ve always been posting unhinged misinformation.
I really like what they’re doing to GIMP lately and I am looking forward to 3.0!
It is mostly a myth (and scare tactic invented by copyright trolls and encouraged by overzealous virus scanners) that pirated games are always riddled with viruses. They certainly can be, if you download them from untrustworthy sources, but if you’re familiar with the actual piracy scene, you have to understand that trust is and always will be a huge part of it, ways to build trust are built into the community, that’s why trust and reputation are valued higher than even the software itself. Those names embedded into the torrent names, the people and the release groups they come from, the sources where they’re distributed, have meaning to the community, and this is why. Nobody’s going to blow 20 years of reputation to try to sneak a virus into their keygen. All the virus scans that say “Virus detected! ALARM! ALARM!” on every keygen you download? If you look at the actual detection information about what it actually detected, and you dig deep enough through their obfuscated scary-severity-risks-wall-of-text, you’ll find that in almost all cases, it’s actually just a generic, non-specific detection of “tools associated with piracy or hacking” or something along those lines. They all have their own ways of spinning it, but in every case it’s literally detecting the fact that it’s a keygen, and saying “that’s scary! you won’t want pirated illegal software on your computer right?! Don’t worry, I, your noble antivirus program will helpfully delete it for you!”
It’s not as scary as you think, they just want you to think it is, because it helps drive people back to paying for their software. It’s classic FUD tactics and they’re all part of it. Antivirus companies are part of the same racket, they want you paying for their software too.
Clearly Russia has no idea how to censor different things in different ways to create a specific narrative for people to buy into. They’ve never done anything like that before, they aren’t masters of the craft of disinformation or anything.
Totally unrelated joke, how do you know if a Russian is lying? You don’t, sometimes he could be telling the truth just to trick you.
And I’ll throw in one of my favourite exchanges between two characters:
“Of all the stories you told me, which ones were true and which ones weren’t?” “My dear Doctor, they’re all true.” “Even the lies?” “Especially the lies.”
Trusting something coming out of Russia to be true is foolish, just as foolish is trusting it to be false. Nothing that say is reliable in the slightest or should be used to make any useful conclusion about the real world.
Almost like the context matters and the world isn’t entirely made up of black and white binary choices because we’re not robots or computers and discrete logic does not apply to human moral arguments.
It’s the difference between your friend making you a cup of tea, and Putin making you a cup of tea.
Nuclear weapons in the current era of mutually assured destruction are strictly a deterrent, only useful in a hypothetical retaliatory strike but not as a realistic offensive weapon. The hypothetical situation where this would hypothetically be used would be after Seoul has fallen to the enemy and defeat is inevitable. By having such an ability, this makes it very unattractive for any enemy to try to conquer and fortify Seoul or put any existential pressure on South Korea by any means, since doing so enables the use of a retaliatory nuclear strike, since in such a hypothetical situation there is no chance of regaining Seoul left for South Korea to worry about. Therefore, as a consequence, Seoul is protected in a very material sense by a weapon that will never have to be used in any actual strike ever.
They may only be a deterrent but they continue to be an extremely convincing and effective one.
It’s adorable that they think this is “the west’s best efforts”. This is more like the west throwing some speculative bids at a penny auction to see if they can score some easy wins and if not then at least they piss off the other guy who’s bidding. If they think this is all the west’s got to offer they’re in for a real big fucking surprise.
That’s kind of like seeing a story where a car crashed into someone’s living room and saying “I don’t see the benefit of having houses” even though:
Counter rant: This is why we built encryption and VPNs many years ago. This is a solved problem, but rather than solving it you’d rather just complain ineffectually about it. The solution, the product of years of work of technical people and privacy people, is sitting right there staring you in the face available for you to use as a free service, a paid service, or your own self-hosted service. Use a VPN, that’s what it’s for.
It will still be a manged exchange rate and they will target inflation as they move forward. I am not a financial expert, even less of one in wartime economies, but their plan to end the fixed rate seems measured, reasonable and straightforward.
“GL iNet” has a dizzying array of products and some are designed for this (you can find them for sale on the usual scumbags). Surprisingly, for a niche brand you’ve likely never heard of the firmware is surprisingly robust and has a small but loyal community. Expensive, and you might not want to carry an extra piece of hardware to provide a bulletproof VPN connection, but worth it for the security IMO.
https://en.wikipedia.org/wiki/Mykola_Azarov makes it pretty clear that this “former PM” was part of the Yanukovych regime and a Russian infiltrator who fled back to Daddy Putin when Ukraine threw off the Russian yoke. Nobody should take anything he says seriously.
Godot is looking much better to me today than it did yesterday.
You must be mistaken. Everybody knows Garak is a plain and simple tailor, as he will cheerfully tell you in the face of whatever evidence you might provide to the contrary.
Democracy without dissent. China has achieved peak democracy. Once you mercilessly crush all opposition, your population becomes completely unified and elections are easy, straightforward affairs! The one secret of success that western democracies don’t want you to know!
Matrix and its implementations like Synapse have a very intimidating architecture (I’d go as far as to call most of the implementations somewhat overengineered) and the documentation ranges from inconsistent to horrific. I ran into this particular situation myself, Fortunately this particular step you’re overthinking it. You can use any random string you want. It doesn’t even have to be random, just as long as what you put in the config file matches. It’s basically just a temporary admin password.
Matrix was by far the worst thing I’ve ever tried to self-host. It’s a hot mess. Good luck, I think you’re close to the finish line.