@schnurrito@discuss.tchncs.de why on earth would you use a title like that? It‘s just plain wrong. The project switched to a different license. It is still free and still open source.
@schnurrito@discuss.tchncs.de why on earth would you use a title like that? It‘s just plain wrong. The project switched to a different license. It is still free and still open source.
Thanks for elaborating. Very much appreciated!
People still think this is a suicide pod, while it is used by robots to generate electricity.
How is this type of shading called?
I like it very much, as it is a type of shade you cannot achieve with an algorithm (at least not that easy and perfectly). Would love to have a tattoo like that.
Wayland 1.0 was released in 2012.
Now, 12 years later, it still is not production ready. I lost hopes long ago and rather stick to a security flawed but stable X11.
I am very glad with the proposal of the Frog protocol, as Wayland was dead before it could even walk.
Only because he had no windows
Yeah the Open Source version. I doubt that the hosted version is using that. Cloud providers have super fast DB’s that are basically compatible with the MySQL syntax
My question was ironic, implying that anyone using it in a productive system/software/service is doing a very bad job at software architecture. I avoid any product relying on super slow software pieces.
Well, who is using mysql/mariadb nowadays anyways? If you haven’t made the switch to at least postgres in the past 5 years, you messed up anyways.
I know. I was being ironic.
Who says CIG ever wanted to publish a game in the first place? It always has been a “Game Development as a Service”
Is this the only point, when it comes to security? In my experience, the ease of use is also a factor. Today, VPN clients are just one button and it runs. I2P is almost there, but requires you to setup some configs manually. So is it really worth to drive a tank to just go grocery shopping?
Tomorrow passwords will be cracked in no time, because most algorithms are not quantum safe. Same with password length.
I never said it is not an attack vector. There are dozens if not hundreds. The question is about the probability, which is always a dimension if you manage risks. There is no need to list all theoretical possible attack vectors, if the probability of actually happening only affects 2 people on this planet.
Videos for educational purposes should not sensationalize unlikely attacks, as it only causes unnecessary fear. I’d rather have someone using torrent on VPN than not using anything at all because they are now afraid of the government.
That’s not what I was talking about?
If someone is actually trying to convict you just based on the correlation of the connection times, you probably don’t just share a copyrighted movie. So why mentioning this as an actual threat in the first place?
I‘ve used Android and iPhones for multiple years. Now I am using an iPhone and I am very happy. Main reasons are build quality and software. It just works. And the main advantage is primarily if you use multiple Apple devices. And since Android phones are expensive as fuck, too, I don’t care about the price anymore
It is not the state. Those are regular professionals.
I partially agree that there should be a possibility to kill yourself in an easy way. But don’t forget that very often, this death wish is the cause of a mental illness, which can be treated.
So with Exit, you need to have been diagnosed by a psychiatrist. So it probably takes some time, and that time has to be obviously paid. After that, a second psychiatrist checks the diagnosis for any errors. And the third actor is going to be a regular doctor, double checking for errors. If all goes well, you get the death cocktail. As things can go wrong with that, you should be accompanied by someone experienced. Exit provides this assistance free of charge, as they use donations and membership fees to pay for that.
I cannot tell you about what diseases are successful. Usually, psychological issues are not enough to get the diagnosis you need. You need to be heavily impacted by it and there has to be no cure.
Now I miss my Pebble and Pebble 2 :(
It looks nice, but honestly, once I set up everything (which I do on each of the *arr anyways), there is nothing left to be managed. That‘s the whole point of this setup, to get rid of managing things manually.
So even if I love that project and am very appreciative for all the work, I don’t have any use case in my setup that would want me to use this.