

I think it heavily depends on the files one has to browes the most. I deal with text files all the time, so i dont need an icon to jump in my face telling me, that its a text file.
The media-, design people I know love the previews that icons give them, because its much easier to spot the image file, they are looking for while scanning through a directory


Did you add yourself to the libvirt group? And check the permissions of the image it self, maybe thats the issue
I think there is a typo in the path in the body of your post, or?
Then, only the vpn provider would see the very same traffic, the ISP would see without vpn.
The ISP would just see your connection to the vpn provider.
The sites themselve would just see the vpn ip.
So it’s not the question about whether anyone sees the traffic, but who.
Only Tor would hide this traffic in a sense.
Could anybody in short explain, what I have to understand from “it’s tagged”?
The commit shows that there was a longer with 3.0.0 tag before and now its just 3.0.0
What does that tell us? :D


This seems like a normal cheap android phone with a bootloader-unlocked operating system and some pre-installed ad-block and rethinkDNS’ish Apps imstalled?
And no offence, but the advertising video itself is more scamy then the wedding-dress shop around the corner that is always closed and dusty, but still paying a horrendous amount of rent each month…
I do the exact same thing as OP with KeepassDX at work and works pretty nice so far, since I gave KeepassDX the right acces rights on the nextxloud directory.
What diferences have you figured out so far with Keepass2android in comparison ?


I see lots of sidekicks against Manjaro, it’s a thing apparently :D I am using manjaro on a framework 16 for about a year now and it never broke anything, just works wonderful for me, although I dont have any fancy requirements other than a working Linux.
But i would be interested in the critics about the team and their “bad” decisions, as stated in some comments. What were the problems?


This is unfortunately completely wrong, since you can learn from the homepage of matrix very own client Element, that its supported an trusted by a whole bunch of NATO Armys, including the US of course…
I don’t mean by that you shouldnt use matrix, but arguing against signal with matrix is, in so many means, hilarious.
The arguable, but professional cryptographer soatok discribes from a mathematical/cryptographical point of view, what it needs to be a Signal competitor, where matrix (and others) dont catch up (unfortunately)
Ah, I did the exact same about a week ago. To be fair, I installed Kinoite on a second laptop, because I really need my working setup for the next couple of weeks. So I am not forced to use the Kinoite.
The thing that mostly drives me back to Arch, ist that I dont really understand the different appoaches of flatpak, toolbox and the package layering, or more their specific pros and cons and when I want/have to use what, depending also on my threat model.
I even struggled to get my Thunderbird working with my old config, because it wouldn’t recognize my
.thunderbirdin/var/apps/net.thunderbird.Thunderbird/...Although Fedora has a quite good documentation, which I read with joy (which is not usual) I feel that I am missing some graphical depiction, or something :D
I think the last 2 days I didn’t touch this, because I was thinking about writing a lemmy post, with the following:
Thanks for your post, it came just at the right time :D