Using a password management scheme of some kind does not optional. You cannot trust them with what’s effectively a master password.
This is a secondary account. My main account is listed below. The main will have a list of all the accounts that I use.
Using a password management scheme of some kind does not optional. You cannot trust them with what’s effectively a master password.
I’m glad you figured it out! Thank you for sharing your solution.


Maybe, in a perverse way, they aren’t all that different in the extreme. If I were a billionaire, I can take loans out against my securities basically forever. Governments can sustain a growing debt load forever if it grows more slowly than GDP.
Alas, I am not a billionaire.


Tbf, this post is a shower thought comparing governments to parents. Governments aren’t individuals.
Sounds good! Basically, the problem I had boiled down to a super old driver no kernel dev wants to touch with a ten foot pole and they’re just kinda hoping it’ll die a death to irrelevancy, but there are a few systems out there that do still use it.
The rest of the design moved on to more advanced architecture.


Hey! This was my first real job. Is Matlab code written by physicists who just recently learned programming.


It’s detectors all the way down.
But of course, as a tortoise, you would know that.


Don’t forget debt. I have to have an emergency fund but you just print money and spend it like there’s no tomorrow for years on end?
I had this problem specifically dealing with the way that IOMMU maps devices conflicting with a really old USB root hub. I had to set something like intel_iommu=off for my case.
Would you be willing to share the output of your dmesg ?


I have a brilliant friend who works there. However, only projects that integrate AI are really getting approved.


Not if I use AI to hide my use of AI first!


Enforcing that ban is going to be difficult.


Back in my day, we had this feature on Windows Vista called ReadyBoost that took advantage of the low-latency of flash media to supplement our slow HDDs. I’m not sure if there was a direct replacement for this in the Linux world. There are filesystems that take advantage of faster tiers of storage, but different latency tier exploitation isn’t something that I know to be readily available.
Today, 2GB of USB flash is next to useless, but I would consider a homebrew rescue system to restore your backups and fix problems without needing to prepare an external flash drive.


I aspire to one day be as knowledgeable and well-rounded in computing as he.


What a shame. It’s probably my favorite tool on the platform.
Unfortunately, the server.
Please reach out if you have any questions.


It is (under targeted surveillance) and it isn’t (practical at scale). My wife works at a post office and they do occasionally comply with law enforcement’s lawful requests to monitor or search the contents of a person’s mail, but it’s quite rare. It’s manual work that takes time and effort per-package, risks detection, and typically requires a warrant. It’s just not cost effective compared to automated electronic methods unless you’ve really fucked up and they’re already onto you.


There’s also this part of the standard that throws a wrench into this hypothesis:
§5.1.2.3/4: (Program execution, Observable behavior):
Accesses to volatile objects and calls to library I/O functions are observable behavior. The implementation may perform any transformation of a program, provided that the resulting program’s observable behavior is not changed.
So it seems that running forever isn’t an observable property that must be preserved when code is transformed.
Still, I think compilers try to not surprise the developer too badly and would recognize a trivial loop most of the time.


The lovely part about UB is it’s non-causal. The compiler can go back in time and steal Halloween candy from you when you were five and still comply with the specification.
That’s like eating exactly one potato chip.