deleted by creator
deleted by creator


deleted by creator


IMO it’s not even about something making sense, we’re just very accustomed to fahrenheit, so it feels more natural to us.
I’ll be the first to admit that I have no idea about what’s warm and cold in Celsius. I know 0 is quite cold, 20 is room temperature, and 100 is near instant death.


I usually don’t wash my rice, but one specific type of jasmine rice I use does get a bit gummy if I don’t give it a good rinse. For other types of rice, I usually don’t notice a significant difference.
Yeah, I’m confused by this video (which is from nearly a year ago, btw). It looks like a gnome shell overview more than anything.
Pretty good privacy. It’s an unexciting name for a public/private key encryption program.
I believe WhatsApp uses the same protocol (or at least the same crypto algorithms), though I’m not sure if they were involved in its development.
Good point on the metadata. Signal has the “sealed sender” thing, which (I think) helps with the metadata problem somewhat.
As the other commenter mentioned, your best bet is being selective about which services you use to communicate.
Unencrypted (plain text) is the worst, since data is easy for a third party to sniff (think of it as a wiretap). For example, HTTP and SMS are unencrypted.
Encrypted is a good start, since third parties can’t sniff your traffic, but the server handling your communications can usually see everything that passes through it. For example, HTTPS is an SSL-encrypted variant of HTTP, and services like Facebook messenger are encrypted, but Facebook can still see all of your messages, since it’s stored on their servers.
End to End Encrypted (E2EE) is the golden standard. Only the endpoints (i.e. you and your friend) can see the content of your messages, and all traffic is encrypted in a way that even the server cannot view it. Signal is end to end encrypted, as are many other modern messaging platforms (WhatsApp is E2EE in theory, as is Google Meet, but we can’t verify this ourselves).


Well, not the highest one. This was a state supreme court, fortunately.


Seems like a fine feature to me?
Except you have to pay for rewinds. They probably give you one or two freebies, but then you’re screwed if you legitimately made a mistake swiping in the wrong direction.
Or worse… expelled
I’m using droidify and couldn’t find signal in there either.


Well good thing I finally realized it wasn’t enabled and set my environment variables to enable it.


As an aside, is digital ID a gating factor in us bring forced to digital currency? Stores are already refusing cash, so we’re practically digital already.


I tend to disagree with a lot of Californian politics, but hot damn are their pro consumer laws the best. Can’t wait for 2026.


I’ve run plain ol’ openbox without a desktop environment on top of it, and it’s quite nice. IIRC I also had a standalone status bar application, but I can’t remember which one I used.
There are a couple utility programs (obconf and obkey?) that help to configure everything comfortably.
Based, mostly


And even then, a properly configured SSHD instance wouldn’t really benefit from a firewall, unless you wanted to block all countries besides your own or something.


Every computer has a bunch of ports (1-65535 if I recall correctly), each of which is a unique entity to which a single service can bind. In layman’s terms, a port is a door that one service is able to answer when someone knocks. By convention, some ports have a specific associated service (80 = HTTP, 443 = HTTPS, 22 = SSH), but there are a lot that you can just use as you deem appropriate.
If you want a service (e.g. a web server) to be accessible, you have to run a service that binds to a known port (e.g. 80), and a client has to reach out to your server on that same port. A firewall sits between your service(s) and any potential clients, much like those steel security screen doors. If that’s closed, nobody gets through on that port, even if a service is bound to that port and is listening for a connection.
As a general rule of thumb, you want your firewall to block as much traffic as possible without breaking something (I.e. blocking one of your public-facing services). If you don’t run any services on your computer (web services, media servers, etc.), you can probably get away with blocking all inbound traffic. without any discernable impact.
Bonus when you disable software flow control: In addition to Ctrl+r to reverse search through commands, you can search forward via Ctrl+s