The DuckDuckGo search engine gets it’s results from the Bing search engine
The DuckDuckGo search engine gets it’s results from the Bing search engine
Subnautica, if you want a map, you have to start triangulation and drawing
Encryption is really really hard, and avoiding some form of sidechannel attack is much much harder.
Sure key exchange also isn’t trivial, but I would say that key exchange is significantly easier. Care to elaborate?
RSA doesn’t scale, so if the message is large then RSA becomes unwieldy. So most encryption methods that make use of RSA actually encrypt the data with a symmetric algorithm, and then just encrypt the key for the symmetric data using the RSA key.
But there is still way way way too many ways to implement crypto wrong, which can completely compromise the security of it.
If you want to migrate to Linux, I would strongly suggest you set up a dual boot, and start playing with it to gain experience. Being able to switch back to something you know is a massive benefit when you are still learning.
While Linux has come a very long way, you are sure to experience some hitches along the way. If not because of Linux itself, then because you are not familiar with how to do “that one thing” on Linux.
I wrote them to ask permission and got this response: https://lemm.ee/comment/15954329
I wrote them, here’s their response: https://lemm.ee/comment/15954329
I decided to write support and ask them permission to stream the game, here’s their response:
Jellyfin has supported Music and TV shows since the start
This one terrifies me every time… When you pass a car going the opposite way, and it basically looks wike the steering wheel have a wig on… It’s always an old woman… Can they even see the road? Or are they navigating using the sky?
Am Danish. This is fairly accurate, a solid 60% of Danish is just random guttural sounds. This documentary however misses that the remainder is 30% raw deadpan sarcasm, and 10% English words pronounced in an awful accent.
To contrast and compare, this is an average modern Swedish television quiz show: https://youtu.be/lzv6ljgwgzs
Dunning-Kruger is a hell of a drug…
The author of the article is clearly just confusing “encryption”, “cryptography” and “hashing”. Reading the full article makes it clear that the intention was to salt and hash the passwords, not encrypting them.
The OP made the argument that Zuckerberg wanted to know their passwords, such that if the users reused the same passwords elsewhere, then he would be able to log in there and check out their accounts.
For example he could have seen a profile he was interested in, nabbed their password and looked into their email.
Not that he wouldn’t have godmode on their Facebook account, and needed their password to access their account, because of course he could have just accessed those accounts without needing the password.
I have not heard this rumor before, though I wouldn’t be completely surprised if it was true.
It kinda depends a bit on the user’s background… For someone who is used to windows and how computers in general works, I would probably agree with you.
But for people who are more phone/tablet native, I don’t think something like Fedora Silverblue is actually that bad of a choice. It comes natively with Gnome 3, which isn’t too dissimilar to Android or iOS. Updates are installed in one fell swoop with a reboot, just like Android or iOS. Flatpaks behave much more like an App on Android or iOS, they are self contained, and don’t affect eachother.
I just set up my daughters (9 y/o) first school laptop, and picked Fedora Silverblue, and apart from learning about the save icon, and learning how to store files in a filesystem, she was pretty much instantaneously functional, having most of her prior computing experience on an Android phone.
I really don’t see much benefit to running two clusters.
I’m also running single clusters with multiple ingress controllers both at home and at work.
If you are concerned with blast radius, you should probably first look into setting up Network Policies to ensure that pods can’t talk to things they shouldn’t.
There is of course still the risk of something escaping the container, but the risk is rather low in comparison. There are options out there for hardening the container runtime further.
You might also look into adding things that can monitor the cluster for intrusions or prevent them. Stuff like running CrowdSec on your ingresses, and using Falco to watch for various malicious behaviour.
You might need some workarounds for it to work. I’m using Sway as my window manager, where the missing piece war the “for_window” bit on this page.
https://github.com/flameshot-org/flameshot/blob/master/docs/Sway and wlroots support.md
Depending on your desktop environment/window manager, you might need some different workarounds.
For me it captures all the screens and let’s me pick the region, even when crossing over two screens.
Which OS are you using? And if Linux, are you running Wayland or X?
It seems to me that any legislation could easily carve out an exemption for any special editions, only applying to the “regular” version.