• 7 Posts
  • 101 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle


  • “mesh” is a buzzword that doesn’t make much sense (to me at least) if we are talking about wired and routers… what do you mean by it? can you describe your setup?

    edit:

    Let me clarify :)

    Unless I’m mistaken, mesh means that one a bunch of devices, usually wireless access points, connected with each other (in a mesh) with possibly low-quality connections that automatically switch traffic for each other.

    If you have ethernet running from the router to the APs, you always want to use that and so you don’t want a mesh at all.



  • There’s AsteroidOS but I couldn’t find any of the supported watches (all quite old IIRC) at a reasonable price.

    Gadgetbridge with some proprietary watch is fine privacy-wise (I had an Amazfit GTR3 pro, I needed to register an account with the Zapp app and use it once, but then uninstalled it once I got the required password and used Gadgetbridge exclusively).

    Bangle and the Pine Watch are low-res and IMHO quite ugly compared to alternatives from big brands.


  • My bad for causing confusion: when I wrote “trusted signature” I should have said “trusted public key”.

    The signatures in an apt repo need to be verified with some public key (you can think of signatures as hashes encrypted with some private key).

    For the software you install from your distro’s “official” repo, that key came with the .iso back when you installed your system with (it may have been updated afterwards, but that’s beyond the point here).

    When you install from third-party repos, you have to manually trust the key (IIRC in Ubuntu it’s something like curl <some-url> | sudo apt-key add -?). So, this key must be pre-shared (you usually get it from the dev’s website) and trusted.



  • Installing a .deb is what I was thinking about.

    Even a signed tarball is better than curl|sh.

    If you have a pre-shared trusted signature to check against (like with your distro’s repos), yes. But… that’s obviously not the case since we are talking installing software from the developer’s website.

    Whatever cryptografic signature you can get from the same potentially compromised website you get the software from would be worth as much as the usual md5/sha checksums (ie. it would only check against transmission errors).





  • I don’t even understand why people like GitHub so much, its source management sucks.

    It’s not that complicated… people use it because everyone has an account there and so your project gets more visibility (and your profile too, for those who plan to flex it when they look for the next job) and more contributions. Even a lot of projects that aren’t on github have some sort of mirror there for visibility.

    Suppose you wanna contribute to gnu grep (or whatever)… do you happen to know off the top of your head where the source repo and bug tracker are? And do you know what’s the procedure to submit your patch?

    If you are a company doing closed source, I agree that I don’t see why you would choose github over the myriad alternatives (including the self hosted ones).

    Look for ways to do things separately and you will find much better tools

    That’s a great way to spend your resources developing yet-another-source-forge-thingie instead of whatever your actual project/product is supposed to be :)



  • I bet that doesn’t exist: nobody would put work in a program that lets just restricts what you can do with zero usability advantages (ok someone might)

    If you fear you might run unsafe commands just save whatever you are comfortable running in scripts and restrict yourself to run those instead of manually typing commands you don’t fully remember/understand.

    BTW: topgrade will detect what needs updating in your system (your distro’s package manager, flatpak, python stuff, … whatever) and update all the things

    BTW: “terminal emulator” is the program that shows you text in a window, the program that runs inside it and validates/interprets your commands is a “shell” (the one you are using is most probably bash)


  • Here’s what I get in fish when I start writing a rsync command and hit tab to ask for completions:

    ❱ rsync --append-verify --progress -avz -
    -0  --from0                               (All *from/filter files are delimited by 0s)  --delete                   (Delete files that don’t exist on sender)
    -4  --ipv4                                                               (Prefer IPv4)  --delete-after         (Receiver deletes after transfer, not before)
    -6  --ipv6                                                               (Prefer IPv6)  --delete-before         (Receiver deletes before transfer (default))
    -8  --8-bit-output                          (Leave high-bit chars unescaped in output)  --delete-delay                 (Find deletions during, delete after)
    [more lines omitted]
    


  • Those are outside Signal’s scope and depend entirely on your OS and your (or your sysadmin’s) security practices (eg. I’m almost sure in linux you need extra privileges for those things on top of just read access to the user’s home directory).

    The point is, why didn’t the Signal devs code it the proper way and obtain the credentials every time (interactively from the user or automatically via the OS password manager) instead of just storing them in plain text?





  • gomp@lemmy.mltoTechnology@lemmy.mlAI is a Lie.
    link
    fedilink
    arrow-up
    22
    arrow-down
    1
    ·
    5 months ago

    It may not be a scam per se, but it certainly is a misnomer at this point… it’s one of those words (like “enterprise” or “pro”) that have been appropriated by marketing and devoided of any meaning. AI as a word will gradually die while people gradually realize it doesn’t mean anything. Marketing consumes words (and people too).