cmgvd3lw

joined 1 year ago
[–] cmgvd3lw@discuss.tchncs.de 1 points 2 hours ago

Rushed it. That's probably why there is a massive mistake in the climax. Earlier before we see the T-REX, its presence was felt with massive shakes on the ground due to its weight and in the climax, T-REX somehow went stealth mode.

[–] cmgvd3lw@discuss.tchncs.de 1 points 2 hours ago

But this is a wi(t)ch though.

[–] cmgvd3lw@discuss.tchncs.de 14 points 6 hours ago (4 children)

I did do this proof by induction back in the day, but now looking at the article I am clueless.

[–] cmgvd3lw@discuss.tchncs.de 6 points 7 hours ago (3 children)
[–] cmgvd3lw@discuss.tchncs.de 8 points 3 days ago* (last edited 3 days ago) (1 children)

Who is she?

[–] cmgvd3lw@discuss.tchncs.de 25 points 3 days ago (3 children)

I somehow read your username as Peg Jesus.

[–] cmgvd3lw@discuss.tchncs.de 2 points 4 days ago (1 children)

I kind of get the appeal, like turning your phone into a media munching device.

[–] cmgvd3lw@discuss.tchncs.de 7 points 4 days ago (1 children)

One of your statement is wrong and its not the latter.

[–] cmgvd3lw@discuss.tchncs.de 1 points 4 days ago

Wow trackpad gestures? I'm on gnome and their gestures are really good, if hyperland's is just as good I might try it out.

[–] cmgvd3lw@discuss.tchncs.de 10 points 5 days ago* (last edited 5 days ago)

that's about 30 toothpaste length

[–] cmgvd3lw@discuss.tchncs.de 1 points 5 days ago (1 children)
[–] cmgvd3lw@discuss.tchncs.de 1 points 5 days ago (1 children)

I think you forgot to read the body of the post

 

Please suggest a good and relatively affordable private email provider. I am considering tuta, mailbox right now. I know proton has gone rogue.

I cannot self host one and the email provider must be somewhat reputable as I will be using this for my work portfolio. Anything with €1-€3 per month is encouraged.

21
submitted 6 days ago* (last edited 6 days ago) by cmgvd3lw@discuss.tchncs.de to c/opensource@lemmy.ml
 

I was looking for a good and quick file transfer method and stumbled upon Warp on Linux (flatpak). It says the app is open source but I did a quick Lemmy search and someone mentioned the protocol magic wormhole is closed.

Even though I found the application very useful, like I can transfer files even when connected to a VPN service, the closed source nature turns me off.

Also when operating without a VPN, wormhole connects via local network, my desktop is behind a firewall, but the transfer still happen! How does it do that without opening a port in f/w?

Any alternate suggestions are welcome as well.

Edit 1. The domain for the magic wormhole relay and transit server that most open source clients (like Warp) use is magic-wormhole.io. I have to check if they really are open source.

Edit 2. There seems to a mention of the magic-wormhole.io domain in their PyCon 2016 presentation.

 

I am a complete noob when it comes to crypto and would like to buy some and use it for an anonymous transaction. But I don't know how to though.

Can I buy it with my credit card? What are some good wallets or buying authority? Should I go for an international one or stay local?

 

Many YT privacy frontends are down it seems. YouTube is cracking down on these servers fast. Both Invidious and Piped services are not working now.

So how are you watching videos now? Just plain youtube[dot]com with unblock and VPN?

 

cross-posted from: https://discuss.tchncs.de/post/26495994

  1. Reservoir Dogs (1992): A crime thriller about a group of criminals whose diamond heist goes awry, leading them to suspect one of their own is an undercover cop.

  2. Pulp Fiction (1994): A cult classic that intertwines multiple storylines involving hitmen, a boxer, and a pair of armed robbers in Los Angeles.

  3. Jackie Brown (1997): Based on Elmore Leonard's novel, this film follows a flight attendant caught in a money smuggling scheme, playing both sides against each other to secure her freedom.

  4. Kill Bill: Volume 1 (2003): An action-packed revenge saga about "The Bride," a former assassin seeking vengeance against her former colleagues.

  5. Kill Bill: Volume 2 (2004): The continuation of "The Bride's" quest for revenge, exploring her backstory and relationships.

  6. Death Proof (2007): Part of the "Grindhouse" double feature, it follows a psychopathic stuntman who uses his "death-proof" car to stalk and kill young women.

  7. Inglourious Basterds (2009): Set during World War II, it follows a group of Jewish-American soldiers planning to assassinate Nazi leaders.

  8. Django Unchained (2012): A Western about Django, a freed slave who teams up with a bounty hunter to rescue his wife from a brutal plantation owner.

  9. The Hateful Eight (2015): Set in post-Civil War Wyoming, it follows a group of strangers seeking shelter during a blizzard, leading to a violent confrontation.

  10. Once Upon a Time in Hollywood (2019): Set in 1969 Los Angeles, it follows a fading actor and his stunt double navigating the changing film industry.

 
  1. Reservoir Dogs (1992): A crime thriller about a group of criminals whose diamond heist goes awry, leading them to suspect one of their own is an undercover cop.

  2. Pulp Fiction (1994): A cult classic that intertwines multiple storylines involving hitmen, a boxer, and a pair of armed robbers in Los Angeles.

  3. Jackie Brown (1997): Based on Elmore Leonard's novel, this film follows a flight attendant caught in a money smuggling scheme, playing both sides against each other to secure her freedom.

  4. Kill Bill: Volume 1 (2003): An action-packed revenge saga about "The Bride," a former assassin seeking vengeance against her former colleagues.

  5. Kill Bill: Volume 2 (2004): The continuation of "The Bride's" quest for revenge, exploring her backstory and relationships.

  6. Death Proof (2007): Part of the "Grindhouse" double feature, it follows a psychopathic stuntman who uses his "death-proof" car to stalk and kill young women.

  7. Inglourious Basterds (2009): Set during World War II, it follows a group of Jewish-American soldiers planning to assassinate Nazi leaders.

  8. Django Unchained (2012): A Western about Django, a freed slave who teams up with a bounty hunter to rescue his wife from a brutal plantation owner.

  9. The Hateful Eight (2015): Set in post-Civil War Wyoming, it follows a group of strangers seeking shelter during a blizzard, leading to a violent confrontation.

  10. Once Upon a Time in Hollywood (2019): Set in 1969 Los Angeles, it follows a fading actor and his stunt double navigating the changing film industry.

 

Was browsing on the GrapheneOS website and came across a new thing called WebUSB, which is essentially a JS API through which GrapheneOS web installer worked.

This got me wondering, if website could read what's plugged into my computer like my phone or disks, isn't that a huge risk to privacy? I don't know how this works (haven't used it) so I would like to know about its privacy.

AFAIK Firefox doesn't allow this API, so that's a relief (I use librefox), but what about other browsers? I am getting a bit paranoid.

[Also, are there other APIs like these; which are a privacy nightmare that websites could use?]

25
submitted 6 months ago* (last edited 6 months ago) by cmgvd3lw@discuss.tchncs.de to c/privacy@lemmy.ml
 

I began using invidious after every piped instances refused to play videos lately. But what I read from their docs is that my IP might get exposed to google servers while loading videos from invidious. I use rethink DNS app and in that I can see all the domains that are getting called by my browser.

I tested about five instances and none are calling googlevideo domain as mentioned in the doc. Are they proxying my requests by default or am I missing something?

No, I don't have the option proxy video turned on. I use yewtu.be as my main invidious instance.

 

Couple of months prior, I read an article on Mozilla, where they did a research on automakers and found none comply to good privacy measures. I am planning to buy a used car. I want to know how the data is collected and transmitted.

The car comes with a connected app though I am not planning to use it. It also has apple car play and android auto. Should I use those? The article states some manufacturers even records sexual activities. How are they transmitting these informations? Through connected phones?

My use is fairly basic, I want to use the Bluetooth audio system in the car for listening to music on my phone. I use maps on my phone.

What about car servicing? Can they access stored information?

 

With the recent WWDC apple made some bold claims about privacy when it comes to so called Apple Intelligence. This makes me wonder if they did something to what Microsoft did with Recall feature, would people be less concerned and to an extend praise their effort?

Do you trust apple with their claims?

 

(timestamp-link) iPad Pro M4 Hands on - Why I just bought it.
Review from a top YT reviewer, Mrwhosetheboss. How do you guys feel about it?

 

Applications like EndeavorOS Welcome, Tor browser won't show their actual icons on the taskbar after Gnome 46 update. I have observed that applications launched by invoking the binary through terminal using ./ behaves this way. (Not sure about the EOS Welcome) Is there any fix to this?

OS: EndeavourOS Linux x86_64. DE: GNOME 46.1. Icons: Papirus [GTK2/3].

[Edit: This is not a freshly installed system. Icons were working fine till Gnome 45.]

view more: next ›