Scoopta

joined 2 years ago
[–] Scoopta@programming.dev 1 points 1 year ago (5 children)

Theoretically signal only has your phone number and time of sign up which means theoretically it shouldn't matter if the legal system asks them for information.

[–] Scoopta@programming.dev 0 points 1 year ago (1 children)

I personally draw a distinction between "real" programming languages and scripting languages. Scripting languages being languages that are traditionally source distributed. They tend to be much easier to write, run slower, often but not always dynamically typed, and operate at a higher level than "real" programming languages. That's not to say they aren't actually useful or difficult to learn etc. It's not a demeaning separation, just a useful categorization IMO. Not to say the categorization always holds water in all those attributes, luajit is way faster than Java but it does follow the other bits. As someone who loves C there are lots of languages that seem too limiting and high level, doesn't mean they aren't useful tho.

[–] Scoopta@programming.dev 7 points 1 year ago (1 children)

I don't want to be one...I like to look at them, there's a reason I only play as girls in 3rd person games XD.

[–] Scoopta@programming.dev 2 points 1 year ago

Network location sounds impractical for anyone other than power users, maybe USB? Probably not big enough tho. Looking at my system, I have tebibytes of data and don't see how it could work outside of an in place conversion. Ofc I'm already on Linux but if I weren't.

[–] Scoopta@programming.dev 2 points 1 year ago (2 children)

The copy across their data for them honestly sounds the most difficult just because of the free space requirements and juggling the partitions. It would only work for users that had 50%+ free space. There is a tool called ntfs2btrfs which may be an option but in place filesystem conversions scare me, maybe it's reliable. Otherwise you have to leave them on NTFS or erase their data which are both less than ideal.

[–] Scoopta@programming.dev 14 points 1 year ago

I'm so excited for this!!

[–] Scoopta@programming.dev 8 points 1 year ago (3 children)

I don't see how playing girls in games means anything? I play girls in games because I'm straight and girls are cute and I like to look at cute things.

[–] Scoopta@programming.dev 2 points 1 year ago* (last edited 1 year ago)

I am aware secure boot doesn't require a TPM, but I've always been confused by its purpose since it's trivial to disable. Makes sense if you use it in conjunction with TPM measurements. I personally encrypt all my filesystems except my /boot which is also my ESP, I use the efistub and that's good enough for loss of device. For a physical attacker with actual skills I'm SOL, it's not that I don't want to protect against it, I just couldn't figure out a reliable way to.

[–] Scoopta@programming.dev 2 points 1 year ago (2 children)

By that statement I take it then without TPM you basically can't have truly secure secure boot? Since the password is your protection from secure boot tampering but the TPM is your protection from password tampering

[–] Scoopta@programming.dev 2 points 1 year ago (4 children)

The last time I tried enabling a UEFI password clearing the CMOS would clear it. I haven't tried on my latest mobo...but I'm just putting it out there that SOME UEFIs do that

[–] Scoopta@programming.dev 6 points 1 year ago (6 children)

I'd argue any solution necessitates secure boot, not just the efistub. If someone is determined enough to modify your kernel they'll be determined enough to modify your bootloader

[–] Scoopta@programming.dev 2 points 1 year ago

I wonder the same especially because it won't do anything for the game itself. Yeah, all the system components the game uses might be a touch faster but the game itself won't be compiled with any of these optimizations.

view more: ‹ prev next ›