unhrpetby

joined 9 months ago
[–] unhrpetby@sh.itjust.works -5 points 3 days ago* (last edited 3 days ago)

Some of those countrymen are conscripts. 2/3rds? Which makes continuation of battle far less justifiable IMO.

Some people will choose to fight in Ukraine, to possibly die in Ukraine. Conscripts face punishment for refusal.

How many of those fighting would refuse the peace deal?

[–] unhrpetby@sh.itjust.works 2 points 1 week ago (1 children)

High memory usage isn't a problem by itself.

The issue is when it's used inefficiently or for useless purposes. An unoptimized application takes 500MB of extra memory and that is 500MB that cannot be used for read/write caching nor another application, and 500MB closer to an OOM situation.

In theory, an application can suffer from issues of underutilization of memory, just as one that over-utilizes memory. In practice, I find that lower-than-expected memory use is a much more positive indicator of an optimization-focused project than one that uses more memory than expected.

In the meantime, it's not sitting there, unused and useless.

If your system uses caching, then "usused" memory may not be so. Memory used for caching is also cleanly "Available" for use if needed. This is not the case with the 500MB of extra memory a process might decide to capture. Of course this is complicated further with swap (I wouldn't use it).

[–] unhrpetby@sh.itjust.works 5 points 1 week ago (3 children)

I'm reminded of the horrid example showcased on the amber-lang website previously.

[–] unhrpetby@sh.itjust.works 1 points 2 months ago* (last edited 2 months ago)

Overreaction is the only tool that works to stop enshittification before it starts.

Overreacting can undermine your cause. I don't see how reacting accordingly cannot "stop enshittification before it starts".

[–] unhrpetby@sh.itjust.works 4 points 2 months ago* (last edited 2 months ago)

It can be if you buy from stores, such as GOG and Itch, that provide DRM-free downloads of games. Even Steam, depending on the game.

[–] unhrpetby@sh.itjust.works 2 points 2 months ago* (last edited 2 months ago)

My fstab doesn't actually get read on startup. Simply because mount -a is never called.

Just to demystify this magic file.

[–] unhrpetby@sh.itjust.works 6 points 3 months ago* (last edited 3 months ago)
[–] unhrpetby@sh.itjust.works 2 points 3 months ago* (last edited 3 months ago)

Do you lock your door at night? Why? Anyone could just use a fireman's axe and open it. Or they could just drive through your living room and steal everything.

For kernel-level anti-cheats its quite simple. Those in opposition to kernel-level anti-cheats likely view locking a door as a small task with minimal downsides, which could reasonably deter an opportunistic criminal, or buy you time to escape with your life or call the police.

They also likely view kernel-level anti-cheats as, for the benefits they provide, having too large of downsides. (providing a third-party company kernel-level access via a closed-source program)

If you're concerned about privacy just dual boot windows in a separate SSD to play games and use Linux and Graphene OS.

In another thread in this comment section I mention UEFI rootkits and firmware implants (kernel-level access is strong starting point for this). Your solutions do not address these issues, which could be important to someone. (Depending on their threat-model)

[–] unhrpetby@sh.itjust.works 4 points 3 months ago* (last edited 3 months ago)

If you tell me that all I need to do to negate the security concern of the kernel level anticheat is to run the dualboot windows partition...

...it makes intuitive sense that installing a kernel level anticheat would only affect the windows kernel it was installed on not the linux kernel on the other drive partition.

The intuition is incorrect as the kernel-level anticheats are not necessarily trusted. Operating systems interact with low-level hardware and firmware on the system. As such, it is not self-contained.

https://www.kaspersky.com/about/press-releases/more-elusive-and-more-persistent-the-third-known-firmware-bootkit-shows-major-advancement

There exists both UEFI bootkits and firmware implants. Its intuitive if you understand it like this: if there exists a communication pathway from (A) lower-privilege code -> (B) higher-privilege code, there exists the potential for vulnerabilities.

This is due to (A) now having an effect on the code execution for (B).

[–] unhrpetby@sh.itjust.works 4 points 4 months ago

Protect the kids from drag queens, sex games, porn? is a pedophile.

Or simply ignorant. That blanket statement needs evidence.

Someone who is tooth and nail anti-LGBTQ? they're always in the closet.

Similar to the above.

[–] unhrpetby@sh.itjust.works 1 points 4 months ago (1 children)

So, I'm not allowed to ask you for proof of your statement? And if its unrelated, then why did you post it? Its unrelated. Also, you're saying you have an absence of evidence, ergo you have no evidence. Having no evidence does not qualify as evidence

Asking for evidence wasn't the issue, believing that the truth relies solely upon a discussion providing such evidence is.

I think you are confusing having an option with something being mandatory.

You misunderstood. Some of your own statements say it matters and is used. Mandatory wasn't mentioned nor implied.

And Tor nodes are not the same thing as VPN multi-hop.

I just realized you think that Tor is built using multi-hop.

I didn't state they were the same. Tor uses "multiple hops" (you can find that string the the link I posted earlier). It is critical to the limiting of information seen by any single entity.

And again, if you connected your Firefox browser to Tor, we could still track you. You'd get cookied or localStorage() tracked. When you disconnect from Tor, that stuff is still present in your browser. Almost like the number of hops you take or the IP address used doesn't seem to really matter, huh?

All that state can be removed. And the server might not be tracking that. Situations vary, adversaries vary. If you cannot imagine a scenario in which hops or IP address would matter, I would suggest doing some research.

Its a real life Dunning-Kruger effect! I've never encountered this. You are going to do something really stupid and end up in prison.

Personal swipes mark the end of this discussion. I would suggest you to leave those out next time as It detracts focus from constructive learning.

This will be my last reply. You can also reply if you want (but I won't see it).

view more: next ›