![](https://programming.dev/pictrs/image/b81990bc-be00-4002-bfbc-0ea56c57a554.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
To be fair, it’s as “new” as what the major record labels put out!
Father, Hacker (Information Security Professional), Open Source Software Developer, Inventor, and 3D printing enthusiast
To be fair, it’s as “new” as what the major record labels put out!
For pair programming it works well with Vigor 👍
TAR LAZER!
Just use Gentoo. Do it from scratch on the command line without the GUI installer like a pro 👍
At the very least you’ll learn how everything works at a deeper level.
You say that because you don’t realize the benefits:
There’s actually a lot more reasons but that’s probably enough for now 😁
I’d love to see more adoption of… I2C!
Bazillions of motherboards and SBCs support I2C and many have the ability to use it via GPIO pins or even have connectors just for I2C devices (e.g. QWIIC). Yet there’s very little in the way of things you can buy and plug in. It feels like such a waste!
There’s all sorts of neat and useful things we could plug in and make use of if only there were software to use it. For example, cheap color sensors, nifty gesture sensors, time-of-flight sensors, light sensors, and more.
There’s lmsensors
which knows I2C and can magically understand zillions of temperature sensors and PWM things (e.g. fan control). We need something like that for all those cool devices and chips that speak I2C.
Catastrophe
The most European meme.
With big freedom come big cursors. Every click is a boom of libration!
I’m failing to see the problem. As long as one of the languages isn’t PHP they’re still probably better off 🤷
If you’re putting in a dishwasher just drill the holes. Your landlord will thank you for saving them the trouble of having to do that themselves some day.
I don’t think any normal landlord would give two shits about some dishwasher-hose-sized holes drilled under a sink, between internal cabinet walls, that no one will ever see. Such holes are so far back and out of the way… No one would ever notice unless they’re missing.
Wait: Do the times listed on the screen of your washer/dryer actually reflect reality‽
My dryer will say it’s got 20 minutes remaining for like an hour and a half. And yes, I clean the lint screen and vent regularly (all the way up to the roof!).
You’re thinking that every Android device is reasonably new. This is not the case.
There’s devices running Android from >12 years ago that can’t get apps any other way than F-Droid because Google Play Services no longer work.
This is caused by your root controller’s limited bandwidth and it’s inability to handle that many 3.0 devices at the same time. Some of the newer motherboards with USB C PD have controllers in them that can do a lot more.
It’s basically a hack on part of the company that made the root controller IC. They know they only have enough internal bandwidth to support 16 USB 3.0 devices so they intentionally bork things when you plug in more than that since their Transaction Translator (TT) can’t handle more and they were too lazy to bother implementing the ability to share 2.0 and 3.0 properly.
I’m guessing the decision went something like this…
“We have enough bandwidth for 16 3.0 devices… What do we do if someone plugs in more than that?” “Only a few people will ever have that many! We don’t have the budget to handle every tiny little use case! Just ship it.”
So it’s not Linux fault in this case. Or at least, if it is (a problem with the driver) it’s because of some proprietary bullshit that the driver requires to function properly 🤷
This is a great idea! Lock picking is fun and super impressive to laymen (haha).
Just don’t tell anyone but your closest, most trusted friends (haha). Also, tell them to keep it a secret! Why? So your neighbor doesn’t knock on your door at 2AM because they locked themselves out of their apartment.
Also, you don’t need cutaway locks! They’re neat toys but nothing more. What you really need is a variety of locks to play with.
Head to your local hardware store and pick up a bunch of cheap locks. Or just ask friends if they have any old padlocks they’re not using (most people will have one or two).
Docker containers aren’t running in a virtual machine. They’re running what amounts to a fancy chroot jail… It’s just an isolated environment that takes advantage of several kernel security features to make software running inside the environment think everything is normal despite being locked down.
This is a very important distinction because it means that docker containers are very light weight compared to a VM. They use but a fraction of the resources a VM would and can be brought up and down in milliseconds since there’s no hardware to emulate.
An electric version of any instrument can be as small as you want it to be. It’s just a matter of training and ergonomics at that point.
For example, if you’ve got 10,000 hours playing the cello it wouldn’t be very easy to translate that into having equivalent skill playing a tiny electric version. But it could be done. Nooo problem!
The technology is there, it’s just that there’s no demand 🤷
Don’t think of it like that. Think of it like, “next quarter’s profits”.
It takes a lot of effort for non-technical people to switch to a new OS. Microsoft can capitalize on that to rake in egregious profits for probably five years or more before businesses finish sincere efforts at supporting Linux.
Linux never ran on the Commodore 64 (1984). That was way before Linux was released by Linus Torvalds (1991).
I’d also like to point out that we do all rely on non-proprietary protocols. Examples you used today: TCP and HTTP.
If we didn’t have free and open source protocols we’d all still be using Prodigy and AOL. “Smart” devices couldn’t talk to each other, and the world of software would be 100-10,000x more expensive and we’d probably have about 1/1,000,000th of what we have available today.
Every little thing we rely on every day from computers to the Internet to cars to planes only works because they’re not relying on exclusive, proprietary protocols. Weird shit like HDMI is the exception, not the rule.
History demonstrates that proprietary protocols and connectors like HDMI only stick around as long as they’re convenient, easy, and cheap. As soon as they lose one of those properties a competitor will spring up and eventually it will replace the proprietary nonsense. It’s only a matter of time. This news about HDMI being rejected is just another shove, moving the world away from that protocol.
There actually is a way for proprietary bullshit to persist even when it’s the worst: When it’s mandated by government.
This is a, “it’s turtles all the way down!” problem. An application has to be able to store its encryption keys somewhere. You can encrypt your encryption keys but then where do you store that key? Ultimately any application will need access to the plaintext key in order to function.
On servers the best practice is to store the encryption keys somewhere that isn’t on the server itself. Such as a networked Hardware Security Module (HSM) but literally any location that isn’t physically on/in the server itself is good enough. Some Raspberry Pi attached to the network in the corner of the data center would be nearly as good because the attack you’re protecting against with this kind of encryption is someone walking out of the data center with your server (and then decrypting the data).
With a device like a phone you can’t use a networked HSM since your phone will be carried around with you everywhere. You could store your encryption keys out on the Internet somewhere but that actually increases the attack surface. As such, the encryption keys get stored on the phone itself.
Phone OSes include tools like encrypted storage locations for things like encryption keys but realistically they’re no more secure than storing the keys as plaintext in the application’s app-specific store (which is encrypted on Android by default; not sure about iOS). Only that app and the OS itself have access to that storage location so it’s basically exactly the same as the special “secure” storage features… Except easier to use and less likely to be targeted, exploited, and ultimately compromised because again, it’s a smaller attack surface.
If an attacker gets physical access to your device you must assume they’ll have access to everything on it unless the data is encrypted and the key for that isn’t on the phone itself (e.g. it uses a hash generated from your thumbprint or your PIN). In that case your effective encryption key is your thumb(s) and/or PIN. Because the Signal app’s encryption keys are already encrypted on the filesystem.
Going full circle: You can always further encrypt something or add an extra step to accessing encrypted data but that just adds inconvenience and doesn’t really buy you any more security (realistically). It’s turtles all the way down.