

When you’re alone, and life is making you lonely you can always go… Downtown Abbey!
I’m the administrator of kbin.life, a general purpose/tech orientated kbin instance.
When you’re alone, and life is making you lonely you can always go… Downtown Abbey!
Wireguard vpn into my home router. Works on android so fire sticks etc can run the client.
It’s in the app list for me. I set it to disabled.
Phone is Samsung s24 ultra.
Gemini is an app, I disabled that. I also shut off the key press and there’s some other places you can turn off some of the automatic AI features, and also there’s a setting to disable the “online” AI in general.
But that’s why in another comment I said, I am still not sure I turned it all off (or even if it is possible to).
Doesn’t the motorola phone have a settings screen for defining what the button does? For Samsung they like to re-purpose the power button.
First of all, it brought up bixby. I turned it back to powering off the phone and disabled bixby.
Then, with the new update they re-assigned the power button to gemini. So, I turned it back to powering off the phone and disabled gemini too.
However, the problem these days is that I’m never completely sure I’ve turned off all of the AI nonsense on my phone.
Pretty sure I disabled Gemini as one of the first things I did when I got my phone. But, yes when I read that, to me it did seem like a serious overreach for something that was going to be “on by default” for most users.
Yeah. The suggestion I saw was that instead of retracting the gear they mistakenly retracted the flaps.
Now in the video the wings do look quite flat. But yes, it would be hard to say for sure in a video of that quality at that distance.
The descent looks (to my untrained flight sim eyes) to be controlled albeit without power.
At 400ft agl they had very little options most likely. Not even much choice in what they hit.
Very sad all round.
Linux secure boot was a little weird last I checked. The kernel and modules don’t need to be secure boot signed. Most distros can use shim to pass secure boot and then take over the secure boot process.
There are dkms kernel modules that are user compiled. These are signed using a machine owner key. So the machine owner could for sure compile their own malicious version and still be in a secure boot context.
They’re deporting themselves now too? That’s efficient.
Yep. Also, I did clarify that I would usually do an overall upgrade at the same time.
I get the message there’s an upgrade. Say I’ll do it myself, go to console.
yay -S discord (or more likely just do an overall upgrade and reboot, what they hell)
Restart discord.
Should it, or should it be “1”? (just removing one, one)
It is if you leave the keys in the ignition.
They send fake (non-existing) actor ids for votes to obfuscate the identity of the real user. It is “compliant”, but completely against the spirit of a public social network.
There have been discussions about how to implement this before. But it has to be done in a way that is agreed by other threadiverse software. Unless they actually provide profiles for these fake actors there will be problems since some software will look up the profile info to cache it, even for likes…
Personally I’m of the opinion of a standard header to mark a favourite message as a private one and use a random ID that the originating instance can use to validate the message as genuine. But, this needs to be adopted properly by all.
But this is the crucial thing. It wasn’t in the repository. It was in the tarball. It’s a very careful distinction because, people generally reviewed the repository and made the assumption that what’s there, is all that matters.
The changes to the make process only being present in the tarball was actually quite an ingenius move. Because they knew that the process many distro maintainers use is to pull the tarball and work from that (likely with some automated scripting to make the package for their distro).
This particular path will probably be harder to reproduce in the future. Larger projects I would expect have some verification process in place to ensure they match (and the backup of people independently doing the same).
But it’s not to say there won’t in the future be some other method of attack the happens out of sight of the main repository and is missed by the existing processes.
I bought my first HDD second hand. It was advertised as 40MB. But it was 120MB. How happy was young me?
Yeah but if you tick TCP and pay the extra postage you can get proof of receipt.
Yeah, but asking film/tv producers for permission would kill my content collection!
And just to show I’m serious, you have zero seconds to comply.
There is usually a common-sense bar where this is applied though. Some items on that list would for sure apply, but in that case the employee should politely decline, not hand the goods over to the owner. I’d like to think that’s fake. But, I can imagine that it’s very real somewhere.;