I thought you were thinking an AI based code generator klike copilot) does it, when you said the IDE does it.
username checks out /s
which country would be better?
I disagree that users won't do stuff on their own. They will, but they will allocate very little time to it, on average, especially when compared to a tech savy person. And that's just because their computer is a tool.And if they cannot make their tool work for what they want to do, they'll find another way. Or deem it impossible.
also don't forget that many don't even have the time and energy
and start off from a fundamentally wrong premise: that people are willing (let alone wanting) to manage their own operating systems.
people shouldn't need to manage their own operating systems, to begin with
not the IDE, its the compiler. this is also not some AI shit, in many cases (not all) the compiler can actually figure out how to do this, because it's not hard, it would just be a lot of boilerplate if written manually.
in my understanding OP was not comparing it to simple wireguard
where did you read it that rust obfuscates the code?
you want vmprotect and such for that
It's up to users to know what they are installing.
Except when all you get is an UAC prompt when clicking the play button, without giving you any information, other than that it wants to execute an exe in a temp dir with a random name.
the kernel level part of that specific thing is preventing process startup after it was killed
antimalware is literally worthless as has been for at least a decade. not even once did I get a spyware (or other) alert for the software of any commercial data harvester company. they are literally bought out and even the blind can see this
afaik duckduckgo knows all of this.
site: limits the site to search on, even shows a warning for that.
"quotes" make sure all results contain the word.
-apple make sure you wont see results where the page contains this word
to simple wireguard? there are wireguard based mesh network solutions out there
the AI thing must be something relatively new. shows they are all for using buzz tech
There isnt much to discuss
oh I think there is!
you know what is tiring for fucks sake? that you are parroting your opinion basically, without pointing to any evidence. I don't know this service, but do you call them rapists because they are known for doing that, or because they didn't block users that were accused of rape?
I don't approve of rape and fascism either. but you know, private services don't make a difference between anyone. why? because they can't make sure the accusations are true. if they can by looking at your data, they are not a private service.
would you ban encryption because rapists use it too? encrypted services, like proton and matrix? signal? do you think they are guilty of allowing to conduct rape in secret?
even if it turns out the maintainers are rapist fascist fucks themselves, the previous paragraph stands, and I'm interested in your responses.
where I live those run off of a little solar panel. if we're talking about the same thing, I doubt that it has ALPR function
because they don't yet circumvent it. but also, are you completely sure everything is blocked? DoT, DoH traffic and such?
that's a good way to discount any real situation
it seems so. makes so much sense I can't even comprehend it
Recently there was a post where the OP pitched an idea for a service related to this community. I don't want to go into details but the post's text has shown that maybe there's some misunderstanding around the technology, and a considerable amount of us also thought that it's not a good idea. The post was removed (noticed because I couldn't reply to someone) probably because the OP felt shame for their "failed" idea, but I think we shouldn't delete posts for reasons like this.
The post created an interesting discussion around the idea with useful info. It's useful to have things like these for future reference, for similar discussions in the future. This is an anonymous forum, so there's no shame in recommending things, when you do that politely like it was done in that case.
Matrix, the open protocol for secure decentralised communications
Introduction of the first Managing Director
I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install
parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/
.
Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.
I have checked the version of gem by running gem --version
.
This is on a Debian Bullseye based distribution.
"Trusted Computing" - ever heard of it? This motion graphic style documentary explains what the term "trust" has in common with "Trusted…
The video is a short documentary on Trusted Computing and what it means to us, the users.
If you like it and you are worried, please show it to others. If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.
Computers and the internet gave you freedom. Trusted Computing would take your freedom. Learn why: https://vimeo.com/5168045