That’s truly as lightweight as you’re going to get. Cool little script.
That’s truly as lightweight as you’re going to get. Cool little script.
If you like Heimdall you could run it without Docker. It’s a PHP app, you could run nginx and it would be pretty lightweight.
I used to have pi-hole setup and a housemate complained that he could no longer click on Google ads 🙄
If anything it will make things load faster as you’re blocking a massive steaming pile of ads, trackers, etc
It seems you completely misinterpreted the intention of the article (willingly or ignorantly).
At Skiff, we take an authoritative position that PGP is no longer useful, long outdated by better encryption protocols, encumbered by unneeded complexity, and hard to use even from the start.
Except for “no longer useful” the rest is pretty much unanimously agreed upon within the community.
Seems suss. Can you find that app installed on your system and verify if it is a legit system app?
Please don’t do this. It’s immoral to ride off the free work of others, then turn around and rug pull them. Either stick with open source and take the good and the bad, or go proprietary. Don’t do this fake open source that harms the community. If you have a permissive license there’s nothing stopping you from selling other’s work and a CLA is not needed. If you have a copyleft license then a CLA defeats the entire purpose of that.
There are no open source licenses that do not allow for commercial applications. It goes against the very core of what it means to be open source.
However, what you’re probably looking for is a license that prevents people from taking your code and making a commercial application without giving back. What this means is that any copy of your source code must also be open source. This is what a copyleft license does and you could look at something like the GPLv3 or the less restrictive MPLv2.
The Android app is horrible btw. If I had to guess it’s just a desktop web page scaled down and packaged in an app.
You can run your own mail server and keep your emails on a device you control instead of e.g., gmail.
It’s non-trivial so most people stick with letting someone else handle it. Just like you’re probably not running your own Lemmy instance, but Lemmy is still decentralized.
Linux people are passionate about Linux and will tell you all the reasons to switch. I’m here to tell you to stick to what you already know. There’s no point changing your entire operating system if you don’t have the time to invest in a totally new way of using your computer.
It does make me curious why you even decided to install Linux though. Something must have made you take that step.
I understand and that’s definitely a valid criticism of Linux. It’s not a drop in replacement for Windows and it’s definitely not as user friendly or targeted towards a general audience. Due to the flexibility of customisation, and the sheer amount of different distributions it is hard to provide individual support without knowing all the details of your system. It’s not like Windows where in general you’re probably running one of two versions.
And while being a criticism to some, it is also a strength to others.
If you ever get stuck on something feel free to shoot me a message and if I can I will try and provide advice.
Well that is the question I intentionally asked in my 1st comment so yeah that’s a good start :P
Considering that it definitely is a Bluetooth device that means it has to be relatively close to your computer. Unless you live in an apartment building and are in range of Bluetooth devices not in your household you should be considering the electronic devices around you.
Do you have any “smart” devices like a baby monitor, a home camera system, vacuum, air purifier or any such thing that has Bluetooth?
Because you are saying that there’s no new devices that you can think of, and it does seem suspicious, my thought goes towards a device that is connected to the internet and has potentially been hacked and is now misbehaving. It may not be the case but best to err on the side of caution and you did the right thing by not accepting the connection.
Of course you need a foundational knowledge of Windows before you are able to accomplish certain tasks. You are not born with the knowledge of how to operate a computer. Even people who have not used computers before struggle with basic tasks. If I ask someone who is new to Windows to install Photoshop will they be able to accomplish it with no prior knowledge? You have to know you open the web browser, navigation to the proper website, download the installer, run the installer, find the menu shortcut, etc.
As for how to install programs on Linux it does depend on the distribution and the application you wish to install but let’s take Ubuntu for example. If I want to install VLC I would type sudo apt install vlc
. If I want to install Firefox I would type sudo apt install firefox
. Instructions should be available online with a quick search.
It doesn’t necessarily mean you aren’t intelligent but perhaps you’re trying to do things you would do in Windows without having a foundational knowledge of Linux. Linux is not a drop-in replacement for Windows, it’s a totally different operating system with different ways of doing things.
In this example situation you are talking about it’s the equivalent of if I asked you to edit an image in Photoshop but you didn’t have it installed. That’s what “command not found” is trying to tell you. It’s not found because it’s not installed on the system.
I think they’re trying to say that a lot of the time reading the documentation treats you as if you’re an expert in that particular topic, but if you can find a good guide it will usually give you all the information and commands you need to accomplish what you wanted to do. They go on to say they prefer guides that respect the user’s intelligence while not making things overly complex.
Specifically for attempting to bypass certificate pinning you’re solidly in the realm of reverse engineering. I haven’t attempting it myself but I have read the efforts of others over the years and the process was quite evolved and ever changing. If you are interested in going down this rabbit hole you may use these links as starting points but be prepared to adapt them.
https://gist.github.com/approovm/e550374428065ff1ecafca6a0488d384
https://codeshare.frida.re/browse
Best of luck.
How did you see it in the first place? I’m trying to help you get to the bottom of it but without answering the appropriate questions or providing a way for us to analyse it it’s going to be extremely difficult unless someone comes along who knows more. Anyway best of luck ans hopefully you find out.
Well if the original comment said it makes it less likely to get doxxed I would have agreed. But that’s not what the comment said. I was replying to what was actually said which is when I pointed out that privacy and anonymity are not the same thing (in the context of being immune to doxxing). If you were anonymous on the internet then you would be immune to getting doxxed (however unrealistic that circumstance may be).
I don’t think it’s literally a search and replace but a part of the prompt that is hidden from the user and inserted either before or after the user’s prompt. Something like [all humans, unless stated otherwise, should be ethnically ambiguous]. Then when generating it’s got confused and taken it as he should be named ethnically ambiguous.