Oh. And an invite-only could also work for new accounts.
On an instance level, you can close registration after a threshold level of users that you are comfortable with. Then, you can defederate the instances that are driven by capitalistic ideals like eternal growth (e.g. Threads from meta)
But terrible handling of metadata. Which is the case for all chat apps AFAIK. Like, even with OMEMO, who talks with whom, and when, can be exposed. Which sometimes is enough to get legal issues (e.g. Ola Bini’s case)
The “other criminal activity” probably includes many horrible things. Not just a teen selling shrooms. So, I am not so sure that’s really what we want.
As for git, many basic concepts (e.g. staging area) clicked for me after reading some articles that Atlassian (people behind BitBucket) wrote. Other than that, I’d recommend adamj.eu 's book “Git DX” which is on gumroad. Haven’t read it, tho. But I read his Django DX and like 90% of it was stuff I had to learn on my own, and thought: oh, how come I didn’t find this book earlier…
Not to mention the third Korea, which sounds so Chic (⁀ᗢ⁀)
AI (e.g. face recognition) is riddled with false positives. Such a tech already does wrong on civilians without being a weapon (e.g. cameras on subways). What you said is somewhat naïve.
OpenCamera is good, but could do better. But I’d say video editing is the biggest void.
Also, gesture typing keyboards are an empty niche of foss alternatives. HelioBoard requires loading some proprietary blob unfortunately.
I guess the most heavy machine learning use cases are not filled in.
Just yesterday I deployed it locally, and was about to migrate from my keepasDX (+syncthing)…
This is happening on a regional level, east germany is way different than west. How different? I can’t tell in detail, but demographics and worldviews are the two more salient categories for such differences.
Women are you back to KDE the same as GMO or a VPS with special software or (…)
AV1 video codec !
Oh, fair point. Perhaps rclone.org then! :O
Syncthing. Look no further, just check the “untrusted device” so that you don’t give unencrypted data to your friend’s disk.
I assume this is an old laptop? If you’re able to remove the battery, as in the old models, you can measure it’s full milliamperes when at a 100%. It’s probably going to show a lower value than what’s reported by the user guides. From what you tell, I’d expect something as low as 1.5k… Beware that removing batteries with tools and so on might make them explode and is many times, just not an option.
Perhaps you can even see this in the BIOS. Some modern BIOS might even tell the number of charging cycles, allowing you to infer it’s worn out. Chances are, you need a new battery. Which is tricky, since oftentime the “new” battery was sitting at some store but was manufactured by the company when the laptop model was fresh.
Oh, tough one. I don’t know what’s that protocol. But I guess it’s not tied to WiFi. So, How about getting a cheap ethernet switch? That’s how I connect devices in my living room to the router given by ISP that’s on the other side of the wall.
It’s been always the same. Backend, server logic, database… dynamic content; on one hand. JavaScript runs on the browser for almost anything, sometimes for dynamic content. But it’s not tied. You could have an in-browser button with a counter for the numbers of times it was pressed (that’s actually an entry-level programmer exercise) and that’s a static site. If you saved the counter value to the server (e.g. database) then it’s not static anymore.
This! And, baby-steps: don’t go about installing every app you see. Try backup strategies, put them to test (bring service down and up again with data from backup). Play, have fun.
The week went by and this was left unanswered. Usually I research a bit to treat anything on these threads. This time, I’m on the phone, so I went lazy and directly to chatgpt. Hopefully this is not an AI hallucination and it sheds some light for you.
The performance difference you’re observing between AES128-CTR and AES128-GCM in OpenSSH with X11 forwarding can be attributed to several factors, including the nature of the ciphers and hardware acceleration support.
AES128-CTR vs AES128-GCM
Cipher Characteristics:
Hardware Acceleration:
Checking Hardware Acceleration
To determine if your system is using hardware acceleration for AES operations, you can check the following:
CPU Support:
aes
in the output, your CPU supports AES-NI.OpenSSL Benchmark:
SSH Configuration:
/etc/ssh/sshd_config
for the server and/etc/ssh/ssh_config
or~/.ssh/config
for the client):Conclusion
The performance difference between AES128-CTR and AES128-GCM is expected due to the additional authentication overhead in GCM mode. Ensuring that your system is utilizing hardware acceleration (AES-NI) can help mitigate some of this overhead, but GCM will generally still be slower than CTR. If performance is critical and you do not need the additional authentication provided by GCM, sticking with CTR mode might be the better option.