How about torrenting?
pending anonymous user
How about torrenting?
Ops. Missed that part.
I use BTRFS for snapshots, and auto compression. Maybe it can be done with raids with LVM? AFAIK BTRFS redundancy is basically the same as traditional RAID, similar to using mdadm. Still, you would want a backup strat instead relying on the disk redundancy. I learn that the hardway.
I would just skip RAID, add all disk to a single BTRFS and use the built in profiles for (meta)data redundancy.
Cache I don’t know much tho.
Utill you’re no longer live in the US. I can’t find Ptivacy alternatives after moved out.
deleted by creator
Unless you want to game. Anti-cheats are notorlessly anti-virtual machines.
So use what browsers? Chrome sounds more secure (I didn’t read previous post), yet I don’t want an advertising company looking at my browsing habbits, nor supporting them dominating the browser market share and have a powerful influence on every web standards.
Maybe. I’m not in the loop but I believe you would need to gain some solid trust from the core team to get that access. It won’t be a knowledge just flows in the scene up for any newly join members to grab.
AFAIK, L1 are hardware backed using Trusted Execution Environment like ARM TrustZone. Unless you can find an exploit to exfil the key from the chip, you have no luck. It was done before and published, but I believe it is patched already. Anyone holding such exploit would keep close to their chest to avoid it beimg patched.
I never used it, but I would assume yes after reading the frontpage and the doc. At no point there is a PSK set between sender and reciever, not I see any signs for key exchange between devices.
This is not a definitive answer though as I didn’t read the source code of Nfty, nor the UnifiedPush spec.
“NAPO’s goal in the meeting was to ensure that the proposed rules protect not only officer’s private information from being sold and made public, but also safeguard law enforcement’s access to certain publicly available data that is vital to aiding victims and preventing and solving crimes,” the group said in a newsletter published last month.
Read: We want to look at your private data but not ours.
What a jackass.
I use SimpleX for this matter. Each device get its own account, and I just create a group named “self” with all of them. You can selfhost the server too if you prefer that route.
It is the recent use after free vuln actively exploited found in FF, which both Fennec and Mull relies as upstream. This compounds on changes made to Android NDK and the source of FF move into the monorepo, making them harder to build. Hence, they’re still vulnerable to the attack.
Never heard of them. Will check them out sometime. Thx.
Triangulation needs to know where the signal comes from (angles). Which mode’s device doesn’t have the capability of doing this. The most they can do is estimate by signal strength.
Appflowy if Notion appels you. It is not 1.0 yet so some features you need might not be there.
Last time I heard, no. They are burning money to train new models.
Starting out with Python by Tony Graddis
I read the 3rd edition in library, now it’s 6th. Don’t know if it is as good as the memory serves.