himazawa

joined 1 year ago
MODERATOR OF
[–] [email protected] 0 points 1 year ago (1 children)

You are right, they should rewrite the engine, but they didn't and they preferred enforce the development on the re-re-re-re-re release of titles like skyrim for every possible platform on the plant.

Look at what Larian did instead.. Took 6 years, added beta access and listened to the players. BG3 is far from being bug-free or "perfect" but they released a game that give almost total freedom on how you can play it, and doesn't feel like you are on rails every time.

The problem is bethesda and others "AAA" software houses for years just did the lazy job and now that a software house showed what 6 years of real development should look like everyone is doing the Pikachu face and crying because "We don't want BG3 to set a new standard". The issue is us, the players, that keep buying shit for too much money.

 

Used nix last year but dropped it after home-manager decided to unlink the apps from the Applications directory.

How is the current situation on usability of nix-Darwin + home-manager + brew?

Packages still fails to get indexed correctly in spotlight? I really like a fully repro environment but the fact that the usu ability was low bothered me a lot.

[–] [email protected] 0 points 1 year ago (3 children)

BG3 is unmatchable, not only for hogwarts legacy but for every other game.

Starfield on the other end.. is the same oblivion stuff but in 2023 and without 2023 capabilities

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago)

A raspberry with Adguard + unbound, a zimaboard with truenas scale running the -arr suite, nextcloud, homeassistan, homarr, headscale and caddy 2x2TB nvme and 3x 4tb HDD I recently got a new PC and I think I will convert it to being part of the homelab, it has a ryzen 7 3xxx and a 2070 super.

[–] [email protected] 2 points 1 year ago

Ye you are right but I was talking of 3D enclosures where you can put a zimaboard or whatever mini pc.

[–] [email protected] 1 points 1 year ago

Don’t expose anything from your local network to the internet (unless you want multiple new sysadmins in your house). Try tailscale instead.

[–] [email protected] 2 points 1 year ago (2 children)

Anyone knows if there is any project for a modular NAS? Have been looked into it for a while but without success

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

It's pretty funny, because from mechanicalkeyboards they suggested to post here because you have more knowledge on low profile keyboards.

[–] [email protected] -1 points 1 year ago

Row staggered but not splitted.

[–] [email protected] 0 points 1 year ago (1 children)

How much like the corne do you want it to be?

like a normal keyboard and not split

Also, how DIY do you want to get?

As long as no soldering is required I am up for everything

 

I am looking for a low profile keyboard compatible with the choc switches. I plan to put the choc sunset on it. I was looking for something similar to the Corne, just without the ergo-split thing. A standard 65-75% would work.

Bonus for hot swappable and no soldering required.

[–] [email protected] 7 points 1 year ago* (last edited 1 year ago)

WannaCry targeted hospitals, businesses and similar machines.

WannaCry targeted everything with SMB exposed, blindly.

Also, you should read more about security through obscurity, the fact that "no one will target you because you are a low-value target" is a false sense of security.

[–] [email protected] 3 points 1 year ago (1 children)

I don't know why the author of the video didn't mention it but LockDown mode is really useful.

At least for me the default is lockdown mode on and appropriate exceptions for websites I trust.

2
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
3
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

What about setting the new language of a post to English? There are people that don’t know how lemmy works that keep on opening new posts and leaving the language to “Undetermined” by mistake so no one can answer them.

 

cross-posted from: https://beehaw.org/post/789646

An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve:

  • Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.

  • Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).

  • Signal: date and time of account creation and date of last connection.

  • Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.

  • Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.

  • Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).

  • WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.

  • WhatsApp: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups.

  • Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.

TL;DR Signal is the messaging system that provides the least information to investigators.

 

cross-posted from: https://beehaw.org/post/789646

An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve:

  • Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.

  • Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).

  • Signal: date and time of account creation and date of last connection.

  • Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.

  • Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.

  • Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).

  • WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.

  • WhatsApp: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups.

  • Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.

TL;DR Signal is the messaging system that provides the least information to investigators.

view more: next ›