• 0 Posts
  • 295 Comments
Joined 2 years ago
cake
Cake day: December 25th, 2023

help-circle
  • For users yes - for developers, as much as it saddens me, no.

    Ubuntu for example started the discussion about what they need to do to show their the demanded effort was being put into.

    It’s the devs that are put at risk here - and I dare say by design. If this just correlates or is caused by the support from the big OS corporations one can only speculate. My speculation is: at the very least strongly influenced.


  • There is no hard definition within the laws so this is all speculation. This means that there is no technical answer because the question in is core is a legal one.

    Your TV for example can have a browser without problems.

    You can have an integrated board that runs a full Linux without you being able to touch the underlying OS and let that start a browser, too. You know those tv screens that show you traffic into it flight plans at the airport? Those are often full Linux computers set up exactly like that.

    In short: we’ll only know when the law is actually being tested. It’s written in a way that I as layman could talk and software and even most hardware into it’s definition, it’s absolute bullshit…



  • The answer is a clear yes.

    In short: Choose your tool that will suit you throughout your degree and really dig into it and learn it now while doing your paper.


    Long version:

    This is absolutely common and I’m not aware of a text editor which supports footnotes but doesn’t support automatically numbering and referencing.

    In latex there’s actually a \footnote that takes care of that. In libre office, if I recall correctly, it’s Insert -> Footnote and I’m sure there are templates with the proper formatting and font sizing already in place.

    Now it sounds like you’re quite early in your higher degree career - depending on your goals and future challenges you might want to either go the easiest route or really dig into writing-based formatting: It’s just faster if you’re typing all the time to not switch to a mouse to inert footnotes - but only if your really used to it.


  • Yes, it is private by technology:

    GPS and other systems working the same way are passive, similar to receiving a radio signal. You’re receiving the signal of several satellites at the same time and your device calculates your position based on those signals. You’re basically getting “I’m satellite cool boy and at the next beep it’s exactly five past nine” all the time - only with a bit more precision. Your device does rhen the actusl position calculation locally.

    Fun fact! Geo positioning is one off the few things where we need to apply both general and special relativity for real world effects: the effects due to the satellites speed and high distance to earth (and therefore the reduced effect of gravity) cause a significant shift in the speed in which clocks run on those satellites compare to Earth. As we use the exact time to calculate distance and with that position this would cause a huge drift otherwise!





  • Traefik and caddy were mentioned, the third in the game is usually nginxproxymanager.

    I’m using both traefik and nginx in two different setups. The nginxproxymanager can be configured via UI natively which makes checking configurations a bit easier.

    Traefik on the other hand is configured easily within the compose itself and you have everything in one place.

    This turned out to be tiresome though if you don’t have a monolithic compose file - that’s actually even hr history why I switched to npm in the first place.

    I don’t have any experience with caddy so can’t provide anecdotal insights there.


  • I really like it already so take this as an alternative, not as improvement:l. I don’t have a good eye for aesthetics anyway don’t his is more about structure.

    Personally I switched from a single dashboard to purpose driven hubs - I can’t imagine a situation where I need my infrastructure and my calendar at the same time regularly for example.

    Another point is context typing: your release checker is quite far away from your appointments and calendar. It looks to me to be sorted by content rather then function (i.e. it’s entertainment so it’s next to YouTube). The same is true for your interaction patterns. There is a lot of visual information which I’m sure you’ll rarely interact with but instead consume. And then there are clearly external links, both bottom left (opencloud, tooling) and top right (external media) in addition to your own self hosted content.

    My suggestion is therefore a process instead of a change: Note down when you consume which features of this awesome dashboard together for a few days. Then restructure the content of the whole dashboard based on your usage patterns - either as a new Monolith or even experimenting with splitting it.

    I even suggest using a different medium then your usage device (if it’s a desktop PC mainly use pen and paper, if it’s your laptop use your phone, if it’s your phone you use this dashboard on then you might have different problems :D)


  • You don’t! At least not in the sense that I’m aware of the JADE thing:

    JADE is nothing that is a strong work proven topic but came from social media to handle narcissistic people as a peer group.

    Your reactions are hostility and rejection based and how I understand you it’s your nerves that you want to preserve.

    For this in a professional work place there are multiple ways to deal with and even all of them at the same time, just from the top of my head:

    • Always go over your manager, make it his problem. “Dispatcher causes work for me by raising false claims/redundant questions - please resolve with their manager”
    • I’d call it business ghosting: answer and questions raised but but don’t go into any depth. “Correct, phone was not working due to no wifi.”
    • Work on yourself to detach your emotional connection: this is the toughest but also the most valuable one. It’s a fucking dispatcher who has his own problems and no other way to handle them then to try to use his environment as catalyst. My personal route is the framing “poor fucker, needs his routine and world to accept himself”. But also “this seems to be the only way he can feel important in front of himself” would work for me. Usually when I take pity with people I can’t get angry anymore about their behaviors.
    • Figure out what the true impact on your work performance is and handle that separately from the emotional connection. It’s absolutely normal to be annoyed and angry by the behavior you’ve described - detachment of impact and emotion can be a way forward.

    Hope this helps a bit!


  • If I understand you correctly: You want to be able to record one computer with another one on a system level (the BIOS-party that comes before any operating system is loaded).

    Although this is not Linux specific: your best bet is a video capture card as you’ve suggested already. Anything else would depend on your bios supporting remote access which is not exactly the same (my server bios for example can expose a website where I then can configure it from within a browser.

    The problem with video capture is that you’d still have two controls: one for the client and one for the host.

    Depending on what your final result should be it could be actually easier and cheaper to just get a stand for a smartphone and record it from there and then crop it precisely.

    You then have to only worry about light reflecting.



  • As I don’t know your parents I can just project from myself: Whoever would be the physically closer one at that precise moment.

    I can’t imagine a situation where this could be a rational decision unless one of you fucked them over in a way I can’t even begin to fathom.

    This is so deep monked brain territory that it really comes down to pure instinct and that is driven by perceived higher chance.

    If the situation is in a way there it’s impossible (for example would have to carry both of you but you’re too heavy) chances would be high that we’d all die together - not because of some heroism bullshit but simply because I know my inner monkey quite well and it’s self preservation instinct vs kin preservation are … Let’s say not in my favor ad an individual :D





  • Sorry if I use the wrong English terms! I think you are right :) With system I refered to the literal computer system the file is saved on. I’m not a dev of one of those tools but I know several maintainers and developers that’s why I’m a bit sensitive there! Thats why I (baldy apparently, apologies!) tried to focus on the developer point of view and ignored the whole cost/benefit aspect which you described very well - thank you for that!

    Back to my point re/ local security because I feel this is the only one where I see a fundamentally different assessment between us: (Fontext: access an unencrypted file on my machine): I’m not aware of a mechanism to read (unencrypted or not) files on a host without a preceding incident. How else could your files be acessed? I don’t understand how I might have this backwards.

    You’re completely right if course that there are a lot of tools out there one could use - but it would be on the developer to implement support for those. If you support one you can be damn sure users shout for “I want to use Y”. And then you would still need a Fallback for anyone not willing to install a supported third party tools.


  • I have my issues with proton because of its CEO and some weird decisions for their product lone and don’t use them at all. I.e. I won’t defend this company.

    Such a claim without source and explanation or interpretation of assumed implications are pure fear mongering.

    Because of this: my advice is to decouple your privacy concerns and thoughts from politics in the first degree (rhetoric and hearsay). Base it ok policies, observable behavior, audits, laws and so on…your example: exit nodes for VPNs don’t have an impact on security at all in neither direction. Hosting infrastructure there would (i.e. it would increase potential access and put the infrastructure under additional legal requirements).


  • Cybersecurity works inherently with risk scenarios. Your comparison is flawed because you state that there is an absolute security hygiene standard.

    That said: I highly appreciate your approach to the subject, i.e. looking at the code and raising a discussion about something that looks wrong. Thank you for that!

    On the subject itself:

    There are two common ways to implement token management. The most common one I am aware of is actually the text based one. Even a lot of cloud services save passwords as environment variables after a vault got unlocked via IAM. That’s because the risk assessment is: If a perpetrator has access to these files the whole system is already corrupted - any encryption that gets decrypted locally is therefore also compromised.

    The second approach is to implement the OS level secret manager and what you’re implicitly asking for from my understanding.

    While I agree that this would be the “cleaner” solution it’s also destroying cross platform compatibility or increasing maintenance load linear to the amount of platforms used, with a huge jump for the second one: I now need a test pipeline with an OS different than what I’m using.