https://github.com/internetarchive/dweb-mirror They’ve been supporting dweb solutions for years. Evn if they haven’t enabled back their public dweb.archive.org portal.
https://github.com/internetarchive/dweb-mirror They’ve been supporting dweb solutions for years. Evn if they haven’t enabled back their public dweb.archive.org portal.
Speaking of doas, is there any advantage of using it when… sudo is still available to be used? I agree that most of the stuff we require to use doesn’t need all the options sudo as, but if it is for the sake of security, maintenance, and stability… is there any reason to use doas ON TOP of the already setup sudo or su? In the past, I even tried to just apply a simple alias to replace sudo with doas, but numerous scripts and programs when trying to request explicit super-user permissions, just didn’t know what to do with doas as expected, so this ain’t it.
Okay, so it wasn’t VNC, it was ssh stuff instead.
Similarly, there’s System Admin Girl★まんがでわかるLinux シス管系女子 Imported a physical edition just for the quirky factor of a Linux Admin manga, but it is pretty well made and does explain pretty well some bits (even if from the first episode, they explain how to do VNC if i remember, from a Ubuntu 16.04 LTS desktop, so fairly easy and old) but it still on-going !
*on Lemmy. Except if you really meant to ask for Lemmy contributors.
Spotify Lite for you, and me.
Well, i believe in all showcased cases from people here, they are NOT replacing sudo entirely (Except if some are from BSD or if I’m incorrect with this assumption). They are just replacing their user habit with doas and use that command instead. In the end, all unix scripts or apps expect using sudo (If not, su) so… ### What’s even the need to ?
Really looking to corrections if i do some
And even that advantage can be minimized by getting any bundle of privacy products, like Proton which offer all of those (Mail, VPN, Drive, Calendar) or even with your self-hosted VPS (Some VPS seller even allow you to prepare it with Nextcloud and a VPN relay for near no extra paiement).
I see the “pay once to one company”, but you also need to trust them entirely, for EVERYTHING.
Also, there’s already plenty of companies doing such thing (regardless of how practical/private/secure they are)
I mean, it could also just be me too. I forgot the ticket for the shokz. Bought it “reconditioned” by Amazon for the JBL (and not possible to be repaired by JBL in that case). I would suggest you one tip from those with a back ring security thing, don’t lay on the back with it. Even if you rotate it to the entire back of your neck. I didn’t broke it there for those that obviously, but i feel it may have loosened it.
I absolutly love open ear bone conduction headphones. Really help getting to your surrounding without any audio leak from your headphones. Too bad that i never found one who didn’t broke. Shockz ones broke the neck security thing and the left ear headphone. JBL ones can’t be recharged anymore onto the right one, as it seems that the earphone doesn’t connect fine with the pins in the charging case anymore. And i even tried a cabled one, hoping this one would break as easily. The cable broke connection and it only work if you hold the cable at a specific angle (unusuable in most usages)
Because most don’t bother with having a billboard for a thing they already paid for. Even if the question of “Wow, what is that phone ?” could just be answered by the one who bought it, by themselves, instead of the interested to check out the logos and markings.
Just higher standards.
Thanks for the tip ! To be fair, I haven’t even checked the result and missed on it.
It still create an attack vector, as it allows a potential extra method to get access to it, in addition of potential hardware exploits that i shared to gain root. Yes, you can minimize the risks correctly, but the user is the only real barrier against it, not the software anymore. The less potential way to exploit your phone, the better it is. You shouldn’t rely on thinking that such feature is fully attack-proof.
Stop it [send] Mom [send] This is [send] your warning [send] ⚠️ [send] … [send] Did you even read Mom ? [sent 53 photos]
Aggree with common sense, but more difficult to establish with some people.
The actual Magisk prompt that ask you if you want to give root to such app. This UI layer.
Although, i suppose it could be countered by explicitly refusing all requests or enabling a biometric confirmation
Just logical. If you gain the privilege to modify system bits, then it just open the potential for attacks abusing root access. And it has been done already. You are just removing one step for them. https://www.bleepingcomputer.com/news/security/loki-trojan-infects-android-libraries-and-system-process-to-get-root-privileges/ https://www.bleepingcomputer.com/news/security/highly-advanced-spydealer-malware-can-root-one-in-four-android-devices/ https://www.bleepingcomputer.com/news/security/new-abstractemu-malware-roots-android-devices-evades-detection/ https://promon.co/security-news/fjordphantom-android-malware/
Only big manufacturers can really pay to control entirely the hardware inside it, and allow you to modify it. Checkout Fairphone for example. They’ve been forced to stop hardware security updates due to their chip manufacturer, who refused to continue supporting it, despite them trying to support their devices for plenty more years. This explains the choice with Google.
Sadly, can’t be re-locked. Would have loved to get a Motorola if it was.
The Archiving group The-Eye did actually made a back up of the Archive torrents. https://the-eye.eu/public/Random/archive.org_dumps/torrents/ They have a text file listing the file list of all the collexted torrents. It’s a text file. That they had to compress. And it’s still around 800Mo big just for that one.