My first thought was: So Slackware works very well but is ugly as hell?
My first thought was: So Slackware works very well but is ugly as hell?
Nice… media that openly cheered for Hamas attacks is telling lies again and like the good little sheep most are nowadays people blindly believe it in rant about imaginary German nazis. The brain-rot induced by social media combined with a complete lack of media literacy gets more impressive every day.
But those aren’t affected usually. For them it’s about stability because their certification processes are a lot of work and they won’t risk any interruptions unless absolutely necessary. So they actually pay a lot of money for support beyond the normal EOL.
That’s because the drivers are bullshit but not the problem in general. They work well for some very specific cards, not at all for other and in general it’s just random hit or miss.
And then, to make it more fun, not all wayland compositors are born equal either.
Did nobody there propose Madagascar as the destination for “voluntary migration” of Gaza inhabitants yet?
Surprising no? But still sad as they are -again and again- too stupid to lash out at the actual reason and are easily manipulated to target someone else. And that’s usually either low income classes or foreigners, not coincidently because those are lacking a lobby.
You can do both, work on the problem and talk about the question where it originated to keep something similar from happening in the future…
Correct. There are still games that don’t work because there is actual work being done to make them not work.
I wonder where the problem is… must be Linux’ fault.
Oh, are you telling one of your favorite propaganda lies again?
In reality Germany -a small country with just ~16% of the US’ GDP- is providing 40% of the US’ support just in military aid (also more than the next 5 countries combined), and about three times as much measured by share of GDP in total.
Yet still after nearly two years the lie that Ukraine’s by far biggest supporters are actually NoT DoInG aNyThInG bUt ThE bArE mInImUm is still Russia’s top export.
There’s probably a chameleon there, but well camouflaged…
You just type ZZ… then the program assumes you fell asleep trying to exit and stops.
Malware for desktop users is the low hanging fruit with little rewards. You just hear about it because it’s so rediculous easy.
The real money is on servers, so that’s were real money/work is invested to develop malware for much higher gains. How successful are they again?
There’s one caveat here: The UEFI specification doesn’t strictly require the ability to handle more than one EFI System Partition on a drive, so some simply don’t. So this “use a separate boot partition”-method might fail on some computers that just don’t recognize a second ESP on the same drive and only surely works with a whole separate drive for Linux.
Then you should probably point out to OP which VPNs are independently audited and not keeping data or not operating in any country requiring access by law enforcement. As everything else would totally defeat your “but government actors”-argument from above.
Yes, given OPs question (triggered by VPN Ads even) and way of asking there is no reason to believe in any scenario where a state-sponsored actor “on the same network” is intercepting data (like “transmitted passwords”) because it’s only secured by https. That’s “can I login safely from a public wifi?”-level.
As you seem to be passionate about these security issues I’m sure that you are familiar with the concept of threat assesment first. Do you believe that a random user asking publically about information seen in advertising is the target of government-level actors wanting to steal his login passwords used on https sites and that breaking the encryption is the easiest measure here?
As I read this question “high-layer sifting by ISPs” (and providers of open wifi) is exactly the threat scenario here.
But encrypting already encrypted HTTPS data is largely irrelevant (for that simplified analogy) unless you don’t trust the encryption in the first place. So the relevant part is hiding the HTTPS headers (your addresses from above) from your the network providing your connection (and the receiving end) by encrypting them.
Unless of course you want to point out that a VPN also encrypts HTTP… which most people have probably not used for years, in fact depending on browser HTTP will get refused by default nowadays.
Non-Internet analogy:
You communicate via snail mail with someone. Both ends know the address of each other. So does the postal service delivering your mail. Everyone opening your letter can read (and with some work even manipulate) the content. That’s HTTP.
Now you do the same, but write in code. Now the addresses are still known to every involved party but the content is secured from being read and thus from being manipulated, too. That’s HTTPS.
And now you pay someone to pick up your mail, send it from their own address and also get the answers there that are then delivered back to you. The content is exactly as secure as before. But now you also hide your address from the postal service (that information has the guy you pay extra now though…) and from the one you are communicating with. That’s a VPN.
So using a VPN doesn’t actually make your communication more secure. It just hides who you are communicating with from your ISP (or the public network you are using). Question here is: do you have reasons to not trust someone with that information and do you trust a VPN provider more for some reason? And it hides your address from the guy you are communicating with (that’s the actual benefit of a VPN for some, as this can circumvent network blocks or geo-blocking).
Long story short: Do you want to hide who you are communicating with from the network you are using to access the internet? Then get a VPN. The actual data you send (and receive) is sufficiently secured by HTTPS already.
Oh, believe me: There are so many messy BIOS and UEFI implementations out there that you can definitely deactivate it in the BIOS for some. Which just introduces even more mess where hibernation triggered on the OS level then fails.
They actually don’t. They try and it works for some time. And then the next Windows update intentionally fries their dual-boot. Then they go back to Windows.
Or they understood enough about the details and how to minimize the risk (basically running Linux with an linux boot manager that then chain-loads Windows boot files from another disk, so Windows is mostly oblivious about the other OS… and even then Windows likes to screw with the efi record) that they are mainly running linux. And later they tend to ditch Windows completely of just keep a virtual machine if they really need it for some proprietory stuff.
At least those scenarios above cover 95% of all people “dual-booting” I know…
In comparison, dual- or triple-booting Linux is indeed a bit less problematic. But the same thing applies: You mainly run one. And given that Linux distributions are all nearly the same, with just a few differences in pre-configuration and defaults, there’s not much point to it.
But that’s okay as it’s rolling release and unlike other distros you only need to do it exactly once…