• 0 Posts
  • 45 Comments
Joined 1 year ago
cake
Cake day: June 7th, 2023

help-circle




  • VNC might have seen improvements over the years, but last time tried it, it didn’t handle high resolution/detail well at all. RDP can stream practically any media in close to real time, as to where VNC really broke down if you tried to change too much of the screen at once. Ideally, there’d probably be a new open screen sharing standard that used modern encoding and decoding to allow for high bandwidth connections smoothly. Moonlight gets close, but isn’t really designed as an RDP/VNC replacement.







  • I agree that userChrome.css must be modified, but once it is, Firefox is way better for vertical tabs. When you mix in the tree style that is common in the extensions and containers, there is nothing that competes, especially if you work involves managing a large number of accounts for the same few websites, as mine does. It is not uncommon for me to have 10-20 active tabs, and 80+ inactive tabs at any given time. Horizontal tabs can’t compete, and the flat nature of the tabs in Edge certainly turn into a mess quickly.


  • GreyBeard@lemmy.onetoLinux@lemmy.mlTuxedo Laptops - Any good?
    link
    fedilink
    arrow-up
    13
    arrow-down
    1
    ·
    edit-2
    3 months ago

    Sounds like you don’t know how international trade works. A company like Framework can’t ship to countries they don’t normally ship to not because of cost but because of taxes, embargoes, laws, tariffs, and more. It isn’t just about cost, it is about complying with laws. The countries they ship to they already know the laws. Any new county has to go through a long and painful process of learning local laws to make sure you are in compliance.

    I’m privileged as an American to get almost everything I want, I get that, but you can’t blame a company for choosing to spend its legal resources where they are most impactful.


  • It should stop issues with full device theft as well, if done correctly, because if secure boot isn’t on and working, it will refuse to give the key. Which means, if it was setup correctly, the computer cannot be accessed without know the users name and password. This is the general accepted stack for Microsoft’s BitLocker. It becomes completely transparent to the user, but puts a decent blocker to access in cases of theft. There are ways around it like freezing RAM or packet sniffing an external TPM, but those are high level attacks.


  • The point is to have the system automatically unlock without the need for a boot password. This provides decent security if secure boot is enabled, but requires very little from the user. It isn’t a stopper for high threats, but a simple theft will mean the data is safe. It also ensures that if the drive is separated from the host machine, it is useless without a copy of they key. It doesn’t stop all threats, but stops a lot of them, and all of the most common.