I’m not judging (that much) but you can do pretty well with just telescope, undo-tree and the LSP stuff, no? Debuggers can make it very bloated, at that point I’d just fire up a real IDE just for debugging and get back to Vim to program
- 0 Posts
- 25 Comments
theblips@lemm.eeto
Linux@lemmy.ml•Oniux: Kernel-level Tor network isolation for any Linux app
1·10 months agoSource on the first statement?
theblips@lemm.eeto
Linux@lemmy.ml•Oniux: Kernel-level Tor network isolation for any Linux app
1·10 months agoIt hasn’t, it’s just that good opsec is impossible in the long run and everyone is bound to be deanonymized eventually. For example, if you’re using a clean account on a CP sharing forum, it’s possible to track your mannerisms and post history (content, timezone, etc) to get an estimate of where you live. Then they can subpoena the ISPs for IP traffic in that region and figure out who is using Tor. That subset of IPs may then be cross referenced with the time that suspect’s account posted, that can be used as probable cause for a warrant… That sort of stuff. Sounds super complicated but most of it can be automated and bypassed these days (I don’t think you actually need to subpoena for example).
Where did the suspect fail? He should have used multiple accounts, spaced out the interactions more randomly, used stolen WiFi, ran his comments through a translator and back, etc. At no point did Tor fail at securing his IP address end to end
How will any system fjx this, though? There will always be disasters, hunger, war, crime…
There’s something to be said about choosing not to care about some stuff, though. Being constantly contemplating every single crisis in the world and worrying equally about them all will be damaging to your mental health… And these days there are more pressing issues than the moths to me. It’s not that I don’t value them
theblips@lemm.eeto
Privacy@lemmy.ml•What do you folks do for IRL privacy in terms of CCTV, facial recognition, etc?
21·10 months agoMasks and shades are about as much as you can do without being the weirdo. It at least shields you from some of the less resource intensive threats such as other civilians trying to record you for social media, but real mass surveillance, like China level, will still work
At work and in tests you’ll be using bloomberg terminals, risk software, etc only available on Windows, so why bother?
Unviable for economics and finance in my experience. Excel is absolutely mandatory for these
theblips@lemm.eeto
Linux@lemmy.ml•Daily driving a GNUIX or some of those super libre OSs.
3·10 months agoDamn, that’s a high bar to clear. Almost none of the distros I know pass their criteria
theblips@lemm.eeto
Linux@lemmy.ml•Daily driving a GNUIX or some of those super libre OSs.
51·10 months agoI’m not trying to be mean, but I didn’t really understand much of that. Can you translate from your native language on DeepL or something?
theblips@lemm.eeto
Linux@lemmy.ml•Daily driving a GNUIX or some of those super libre OSs.
3·10 months agoCan someone clue me in to why Mint wouldn’t be “libre”? What does “libre” mean in this context exactly?
theblips@lemm.eeto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Introducing a new open-source shadow library!English
51·10 months agoSeriously, I though Lemmy users would be a little more aware of this stuff. I’ve seen people openly saying they want to assault federal agents and government property, and now this guy
They can and most of the time they do complain about free apps
Nice! Will start using. I ran out of Proton aliases this year and have been reusing some of them, which sucks. Thank you
People say it is because Proton has collaborated with the government, but it just hasn’t happened yet because Tuta isn’t big enough to warrant such a thing. There’s almost no way to prevent such a thing from happening with email providers, it just isn’t private communication at all
GrapheneOS is absolutely niche. You have to go out of your way to buy a Pixel (which in many countries isn’t even available), choose the bank that has a working app on Graphene, etc
In regards to addy, are my messages private in relation to the service or does it only serve to keep my anonymity to other threat actors?
The main reason why I use open source is precisely because I don’t need or want to worry about this crap. The software is as much property of humanity as it is of the creator, it is basically just knowledge
theblips@lemm.eeto
Asklemmy@lemmy.ml•What's the dumbest couple dispute you've ever had?
1·11 months agoI just decided not to play games that cutthroat with mine


I tried and even the shrink told me to exercise and eat better. It’s so over bros