![](/static/9db79c49/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
With at-will employment, it could be grounds for termination in many instances if you refuse
With at-will employment, it could be grounds for termination in many instances if you refuse
Unpaid Linux ambassadors? Isn’t that just Lemmy?
Saw this question posted elsewhere, so I’m paraphrasing somebody else, but the privacy benefits of Graphene OS are ESPECIALLY impactful if you’re using invasive apps. The whole point of setting up all of the extra sandboxing, storage limits, network restrictions, yadda yadda yadda, is specifically for people who might need or want to still leverage some apps from bigger, less trusted providers.
I’ll flip the question, if you’re only using trusted, vetted, open source applications, do you even need GrapheneOS? Why not LineageOS, which also comes free of gapps?
And this also fully neglects the inherent distinction between privacy and security. Maybe you trust google knowing you called your mom last night, but you don’t want your oppressive conservative government accessing your phone to view your Signal messages to your Grinder date. There’s more to privacy than just the number of times your phone pings Google Telemetry servers.
Wanted to duplicate my items in D2 (I was young). Instead the file I was instructed to try made me drop all of my items. Jokes on them though, my gear was trash at the time.
Honestly I don’t know, but it seems to me like extracting every single frame of a video as a lossless PNG is only really something that’s necessary if you’re trying to archive something or do frame by frame restoration. Either way, it is something that you hopefully aren’t doing every day, so why not just let it run overnight & move on?
Otherwise ask yourself if you can settle with just extracting a single clip/section, or what’s actually wrong with lossy jpeg with a low -qscale:v (high quality) - start around 5 and work down until you visually can’t see any difference
I self host, and drop encrypted backups onto a cloud storage provider. If anything, cheap storage is going to cost me more because I’ll be inclined to back more up.
Reel Big Fish - Another F.U. Song
Are you perhaps an LLM in disguise?
Worst thing? Someone with access to your password can now break into the associated account, and use that access to snoop or potentially permanently lock you out. E2EE data could be lost forever if they change the password and 2FA.
More likely? Unless you reuse passwords, or the associated site has been recently compromised, pretty low odds of compromise. If you suspect your 2FA has leaked, just get a new secret, easy peasy. Most reputable sites should alert you to a login on a new device, potentially giving you time to react or alerting you of snooping.
If your secret leaks without context on what site it’s associated with, then unless your name is Taylor Swift, odds of someone associating it to a site, let alone the matching password, are astronomical.
for reasons I don’t completely understand, Resilio Sync connections seem to be quicker and more reliable
Resilio runs a “relay” server to facilitate connections where neither peer has properly set up port forwarding. Only downside of Resilio is its not open source, so you just kinda have to take their privacy policy at face value. As long as op isn’t sending something super sensitive though, it probably is no big deal.
Lemmy and snarky references back to Reddit like that ex-girlfriend you’ve “totally moved on from”
You running the Trump campaign in your spare time?
Definitely no, viruses need 48-72 hours of incubation before the .mkv host becomes contagious. If the file is <24 hours old, I’d look for another source.
If you’re worried your computer might be infected, you should consider swapping your case LEDs with UV lights to purify your system.
I mean look you could just not use Visa right? We all have tons of other options, and they’re totally not a monopoly right? That’s why we’re not regulating them, right?
Yeah, for me, I’m looking for prettier not fastest after 120 Hz or so
If you can’t enter a kill code and have your phone self destruct into a million pieces, can your life even be considered private?
This somehow makes me less trusting of the previous comment.
capture the generated codes and time of input in some way, then brute force hashes until they generate one that produces the correct codes at x time
Given a TOTP key is usually at least 18 characters for a 6-digit code, having only one data point sticks you with something on the order of 10^28 possible keys for a given singular code (way more if case sensitive). You’d need to be regularly intercepting TOTP codes to brute force your way to the right key, and even then it’d only be valid for a single site. At that point it probably means you’ve fully compromised the connecting device or server, at which point, why do you even need the TOTP again?
Great insight, really contributing to the community
Mmm, GPLv3 killing devices.