[-] hades@feddit.uk 7 points 2 days ago

-z might be pointless since you’re transferring files locally.

[-] hades@feddit.uk 5 points 4 days ago

can confirm, really really good game

169
submitted 4 weeks ago by hades@feddit.uk to c/germany@feddit.org

As some of you may know, Germany has one of the shittiest “defamation” code that allows any business owner to simply delete the reviews they don’t like. For a long time this had made Google Maps ranking useless: a rating of 4.9 could mean the store is really good, or it’s deleting all the bad reviews.

Not anymore.

Now if you click through all the way to the Reviews tab, Maps will tell you how many reviews the business owner has deleted in the past year.

So when choosing where to have lunch, don’t forget to check this tab. Also check the places you usually go: restaurants, stores, car mechanics. Chances are if they’re doing this you should look somewhere else.

[-] hades@feddit.uk 39 points 1 month ago

wow so lazy just pressed ctrl-ξ ctrl-ψ

[-] hades@feddit.uk 50 points 1 month ago

You can start by moving your development workflows (pull requests, issue tracking, etc.) to something like codeberg. You can continue publishing your PyPI package from Github by just pushing your code from codeberg to Github.

Eventually you can also move the publishing pipeline over as well. I don’t know how complicated your library is, of course, but in simplest cases it’s a matter of rewriting a config file in a slightly different way.

[-] hades@feddit.uk 99 points 5 months ago

can you explain the joke, i work at cloudflare

[-] hades@feddit.uk 141 points 5 months ago

Except solar. And wind. And hydro.

[-] hades@feddit.uk 43 points 6 months ago

The design is very human.

[-] hades@feddit.uk 37 points 6 months ago

I think the basic premise of this question, that Windows and Linux somehow have a different foundational security model that is or isn't based on passwords, is not really true. Passwords play more or less the same role for any modern operating system -- be it Linux, MacOS, Android, iOS, etc.

The only major difference is that instead of UAC, Linux has a variety of options (sudo, policykit, run0), which are implemented differently across different distributions. If your privileged user doesn't have a password, in some cases this could lead to any program being able to elevate their privilege quietly, unlike UAC.

However, in many distributions you can set up a user with a password and enable passwordless local login, which would be almost equivalent to windows with no password.

Answering your question directly, the major threat to most consumer users is physical compromise or theft of device. Your statement that "physical access is game over" is not entirely accurate: disk encryption with a password is a very strong protection against unauthorized data access, but you need to use a password (doesn't matter if it's Linux or Windows).

[-] hades@feddit.uk 33 points 7 months ago
[-] hades@feddit.uk 41 points 7 months ago

To save you 50 clicks required to get through to the t-shirt content, it said: "god (Allah)" followed by "is lesbian".

71
ich🦉iel (feddit.uk)
submitted 7 months ago by hades@feddit.uk to c/ich_iel@feddit.org
35

I guess the researchers were really bored with having to name things.

[-] hades@feddit.uk 81 points 10 months ago

Amazing tan lines.

[-] hades@feddit.uk 42 points 11 months ago

YOU ARE UNDER ARREST FOR FELONY CONTEMPT OF BUSINESS MODEL

view more: next ›

hades

0 post score
0 comment score
joined 11 months ago