The reason I use a swap file is so that I can have only one partition backed by LUKS disk encryption, rather than having to screw around with lvm which comes with its own performance overhead and all. I’ve personally never had issues hibernating to.it, but given how much buggy uefi firmware is out there I’m not surprised to hear that other have issues
- 0 Posts
- 62 Comments
It’s been supported for several years now
Supermariofan67@programming.devto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•What linux program do you use to rip CDs (just audio)English51·2 years agoMost of the software people are suggesting here is ancient. A lot of it does not support accurip checks or drive offset correction, which I consider to be essential features. Don’t use abcde, I made that mistake a few years ago
cyanrip is definitely the way to go, there really is no alternative that has the same feature set. Other than EAC in wine if you require scorable 100% log files.
The problem primarily is when a niche interest becomes exploited for profit by capitalists and no longer maintains the community-oriented culture it once had.
It will lose aspects of it that make it unique and special but they don’t appeal to the general public, because ultimately making as much profit as possible means attracting as many customers as possible.
Supermariofan67@programming.devto Fediverse@lemmy.world•Authorized Fetch Circumvented by Alt-Right DevelopersEnglish3·2 years agoDo you realize that you are fighting against an open Internet?
Supermariofan67@programming.devto Technology@lemmy.world•Study shows AI image-generators being trained on explicit photos of childrenEnglish31·2 years agoI agree with you in instances where it’s not generating a real person. But there are cases where people use tools like this to generate realistic-looking but fake images of actual, specific real-life children. This is of course abusive to that child. And it’s still bad when it’s done to adults too, it’s sort of a form of defamation.
I really do hope legislation around this issue is narrowly tailored to actual abuse similar to what I described above, but given the “protect the children” nonsense they constantly moan about just about every technology including end to end encryption I’m not very optimistic.
Another thing I wonder about, is if AI could get so realistic that it becomes impossible to prove beyond a reasonable doubt that anyone with actual CSAM (where the image/victim isn’t known so they can’t prove it that way) is guilty, since any image could plausibly be fake. This of course is an issue far beyond just child abuse. It would probably discredit video footage for robberies and that sort of thing too. We really are venturing into the unknown and government isn’t exactly know for adapting to technology…
But I think you’re mostly correct, because the moral outrage on social media seems to be about the entire concept of fake sexual depictions of minors existing at all, rather than only about abusive ones
Supermariofan67@programming.devto Technology@lemmy.world•Wayfair CEO Niraj Shah tells employees to 'work longer hours' in year-end emailEnglish41·2 years agoHow is this relevant to the technology community?
Supermariofan67@programming.devto No Stupid Questions@lemmy.world•Why do AI image generators have a stroke when they try to generate text?61·2 years agoIt bothers me that a circlejerky and oversimplified answer like this one is more highly upvoted than the numerous high effort, highly detailed, and technical explanations for why it happens.
Supermariofan67@programming.devto Technology@lemmy.world•Child sex abuse images found in dataset training image generators, report saysEnglish20·2 years agoGiven that Facebook and meta’s other platforms are one of the largest distributors of that, if they scrape Facebook for data this is not exactly a surprise unfortunately…
The issue is whether the data is collected by a known third party tracker domain which would be blocked by an adblocker
Supermariofan67@programming.devto Technology@lemmy.world•YouTube uses lower quality options on browsers running on Arm-based systems — misreporting as an x86 CPU appears to be a widespread browser fixEnglish8·2 years agoNope, the source code is available but it is proprietary software because the license forbids distributing modified versions, among other things
Supermariofan67@programming.devto Selfhosted@lemmy.world•UK's O2 network is blocking duckdns.org domainsEnglish12·2 years agoLots of malware gets hosted using dynamic DNS domains, so they (or more likely some bot) probably saw the domain frequently showing up in malicious activity and blocked it without understanding that it itself isn’t the source of the malicious activity.
Supermariofan67@programming.devto No Stupid Questions@lemmy.world•What do we think of greenpeace activists?122·2 years agoThey are an anti science organization. They oppose nuclear power, GMOs, etc.
Yeah, it’s the second one you said, see https://knowyourmeme.com/memes/what-if-we-kissed-in
Supermariofan67@programming.devto Selfhosted@lemmy.world•How should I secure my data on Nextcloud against physical attackers?English12·2 years agoYou can use cryptsetup-reencrypt to encrypt an existing disk in place with LUKS. Then you just have to modify the initramfs/bootloader/fstab to point to the new configuration. See https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Encrypt_an_existing_unencrypted_file_system
Supermariofan67@programming.devto Linux@lemmy.ml•PipeWire 1.0 Released For Managing Audio/Video Steams On The Linux Desktop12·2 years agoWhen it was brand new there were some edge case bugs that broke on certain workflows and hardware, but that’s pretty much entirely fixed now and I’m guessing for a long time now it’s been more universally stable than pulseaudio was.
Also, some people just pointlessly dislike anything that’s new, or because it breaks their spacebar heating
Supermariofan67@programming.devto Linux@lemmy.ml•This color picker on Flathub got rated 12+273·2 years agoBecause it’s funny
The problem is not the RSA math itself but that it is both extremely slow and implementing it is particularly susceptible to bugs and side channel attacks https://blog.trailofbits.com/2019/07/08/fuck-rsa/