• 0 Posts
  • 32 Comments
Joined 5 months ago
cake
Cake day: June 23rd, 2024

help-circle



  • Laser@feddit.orgtoTechnology@lemmy.worldMatrix 2.0 Is Here!
    link
    fedilink
    English
    arrow-up
    0
    ·
    11 days ago

    What would be the utility for someone, who cares about privacy and currently uses Signal and email for communication?

    Your organization can’t host a federated Signal server, and email isn’t private.

    Is Matrix anything good already, or is it something with potential that’s still fully in development?

    My previous organization has used it for over 4 years without issues, however mostly limited to text.

    How tech savvy does one need to be to use Matrix?

    Simply using? Not very much, basically like Lemmy.





  • A kind of interesting phenomenon. He comes in with his dog, cries that he doesn’t have a place to stay, Jon allows it for as long as needed and then… he just vanishes one day, leaving Odie with Jon, never to contact them again. Did something happen between the two? Was he ever real or a product of Jon’s mind? A wiki states:

    According to Davis, Lyman’s original purpose was to be someone who Jon could actually talk to and express other ideas — a role gradually taken over by Garfield, himself.

    It doesn’t reveal who gave Lyman that purpose; it could be that it was Jon himself who, over the years, got less attached to reality, so he got done with talking to and interacting with Garfield.

    That or it’s just a lazy uninspired comic that only has a minimum level of continuity and doesn’t care to explain why a former choir character suddenly vanishes.






  • Also wildcard certificates are more difficult to do automated with let’s encrypt.

    They are trivial with a non-garbage domain provider.

    If you want EV certificates (where the cert company actually calls you up and verifies you’re the company you claim to be) you also need to go the paid route

    The process however isn’t as secure as one might think: https://cyberscoop.com/easy-fake-extended-validation-certificates-research-shows/

    In my experience trustworthyness of certs is not an issue with LE. I sometimes check websites certs and of I see they’re LE I’m more like “Good for them”

    Basically, am LE cert says “we were able to verify that the operator of this service you’re attempting to use controls (parts of) the domain it claims to be part of”. Nothing more or less. Which in most cases is enough so that you can secure the connection. It’s possibly even a stronger guarantee than some sketchy cert providers provided in the past which was like “we were able to verify that someone sent us money”.


  • The big issue that the author kind of mentions is that while the kernel has all these neat features, the overlaying OS seems to use them in such a way that they’re often not effective. XP before SP1 was a security nightmare and we got lucky that blaster was not working correctly. A secure token for the processes in your session? It doesn’t really help if every process you spawn gets this token with the user being the administrator (I know this is kind of different nowadays with UAC). A very cool architecture that allows easy porting? Let’s only use it on x86. Even today, it’s big news for Windows running on ARM, which the not-by-design-portable Unices have been doing for years.

    Maybe if Microsoft had allowed the kernel to be used in other operating systems - not expecting a copyleft license - the current view is that Windows Is Bad, and the NT kernel is an inseparable part of Windows. And hell, even Windows CE which did run on other devices and architectures, doesn’t use the NT kernel.

    So while the design and maybe even large parts of its implementation may be good and clean, it’s Microsoft’s fault that the public perception of the NT kernel.


  • I, a systems guy, have a better time learning go than nix packages.

    Go is a simple and elegant imperative language (that does come with its downsides); Nix the DSL is a functional language which requires a different way of thinking. Systems usually are operated imperatively, so it’s normal that you’d find it easier.

    It’s not an easy language at all and one might ask if another one wouldn’t do the job better, which is what Guix System kind of explores, but its (nix) design goals make a lot of sense.





  • A good first approximation.

    So where in this setup would you mount a network share? Or am additional hard drive for storage? The latter is neither removable nor temporary. Also /run is quite more than what this makes it seem (e.g. user mounts can be located there), there is practically only one system path for executables (/usr/bin)…

    Not saying that the graphic is inherently wrong or bad, but one shouldn’t think it’s the end all be all.