

“Give me six lines written by the most honest man, and I will find something in them to hang him.”
A massive database of likely voters with party affiliation + the ability to find something on anybody they choose = easy election interference.
“Give me six lines written by the most honest man, and I will find something in them to hang him.”
A massive database of likely voters with party affiliation + the ability to find something on anybody they choose = easy election interference.
I want to see one state pass this (not mine ofc) just to see the carnage of an entire state full of companies that suddenly cease operations.
Typical corpo doublespeak
You can buy headphones with a USB-C connector too. That way you’ll lose the headphones too, so you don’t need an adapter anyway!
USB-C puts the springy bits that can wear out in the connector end, not the jack. The jack is just a piece of circuit board with bare traces on it, it’s very sturdy.
You don’t have to bring it everywhere, you attach it to your headphones and then it’s part of the headphones that you want to wear.
If you’re not getting logs, try to use this: https://wiki.archlinux.org/title/Keyboard_shortcuts#Kernel_(SysRq)
Try a sync to disk (or some of the “kill all” commands) when it’s frozen. This is closer in function to ctrl alt del in windows.
Existential dread
Buy a USB-C to headphone jack dongle. They’re about $5 and work on any phone.
You guys are only $5 away from the good ole days…
If I recall, the US vehemently disagreed with the right of the British to enforce their laws here. Quite successfully, I might add.
Ok grandpa, turn off the DirectTV and power down your AM radio. Using a technology that old is guaranteed to land you deep in enshittification-land.
I’ve been watching Jellyfin for a while and I have not seen the first ad,
You wouldn’t need to track them all, any distro’s installed package distribution (statistical, not Linux distro) should be strongly correlated with all of the others.
Just like how you can poll a large crowd based on the opinions of a few thousand people. Arch is a good place to look since all packages are explicitly chosen by the user while in other distros the default software packages ensure that their repo stats will be skewed.
When I’m looking into alternatives, I usually just search social media and note the things people recommend. The software ecosystem is small enough that this method isn’t (yet) polluted by bots promoting software.
It’s “what alternatives exist and how can I find them?”, not “I only install popular apps.
It’s the only way to stop the crab computer AI hive entity from destroying all life.
Bots pretending to be tech bros*
Twitter is basically millions of Groks in a trenchcoat at this point.
I don’t believe any kind of analysis that depends on measuring sentiment on social media given that it’s trivially easy to run hundreds or thousands of accounts on a 5 year old graphics card and some vibe coding.
I vaguely remember getting into a WPA network (that I owned!) using kismet about 15 years ago with relative ease, but I’m struggling to remember details about that process.
The 4-way handshake crack was the only key recovery attack until 2018 when the PMKID-based attack was discovered (here: https://hashcat.net/forum/thread-7717.html). The PMKID crack attack still required brute-forcing the key, but it didn’t require the 4-way handshake so you didn’t have to depend on a de-authentication attack to get started.
At that time there was another WPA vulnerability, if you were using WPA-TKIP, but it only allowed sending a few small packets every 10-12 minutes so it wouldn’t allow you to gain access to the network.
Later there were a few WPS-based attacks but they were slow (4 hours to recover the WPS PIN) and/or limited to specific manufacturers (weak hardware random number generation).
That’s certainly a way of looking at it.
The talent was upset at a conflict between kernel maintainers and posted a personal attack on Mastodon. The comment is now deleted ( https://web.archive.org/web/20250204004048/https://social.treehouse.systems/@marcan/113941358237899362 ).
The Code of Conduct explicitly lists public harassment as an example of unacceptable behavior.
Examples of unacceptable behavior by participants include:
-The use of sexualized language or imagery and unwelcome sexual attention or advances
-Trolling, insulting/derogatory comments, and personal or political attacks
-Public or private harassment
-Publishing others’ private information, such as a physical or electronic address, without explicit permission.
-Other conduct which could reasonably be considered inappropriate in a professional setting
Even if he is correct about about it being a code of conduct violation (it wasn’t), there is way to take action and it isn’t posting an attack on social media.
Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the Code of Conduct Committee at conduct@kernel.org. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The Code of Conduct Committee is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.
There has certainly been drama around Rust, but as was said in the thread: “Being toxic on the right side of an argument is still toxic, […]”
Arch is Arch-based, btw
I think 4chan is a pretty cool guy. Eh gets fined by the UK and doesn’t afraid of anything.
I used one to play WoW too, now I use this with a gaming profile instead of needing a piece of dedicated hardware:
The profiles are done on the hardware, so it doesn’t need anything special from the OS except to support keyboards.