Ultimately, you can’t. Even if everything you’re doing is encrypted, they have access to the RAM that’s holding your encryption keys.
I’m Hunter Perrin. I’m a software engineer.
I wrote an email service: https://port87.com
I write free software: https://github.com/sciactive
Ultimately, you can’t. Even if everything you’re doing is encrypted, they have access to the RAM that’s holding your encryption keys.
If they tried to close source it, someone would just fork it.
It’s not completely FOSS, but I run Port87, which is quite a bit FOSS. It uses Haraka as its SMTP server, SvelteKit as its server framework, Nymph.js as its database layer, Svelte as its frontend framework, and Svelte Material UI as its UI framework.
The ones that I created and maintain are:
The base app layout is also available on GitHub.
You can try them both and see which one you like. Gnome is great, and it’s my preference, but KDE is also great.
If you’re looking for inkjet, the Epson EcoTank printers can take third party ink bottles. I haven’t used them, because the Epson bottles are already so cheap, but you can if you want.
It’s trained on internet discussions and people on the internet rarely say, “I don’t know”.
Before I even knew I had gonorrhea, Alexa was recommending me penicillin. She also recommended I stay away from the local brothels. And to lay off the whiskey. Also, Alexa is my doctor.
“They call it deadnaming because it’s dead. My [Twitter] is dead.”
We literally lived for thousands of years without photos. And we’ve lived for 30 years with Photoshop.
They don’t “need” to. There are games that companies refuse to let people run on Linux, so there will be a market for Windows, no matter how shit the experience is.
Cool, CVEs don’t tell you whether it’s remotely exploitable. What I’m talking about is an issue with the Linux kernel itself that can be exploited without having the existing ability to run code on the machine.
It’s usually very big news when there’s a vulnerability in the Linux kernel itself that can be remotely exploited. Like, everyone on any security show/podcast/blog is talking about it.
Sure, but those vulnerabilities aren’t just open to the network. Almost every one requires you to be able to run at least unprivileged arbitrary code on the machine.
How vulnerable your system is with an old kernel/old code depends on what you’re running. If you’re running a bunch of sophisticated services that allow access on the open internet, you may have more vulnerabilities than if you’re just running a file share. The kernel doesn’t really matter at all unless either you allow other people to run commands or someone is able to exploit a RCE exploit.
Maybe we should start by doing away with x86?
I transferred my entire NAS storage, which includes all of my backups, cloud files, my family’s backups, and my… Linux ISOs. That was about 12TB.
Fuck Apple. They deserve 0%.
Damn, that’s rough. I hope her family well. 56 is too young.
Not as bad as promised. I mean he has a point.