

I use Baïkal for card and cal and Apache for webDAV, they provide all the features I need and were easy enough to set up, never tried alternatives.


I use Baïkal for card and cal and Apache for webDAV, they provide all the features I need and were easy enough to set up, never tried alternatives.


I wonder how many countries’ laws every Linux distribution violates by existing (e.g. North Korea, Turkmenistan) but these bozos at Arch Linux 32 don’t proactively block.


That is the way. I just don’t understand open source projects that have no ties to regions where these dumb regulations exist blocking users from said region. Why is it your problem? If California (for example) wants to block your website, let it be their problem.


I live very close by and fucking hate this consulate. Most mornings dozens and sometimes hundreds of visa applicants hover around it, mostly on Simcoe Street, and consulate staff instruct visitors not to stand on the public sidewalk on the consulate’s side of the street (they have no authority to prevent anyone from doing so).


Akahually at my work we used a third party authentication PAM module that uses the gecos field for username mapping.


All I’m saying is that drunk drivers don’t get punished nearly as much as they deserve, and thus I have no sympathy towards him even though he’s treated inhumanely.


I also bought into the Duolingo hype in the early days, watched it enshittified into oblivion, and not shedding a tear for investors punishing it, even if it’s for the wrong reasons.
I’m now doing comprehensible input (reading + videos) and flash cards in my target language. Even though some people poo poo flash cards, I find it a good complement for CI (when I encounter a word from flash cards in the “wild”, it does click better). I definitely need to work on speaking ability.


I’m sympathetic to people in this predicament with a history of “possession of a controlled substance”. Gun possession somewhat less so (depends), and impaired driving not at all.


To be fair, high noon is rarely 12:00 even without DST. West Saskatchewan and the Yukon have quite a big mismatch with solar time. The idea behind Sandford Fleming’s innovation was that some mismatch is acceptable if it means you don’t get a different time zone in every stop along the railway.
Personally, I think this system is not really the best for the modern globalized age. I would prefer something like Swatch Internet Time or even just using UTC exclusively everywhere. It’s just a social construct that the sun rises at what we label with numbers between 5 and 9 (usually), and we start working at what’s labelled 9. You could just as easily (more easily in my opinion) shift those labels depending on geography, instead of using the same labels and deciding on an offset. But it will never happen because of inertia. Look how difficult it is to get rid of a dumb idea like the biannual clock shift (not to say DST) because of inertia.


Very good! Changing the clock twice a year is an insanity people accept as normal, and that shouldn’t be the case. Please let Ontario be next (I know of weak sauce Bill 214).


+1 for the headphone jack


It’s worse than both of them being the wing way
There are jobs with flexible hours and partial or full work from home arrangements, and more importantly jobs where you can feel some amount of purpose and personal growth instead of just making money (mostly for someone else, i.e. shareholders). To get such a job you might have to get some specialized skill, or just get lucky.


I fully agree, but you don’t have to use that chequing account. As you wrote it’s not a WS-specific issue and needs industry-wide regulations.


This happens every fucking winter and not just with these trash cans but all cars. In most of our streets the streetcars don’t have a dedicated and separated lane (or signal priority), making them pretty much just worse buses that stop in the middle of the street, making you cross a car lane on the way to the sidewalk.


Personally I don’t go with full disk encryption for backups. I use Borg that encrypts its repositories on a plain ext4 partition, and the key is saved in the config file (wrapped in passphrase of course). Obviously it just moved the problem of what to do with the passphrase… I also have Vaultwarden (with a separate backup mechanism).


That’s definitely quantity over quality


Hey, hope you are recovering from this ordeal. I attribute some of the oddities in your post to panicked writing, but it would be great if you can clarify these points:
listed as .BRM for windows 6
What does that mean?
As soon as they saw me, they wiped everything from my home folder, everything that wasn’t a base part of kde was gone
What do you mean base part of KDE? Did they delete more than just the home directory?
because since they schroot, none of those processes were available to me to view
Why wouldn’t you be able to view processes running in schroot? Doesn’t it use the same pid namespace and uses the same /proc as the init process?
I went digging and found the schroot under /run/ I took a look at the properties and the env showed 128.7TB of storage
You wrote in a comment “that was the server farm rooted into me”. Why do you think that is the case?
Also, it’s not quite clear what the screenshots are meant to show. The first two are a list of files in your home directory, showing it’s not empty. So did they wipe everything or not? How are we supposed to know what those files are and what you expect should be there… And then the other screenshots are of you trying to recover files from the disk image.
I understand if you don’t, but do you actually have any evidence of an attack? Like cellphone video of the screen while you are seeing suspicious activity on Wireshark? I can definitely understand being more concerned with minimizing the damage once you realize files are being deleted than gathering evidence. But can you for example fish out that .dll file from the disk image?
The fundamental difference between GPG encryption and encrypted partition is that of asymmetric vs. symmetric encryption. Whether you mount encrypted storage or decrypt a file with GPG, there’s some “effort” in putting in the passphrase and in both cases the system’s keyring is briefly aware of it and the plaintext is saved to memory (volatile, unless you have encrypted swap or other edge cases).
Asymmetric encryption is not normally used for personal stuff but mostly to exchange material with one party holding the private key, and other having access to the public key (which is public). Of course you can act as both parties if you like. If you do, keep in mind:
/dev/shmbefore encryption.Personally I use Joplin. On the clients it’s secure because the database is saved on encrypted storage secured by my login phrase. On the server it’s secure by Joplin encrypting the files saved to WebDAV storage. Is it 100% safe? Probably not, but probably good enough to stop all but a nation-state level actor.