iocseb

joined 3 years ago
[–] [email protected] 4 points 2 years ago (1 children)

I think any distributed power structure relies heavily on a “good” value system. But yes, if you somehow can ensure good values broadly, it probably works.

[–] [email protected] 1 points 3 years ago

Those complex systems are trying to protect the standard of living for their citizens. Or at least that is what they think they do.

[–] [email protected] 0 points 3 years ago (1 children)

Great article! Also, thanks a lot for adding the additional arguments from this thread - Makes it much better.

[–] [email protected] 2 points 3 years ago

All the things that have been said already.

  • that there is a very nice app on iOS (Remmel) for it
[–] [email protected] 2 points 3 years ago (1 children)

Do we trust a centralized app store based on Flatpak more than snapcraft, which is owned by Canonical? What is the difference between these two from a ideological perspective?

 

I noticed that many Linux communities have a rather tough culture on their forums and community channels. Was wondering which Linux community does a better job on keeping a nice and friendly attitude.

[–] [email protected] 2 points 3 years ago

I did not know that there is a Linux Mint community. Thank you for pointing that out to me.

[–] [email protected] 2 points 3 years ago (1 children)

The most secure OS is the OS you understand to properly configure and maintain. If you know how to properly configure and maintain Windows, you can be more secure than a Linux PC that is run without much thought about security.

If the question is which OS comes with the most secure default settings, MacOS surely beats Windows and a security focused and mature Linux distro likely beats them all. However, there are great variances in security based on the distro.

I started to do some security reviews on the most popular Linux distros a couple of days ago - You can read them here: https://decrypt.fail

 

MX Linux collected 10 out of 18 possible points – A good balance between UX and Security.

[–] [email protected] 1 points 3 years ago

Yes. I’m saving for my wife’s and I retirement. I also want to make sure that our kids don’t have to support us when we are old.

[–] [email protected] 3 points 3 years ago

I have been charging my phone wirelessly for the last 3 years. I put my phone on it over night and is fully charged in the morning. Much easier than trying to fiddle with a cable in the dark.

[–] [email protected] 2 points 3 years ago

I second that! I run two mid-sized mastodon instances and definitely see the appeal of a fedi guild.

[–] [email protected] 2 points 3 years ago

This problem seems similar to the discovery problem small Mastodon instances have.

On Mastodon some folks have created bots that follow new users on other instances automatically, which half of the mastodon fediverse found very annoying.

 

Nice article on the various types of cybersecurity roles and where to start when entering the field.

 

A container-based approach to boot a full Android system on a regular GNU/Linux system like Ubuntu.

 

This post tries to summarize the key steps to take for an effective Privilege Access Management program. Segmenting Privileges in an Active Directory based IT infrastructure is a key defense strategy against automated as well as human operated Ransomware attacks.

[–] [email protected] 3 points 3 years ago (1 children)

Definitely try Pop!_OS! It has a very usable and fast desktop environment and comes with a well maintained software manager.

view more: next ›