Details
-
Skillsphp, python, bash, sysop
Joined devRant on 5/1/2017
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
RGB(0, 0, 0) aka #000000 and RGB(255, 255, 255) aka #FFFFFF are absolute numbers seen by the system but in the reality, they're displayed on the screen in a relative manner. This means: It's true that things aren't only #000000 and #FFFFFF, but real colors even aren't always in the RGB(0-255, 0-255, 0-255) range. Let me throw color spaces, different color perceptions and tetrachromacy in the ring. ☺
-
For the masochistics, use SOAP for the XML transfer. Don't forget to use different programming languages and libraries for client and server.
-
@Cyanite The terms blame and fault you mentioned are subject to the complicated laws. Don't forget insurance and contract laws. Probably you have to replace the necklace except ...<long text here>. We could argue for hours, when and who to blame and when not. But the really problem lies that data doesn't distinguish between legal and illegal. Data doesn't care about someone's fault, who to blame and why it's disclosured. Data are just on devices stored informations. To counteract the risk, data minimization is the solution, but not just a debates about blaming and faults.
-
@Cyanite I don't think it's relevant if hacked, leaked or being forced to disclose. They promise something that's difficult to achieve.
-
@Cyanite Yes they promise they won't tell. Almost everybody promises being discrete when data are sensitive but still remember Ashley Madison? Would you really bet with your job / social ladder if an unknown company covers your identity or not? What if the company manages to whitewash the case anyhow and then possibly firing back with a criminal case to hunt the sender with the support of the federal authorities? Then you better was really anonymous.
-
You could keep a good level of anonymity if they're accepting to pay you in Bitcoin. Protip: You don't need to be registered with your real name and you don't even need a bank account to convert Bitcoins to cash.
-
I hope someone develops an easy and reasonable solution for sharing GPU power to virtual machines one day. This would at least double the fun with GPUs.
-
How did you meter it? Gimp took 11 seconds on my machine to launch (Arch, HD). After I closed Gimp, the second start only took 2 seconds. I guess it dependends on many criterions how fast a program launches. I couldn't test on Windows. I like Linux, but I think, for comparing you should define comparable (fair) start conditions.☺
-
What's wrong with WannaCry: The support is miserable (if they reply at all) when trying to complain about that WannaCry is encrypting the wrong folders. The UX is also disastrous.
-
A rendered perspective with blue sky: http://imgur.com/a/ZE4Rx (sorry I don't have a upload button).
If you worry about your privacy, you should delete this rant. -
I was curious and tried out the Ubuntu bash on a Win 10 system.
I noticed:
1. I couldn't access my local network mount drives within the bash.
2. File names even are case sensitive in the /mnt/ tree where the Windows drives are (c:\, d:\, e:\). I was able to create the directories /mnt/d/Hello and /mnt/d/hello simultaneously. The Windows explorer listed both directories, called d:\Hello and d:\hello but when I tried to descent into the folders each, the explorer has shown the contents of the same directory each time (can't remember if it was always d:\Hello or d:\hello)
3. git seems ok
4. I couldn't get the ping command convince to work. I couldn't even see the network interfaces and the ip command fails. Don't bother to try iptables.
5. Apparently Windows bash is only a console. Installing a packages which required GTK worked but calling it's main program failed.
6. Processes started in the bash doesn't appear in the Windows task manager (as I remember or I was inept to discover it). -
@linuxxx sorry my own clumsiness. I thought I posted the text "I would like ..." in the wrong rant browser tab but then noticed I was right after I deleted it.
-
I would like to abandon the Windows boot partition but I didn't have the courage yet to stuff the Windows system in a virtual machine because offering GPU acceleration (with full DirectX support) and sound in perfect quality looks like a compliciated business.
-
0. operating system
1. drivers to get internet connectivity when required
2. firefox to google for solutions if I experience problems during the installation (I really hate smartphone keyboards)
3. system updates
4. missing drivers (graphic card ...)
5. veracrypt to encrypt the whole system drive if it's a windows machine -
@zombie01 I think it's important to distinguish between privacy and anonymity. Privacy is when you hide *what* you're exactly doing (comparable with locking the water closets door from inside in buddy's home) and anonymity is when you hide *who* you are (walking with niqab in a foreign area).
As soon as the host sets up the VPN, the host only shifts the privacy concerns from the internet service provider to the VPN service but the privacy isn't guaranteed as the domestic network is still vulnerable to wiretapping by the host or other attackers from inside.
In the aspect of the anonymity: When unwitting using internet connectivity over an anonymous VPN service, the guest probably isn't prepared for an anonymous surfing session, which means he probably logs into his FaceBook oder something like email account which is associated with the real name, which nullifies the anonymization efforts. Because of cookies, browser fingerprints, an effecive anonymization involves a dedicated system. -
Interesting but what's the point of automatically sending traffic over VPN whenever a "guest" with an unknown MAC address appears in the network?
Could he fear the consequences if a guest does something illegal like filesharing over his network?
I think an unknown device shouldn't have any internet connectivity until it's clear which role the new device has because some services may restrict, lock or even ban accounts if they detect an IP coming from a commonly known service which also advertises itself as an anonymization service.