• 0 Posts
  • 497 Comments
Joined 1 year ago
cake
Cake day: February 1st, 2024

help-circle




  • It’s a pretty standard bandwidth/latency tradeoff in my view: email is high bandwidth (it’s in writing, you can re-read, etc.), whereas phone is low latency (several back-and-forth explanations can happen in seconds). Each has its place.

    If social anxiety is a factor, that’s a perfectly valid, but separate, issue.







  • Jobs created toxic work environments.

    …and so did Linus Torvalds* — he’s certainly not the embodiment of capitalism. But I absolutely have a huge amount of respect for Torvalds, even if I don’t approve of his way of interpersonal/professional style.

    (I used to run Arch btw [but I run Debian now].)

    *He’s supposedly taken steps in the right direction here and has made improvements.



  • On linux you can"t install or uninstall anything if you are not root

    That’s not true at all. You generally can’t use your distribution’s package manager to install or uninstall without elevated privileges. But you can download packages, or executables with their own installer, and unpack/install under your home directory. Or, you can compile from source, and if you ./configure’d it properly make install will put it under your home.

    Standard Linux distributions don’t place restrictions on what you can and cannot execute; if it needs permissions for device access of course you’ll need to sort that out.








  • Lemmy is not encrypted, my comments are public, your comments are public, we both know that. Anyone with a raspberry pi or an old netbook can scrape them.

    If I use an encrypted service and all of a sudden everything that I thought was encrypted was decrypted by the service provider without my consent? That’s breaking encryption.

    If on the other hand I use an encrypted service and they tell me that they can no longer offer the service, my data will be destroyed after X days, and I need to find another way of storing my encrypted data because of privacy invading government policies? That is not breaking encryption.