• 0 Posts
  • 29 Comments
Joined 8 months ago
cake
Cake day: December 25th, 2023

help-circle






  • What precaution would you expect OP to would’ve done though? A fallback kernel would be my guess - that’s something many casual oriented distro do out of the box basically. . I read your post as “you’re right, don’t use arch” - something btw which I tend to agree with although I wouldn’t say that’s because of the precautions.

    I use arch because there’s no black box magic. For an end user who expects or wants that… Yes, arch might not be the right choice.









  • Hey friend,

    I want to be very straight forward here in the hope that it’ll give you an additional perspective:

    The scenario you’re describing I’d describe as “make the life of my surrounding as easy as possible when I bite the bullet”.

    . That does not include making my system or even the home server easy to use or maintain. My interests don’t matter in that case only what those people need and would want. In my case: my non tech savvy wife would want to get rid of a big desktop PC but would most likely struggle because I enjoyed using it.

    This means:

    • For all data there are encrypted files with passwords and/or instructions.
    • For all things no one would want there is a “this is how you get rid of it most easily” guide, including "call an electrician for the following recabling to pull out the shellies.
    • for the one thing not easily ripped out there is a maintenance guide and a replacement guide (a bus system monster" temporarily" installed due to good reasons).

    To be clear: no non tech savvy person I know would want to use my (and I guess your) custom systems. Not one. They’d rather have a “this is the ebay description” or a “this is how you install windows”.

    Your legacy will find other ways to life on - it won’t be your tools and toys though.


  • Because all data points prove that axiom wrong - if any alternative would’ve been agreed as “better” than it would be established.

    So yes: we do need to reiterate advantages of alternatives when criticizing the status quo - because we’re the ones wanting others to invest energy (for their own good but how far did this get us in the past?).

    The author of course doesn’t have to provide anything. I support OPs point though that the message would be stronger if giving actual examples.


  • It’s the server doing the meddling, don’t forget that! Email servers have two things to base an analysis off of: the trustworthyness of the senders header data and the content.

    Header analysis will quickly kill messages from the fake servers but only after a certain amount of spam is identified - the computer doesn’t “read” the alphabet, it just sees valid encoded symbols. It’s the humans job to find the traffic lights, so to say.

    And content analysis is a cold war of attrition: building better filters leads to better tricks leads to better filters, etc.

    The only way I have found to stay spam free is customizing my address for each potential sender (i.e. scipilemmy@mydomain.net).that was a lot of work to set up though…



  • You have several long and comprehensive answers so please allow me to add an emotional one:

    Fucking compile error in hour six of what you estimated to be a four hour compile job because of a mistake you made that you found within 5 seconds after the error!!

    Fucking why doesn’t this compilation start I can’t find my mistake for hours?!

    Where does this module come from?! What do you mean “root kit”? Learning was fun!

    It all was fun! :)