57
submitted 1 week ago* (last edited 1 week ago) by Artemis_Mystique@lemmy.ml to c/asklemmy@lemmy.ml

Just a thought I had, like what can a ten year old do(besides mass murder & accidents) that messes up their life so badly that it is unrecoverable?

It has to be something that is self inflicted and not something that is the cause of others around them.

[-] Artemis_Mystique@lemmy.ml 11 points 1 month ago* (last edited 1 month ago)

RISK-V and ASML have been targeted by them in the past to prevent Chinese use.

reading the broad points regarding RISC-V, I think my worst case scenario is apparently just the present day.

94

I for one am going through quite a culture shock. I always assumed the nature of FOSS software made it immune to be confined within the policies of nations; I guess if one day the government of USA starts to think that its a security concers for china to use and contribute to core opensource software created by its citizens or based in their boundaries, they might strongarm FOSS communities and projects to make their software exclude them in someway or worse declare GPL software a threat to national security.

86
68
[-] Artemis_Mystique@lemmy.ml 32 points 2 months ago

Skill issue

243
Unix rule (lemmy.ml)
329
45
submitted 2 months ago by Artemis_Mystique@lemmy.ml to c/linux@lemmy.ml

I don't know bash scripting

if [ -d ~/.bashrc.d ]; then
	for rc in ~/.bashrc.d/*; do
		if [ -f "$rc" ]; then
			. "$rc"
		fi
	done

I asked chatgpt and it said this is non standard? There is no bashrc.d directory on my home folder, I have uncommented the lines for now but dont know if this is benign or malignant

17
submitted 2 months ago* (last edited 2 months ago) by Artemis_Mystique@lemmy.ml to c/firefox@lemmy.ml

https://imgur.com/a/U4u0JA2 Admittedly it is just one site, but it feels suspicious because its asking for permission from port 443?

162
Is TOR compromised? (arstechnica.com)
submitted 2 months ago by Artemis_Mystique@lemmy.ml to c/privacy@lemmy.ml

All the recent dark net arrests seem to be pretty vague on how the big bad was caught (except the IM admin's silly opsec errors) In the article they say he clicked on a honeypot link, but how was his ip or any other identifier identified, why didnt tor protect him.

Obviously this guy in question was a pedophile and an active danger, but recently in my country a state passed a law that can get you arrested if you post anything the government doesnt like, so these tools are important and need to be bulletproof.

26
submitted 5 months ago* (last edited 5 months ago) by Artemis_Mystique@lemmy.ml to c/linux@lemmy.ml

Edit: Solved, while changing EDID make sure to remove the old module first and reinstall it with the new EDID

I have a faulty DP to HDMI adapter, that unfortunately never seems to parse the EDID data, so while connecting to a TV I used this guide and a 1920x1080.bin file from the internet and it worked, but unfortunately I was unable to use the TV speakers(I guessed the EDID file didn't specify that the device had audio out)

Using a separate pc I extracted my TVs EDID.bin file and repeated the steps but unfortunately, it just doesn't work, its stuck on the old 1920x1080.bin(I can tell because it shows up as 'Linux Foundation 23'') The issue persists even after I delete the old .bin file from /usr/lib/firmware/edid

I am using wayland

System info:

OS: Fedora Linux 40 (Workstation Editi 
Host: TECRA R940 PT439V-03U02WAR 
Kernel: 6.8.11-300.fc40.x86_64 
Uptime: 29 mins 
Packages: 2209 (rpm), 32 (flatpak) 
Shell: bash 5.2.26 
Resolution: 1920x1080 
DE: GNOME 46.2 
WM: Mutter 
WM Theme: Adwaita 
Theme: Adwaita [GTK2/3] 
Icons: Adwaita [GTK2/3] 
Terminal: gnome-terminal 
CPU: Intel i7-3540M (4) @ 3.700GHz 
GPU: AMD ATI Radeon HD 7550M/7570M/765 
Memory: 1998MiB / 7879MiB 

Dmesg -H

[Jun20 22:26] Linux version 6.8.11-300.fc40.x86_64 (mockbuild@f09cc32e12c24ed6a1a66c2a2e9f1728) (gcc (GCC) 14.1.1 20240522 (Red Hat 14.1.1-4), GNU ld version 2.41-37.fc40) #1 SMP PREEMPT_DYNAMIC Mon May 27 14:53:33 UTC 2024
[  +0.000000] Command line: BOOT_IMAGE=(hd0,gpt2)/vmlinuz-6.8.11-300.fc40.x86_64 root=UUID=XXXXX ro rootflags=subvol=root rhgb quiet drm.edid_firmware=DP-2:edid/sony.bin

Any help is appreciated

[-] Artemis_Mystique@lemmy.ml 15 points 8 months ago
[-] Artemis_Mystique@lemmy.ml 14 points 8 months ago

That AI was clearly trained on Amazon sefl-published Books /s

[-] Artemis_Mystique@lemmy.ml 18 points 9 months ago

1-2 thousands years from now, this would be featured in the weekly AI generated '10 mysterious artifacts from the 2000's meme culture' video, along side the 9gag meme rock or 'the josh fight ground'

13
submitted 9 months ago by Artemis_Mystique@lemmy.ml to c/linux@lemmy.ml

What is your personal preference based on experience? I Assume because Mac is Unix and Linux is Unix based, it would be more suited, but I have no personal experience with the layout. I am willing to try something new if i hear enough merits for it, and I also find the windows layout somewhat inadequate(The grass is greener on the other side /s)

I dailydrive Gnome, I am not a programmer, but i am a power user

(On a tangent: Why is gnome so restrictive, it feels like its missing a ton of UI features that are trivial without a boatload of 3rd party extensions that break every update; why doesn't Win+Shift+number launch a new instance, every other DE does, why doesn't it?; I don't use KDE because I just don't like it, I feel Gnome could be way more if it just natively integrated the extensions ).

aesthetically the windows key annoys me and i hate putting stickers on keyboards; I like how the mac layout looks(My very minimal experience with an in store mac-book has cautioned me away from the fisher-price OS so i don't know if it is intuitive to use)

[-] Artemis_Mystique@lemmy.ml 11 points 9 months ago

Didn't Tencent invest in them or something?

143
[-] Artemis_Mystique@lemmy.ml 11 points 9 months ago
[-] Artemis_Mystique@lemmy.ml 15 points 9 months ago

I was thinking more along the lines of something that is application agnostic i.e If it is on your display, the tool can grab it

[-] Artemis_Mystique@lemmy.ml 11 points 9 months ago* (last edited 9 months ago)

That said, make sure you fully understand the implications of enabling it

Are there any other risks to worry about except abuse due to physical access?

The wording makes it feel kinda Ominous, can improper use potentially lead to a borked system?

[-] Artemis_Mystique@lemmy.ml 29 points 10 months ago

Can you answer the question raised by my post?, or provide an alternate source(perhaps an article or coverage by a different channel) for the technology discussed?

[-] Artemis_Mystique@lemmy.ml 28 points 11 months ago

wikipe-tan provides excellent demonstrations for a variety of Wikipedia articles: Example

[-] Artemis_Mystique@lemmy.ml 18 points 1 year ago

sorry i panicked and killed the process this is the only screenshot ihave, basically my laptop fan was revving high for 1 hour straight, i was doing some text editing and light usage so i didnt think much off it, but i left my system for a while and came back and saw the fan was still revving, thats when i found this process

view more: next ›

Artemis_Mystique

joined 1 year ago