![](https://fedia.io/media/ee/c8/eec82eb52f8a52598f0d92ed014a68a9ad9239b087cf401e8013d9edac1e565f.jpg)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
If we’re including television I’m disappointed that nobody mentioned Blackadder.
If not, Monty Python and the Holy Grail.
If we’re including television I’m disappointed that nobody mentioned Blackadder.
If not, Monty Python and the Holy Grail.
Anachronism means something else, especially with respect to movies.
Guess I should’ve gone with “Academic? It doesn’t even cover ancient Greece.”
Academic? History of the World Part I? I guess you could say it has about as much academic rigour as the average Mel Brooks movie.
Sure, the project is already bloated with so much complexity that what’s the harm in adding a little more? If you’re genuinely confused about it, see the entire rest of the Internet for details.
It has some advantages. It can be configured with simple text files and normal filesystem permissions. The sshd code is mature and has a proven record of good security. It doesn’t add yet another thing to systemd that has no business being part of systemd.
Default threat model: Some malignant demon, who is at once exceedingly potent and deceitful, has employed all his artifice to deceive me
deleted by creator
[false claims that] journalists gave the recent PS5 game Stellar Blade (pictured below) bad reviews because its female characters are too hot
That seems an inadequate way of summing up the Stellar Blade controversy which on the whole was considerably more ridiculous than that.
#!/bin/bash
head -$[$SRANDOM % `wc -l /usr/share/dict/words | cut -f1 -d' '`] /usr/share/dict/words | tail -1
If it’s more than none at all that’s pretty good. But adhering to open standards is also a factor in how we should judge these providers which goes beyond that.
technically it doesn’t break e2ee
** for some unorthodox definition of e2ee
If the “endpoints” are defined as being somewhere outside the end users’ control, because for example the client software they have is designed to betray their secrets, then the system is no longer end-to-end encrypted in the way that both cryptographers and normal people would usually understand the concept.
Are some people likely to object [to being constantly watched by computers that analyze their behaviour and report any detected anomalies to the cops]?
Typically, no, but there is no accounting for some people.
A fitting epitaph for the human race?
smooth end-to-end encryption works only tuta-to-tuta or proton-to-proton
The difference is that proton tries to be somewhat interoperable with other services. It uses standard PGP encryption, you can import public keys to it from elsewhere, and you can download your private key from them if you need it.
*
Of course I meant that you can easily export the private key from their web client, which is not really a download as such.
The kernel art department really failed us here. Instead of a blue screen of death we could’ve had, I don’t know, literally any other colour. I’d have gone with the Puce Screen of Panic.
Having only a clickbait title to go on, rather than watch the video I’ll just guess:
But I NEED Adobe Microsoft Fortnight Premiere Plus Pro Version 16 to LIVE
Other religious reasons.
Don’t have a computer.
If you were using linux in the 1980s you were way ahead of the curve.
Um… Debian? I may be biased, but sometimes I think half the “which distro” questions I see are specifically designed to get me to say Debian. It’s unclear why you think that more frequent updates would be an advantage.
WTF Google, did you really feel that gemini was such a threat that you had to usurp its name?
If it’s that bad, could you maybe give people a hint as to why we’d want to watch it and what it has to do with linux?