Not A.I, just a terrible system that incentivises (and even demands for public companies) abusive behaviour.
Just a regular Joe.
Not A.I, just a terrible system that incentivises (and even demands for public companies) abusive behaviour.
Some Competitive Multiplayer games that generally “just work” and perform well under Linux/Proton: Insurgency Sandstorm, Hunt Showdown, Hell Let Loose, Dead by Daylight, Battlebit
An apparmor profile is associated with an executable, based on its filesystem path. I think distributions tend to support either SELinux or Apparmor, but some (like Arch) support both.
Apparmor profiles are easier to reason about than SELinux, I find.
I have two apparmor profiles targeting shell scripts, which can run other programs. One is “audit” (permissive with logging) and the other is “safe” (enforcing).
The safe profile still has a lot of read access, but not to any directories or files with secrets or private data. Write access is only to the paths and files it needs, and I regularly extend it.
For a specific program that should have very restricted network access, I have some iptables (& ip6tables) rules that only apply to a particular gid, and I have a setgid wrapper script.
Note: This is all better than nothing, but proper segregation would be better. Running things on separate PCs, VMs or even unpriviliged containers.
Ha, mia samideano! Tre bon’!
Temporal is MIT licensed and comes with multi-tenant security features and its durable execution model is solid and scalability is phenomenal. They upsell to the cloud offering and the default OSS auth plugin is intentionally limited (you might want to develop your own if you self-host). You’d probably only look at the Temporal UI when debugging.
Windmill is very cool, but it is only suitable for trusted teams due to its security model. If you want to be able to develop scripts and workflows in the web browser and run them together with trusted colleagues, on a schedule etc., then windmill might just be for you!
25 or so years ago, I learnt Esperanto (my first second language) by chatting on the Internet. I’d have two windows open - one with the IRC client, and the other with a terminal and a shell script that would grep a txt file with consistent formatting. “esp esperantoVerbPrefix/” or “esp noun,” or “esp affix-” would typically return the correct result in a split second. Thanks to the simple grammar (that I had quickly memorized), I could hold conversations in near real time as a result.
I wish I could have learnt my other languages as easily.
</story time>
NFSv3 (udp, stateless) was always as reliable as the network infra under Linux, I found. NFSv4 made things a bit more complicated.
You don’t want any NAT / stateful connection tracking in the network path (anything that could hiccup and forget), and wired connections only for permanent storage mounts, of course.
Locked? Won’t somebody think of the cupcakes?!
Hah. I hadn’t seen that article / heard of the theory, but as far as crackpot theories/hypotheses go, it’s one of the more likely (edit: to come about). I doubt it’s anywhere near the majority yet, personally.
It was already obvious that propaganda news articles (on obscure websites) had orchestrated releases and promotion on social media, in a massive circle jerk, and I assumed machine generated/assisted content was involved. Then ChatGPT hit the headlines and we all had the power.
Whose deepfake influencers do you “trust” more? US, China, russia and a few lesser players are already working to control the information space / spread propaganda (note: not necessarily/always lies, but there is typically a focus or spin) far and wide.
We know people are highly influenced by propaganda (some more than others, but all of us are) and that quantity and repetition plays a role. Since this is now an established battlefield, I’d like our (western) defences to be strong.
It has potential for abuse, certainly. That’s par for the course. There is also the potential for it to be used to debunk fake news, shock people out of false beliefs, and help reconnect people to reality. Let’s see how this plays out. popcorn time
How will running a CA limit access? eg. Do you want to do client side cert validation? That sounds like an overcomplication. Also not ideal to run a CA (have signing keys) on the proxy server.
It’s a trade off. “Free services” typically require more leg work and can come with legal or security risks. I used to have a great XBMC & torrenting setup years ago. I spent significant time customizing it and various plugins, extending scripts etc. I had fun, and took necessary precautions. Millions wouldn’t. Some are happy to pay €9/month to another evil corp for convenience (where it works for them).
Oh, they do have an plan with ads. You can’t really complain about ads if that is what you subscribed to, I guess. The price difference is €6 vs €9/month in Germany, btw.
The no browser support on phones kind of sucks though.
Disney+ has ads? I’m in Germany and I don’t see any. Where are you?
edit: removed comment about browser, as OP meant on the phone
I don’t know about these days, but I remember making a custom layout for Windows back in 2005 that was US Qwerty keyboard plus AltGR+auose for äüö߀ (German umlauts and euro symbol).
I forget how I did it, as I haven’t used Windows for serious work in years.
That was IRIX (SGI’s UNIX) with the “fsn” file browser, if the Internet is to be believed.