They went as far as producing fake documents to cover up their embezzlement, and got busted…
Also on Mastodon: @pedroapero@mastodon.top
Want to send me a tip? XMR:89oiUKyACFZ655sTikh42RF8wpd46EQDmbTQUQiHHRWFEatjp5xxj4tZBhMMfjC4X45qvq4EdEGXkBsdxT1kP9xyVia8mPD
They went as far as producing fake documents to cover up their embezzlement, and got busted…
I’m fine with Rofi. I’ve used xfce4-appfinder also, it’s less minimal, not configurable (good graphical defaults, might be what you want).
I guess if the copyright trolls got their way, there would be no general purpose computing.
Exactly. These kinds of statements are so naive.
If the rocket explosion can create a 60 meters wide crater, my guess is it can still at least crack open the fission part and spill the material in the atmosphere.
I use BTRFS for the same. Being able to check for and repair silent corruptions is a must (and this is without needing to read the whole drives, only the actual files). I’ve had a lot of them over the years, including (but not only) because of a cheap USB controller also.
Unfortunately we are at a point where Cisco Cloudflare and Google are held liable for filesharing-related domains their DNS relays are resolving IPs for…
No, every service provider must remove infringing content when reported. That is not the case on Telegram.
i2Psnark is an alternative. With a lot less features (and not mentioning the UX)
I use Signal, but I’m unable to force everybody to do the same.
Re-implementation means reverse-engineering and building new binaries. What’s the point of MicroG if it is just downloading google binaries? An app with privileged access is different than a remote access trojan. The whole point of a sandbox is not to have the same access as the original app.
What you are saying doesn’t make any sense.
Any chance to use Whatsapp on /e/ ?
Yeah that’s unbelievable, I had the same experience! You must never install your bank app, otherwise it will start always requiring it.
Actually you can never vote for what you want, unless it has a decent chance to make it to the second turn. The condorcet method would allow it.
I agree with this theory. The public opinion changes very fast in France, it is risky but could work. Besides, the far-right would have kept rising till the presidentials anyways.
I’m still using MPD+ncmpcpp. For remote access, I use Wireguard and stream via HTTP on VLC. It’s amazingly fast and lightweight (26MB RAM for 30K+ songs).
MALP also works on Android, might be better with no physical keyboard (now supports streaming also).
A bunch of eDonkey servers were seized in 2006. This was before the implementation of Kademlia in emule. It highlighted the vulnerable centralized part of the protocol and pushed people to alternatives. Also compared to bittorrent, the lack of moderation and low speed played a role.
The onion option makes more sense (standard solution, battle-tested). Not sure about POW resilience, compared to distributed hosting though.
Yep, you can gossip the list of peers with that identifier.
IPFS has 2 and 3 (they almost f*ed-up 3 with CID v1 actually)
“ex official said: this might happen and that might mean” how is this relevant news?