Did you know most coyotes are illiterate?

Lemmy.ca flavor

  • 2 Posts
  • 22 Comments
Joined 20 days ago
cake
Cake day: June 7th, 2025

help-circle
  • Pretty good video. It’s not like he explains how to do anything or even picks very good software to begin with, but his genuine excitement is really all that’s required. Getting people interested is the important part, and they’ll learn much better by using their own motivation. This video also gives off a strong “I’m an idiot, and if I can do it you can do it” vibe which can be really reassuring to those who are just too intimidated to even dip their toe in.



  • I know this is not a unique sentiment by any means, but it makes me legitimately angry to think of participating in a conversation where someone else is using this. If you don’t want to read my messages why are we even connecting; imagine clicking “summarize” on someone genuinely trying to talk to you. “Sorry, the AI hallucinated that you were going to finish the rest of the assignment tonight.” and a year later “Sorry, I forgot all the nuances of who you are as a person because an AI didn’t think they were relevant.”



  • CoyoteFacts@piefed.catoLinux@programming.devOn X11 and the Fascists Maggots
    link
    fedilink
    English
    arrow-up
    50
    arrow-down
    1
    ·
    3 days ago

    As a commenter on that post says, this sort of talk is also common in the comments of Phoronix articles. The commenter says they’ve completely stopped supporting Phoronix since it’s clear that Michael enables this behavior by not moderating it (the least he could do is disable commenting; the type of people that are in the Phoronix comments are the absolute worst). It’s been festering for a very long time, unfortunately. Click any Phoronix article that’s older than a day and check the negativity. Worse, click an article about a controversial topic like X11/Wayland/Systemd/bcachefs/KDE/GNOME/etc. and it’s just a shitshow.

    I’ve been seeing it to a lesser degree here as well. I don’t know what it is about X11 that really riles up the conspiracy theorists.


  • Mailbox.org is a good pick to consider IMO. You can read some comparisons on PrivacyGuides, which I also recommend as a starting point for these sorts of topics. The mailbox.org web UI is not great, but it allows IMAP/SMTP access, so I use Thunderbird on both desktop and Android in order to interact with my inbox. My inbox is auto-encrypted with PGP using their Mailbox Guard thing, so my emails are all encrypted garbage on the web UI anyway. Mailbox.org only allows paid-for accounts, but considering the annoying stuff that Proton and Tuta do to their free accounts I’d rather just be honest about the service I’m getting. It allows auto-forwarding directly in the web UI, but given that you can hook up to it with IMAP anyway, it’s not like you couldn’t just do it yourself.

    (Also, as another comment said I also recommend DuckDuckGo’s Email Protection for email aliasing if you need it.)


  • The straw that broke the camel’s back for me is the CEO’s icky tweet about how great Republicans are for your privacy and how they stand up for the little guys (what), which they doubled down on using the official Reddit Proton account. There’s already been a ton of discussion about this on the internet if you care to look for more angles on it.

    But before that I’d already grown quite leery of them for their trend of endlessly starting new services before the old ones are polished, along with trying to push everyone into their walled garden and endlessly using naggy popups in the UI about it. Worst of all, they have a clear trend of not giving a damn about Linux support, sometimes giving up on certain features for their Linux clients or releasing the clients way after the Windows/Mac versions. For a “privacy company”, not putting Linux as a first-class citizen is really just unacceptable, and they’ve been around for long enough that it’s clearly a trend and not a fluke. To me, Proton just feels like a wannabe version of Apple. Its continued actions give me the feeling that it exists to serve itself, not its users.











  • I’ve been using this a lot lately, and it’s been great after a bit of a learning curve. It even incorporates some of the functionality from the addons and userscripts that I needed for YouTube, like getting rid of clickbait titles/thumbnails and blocking specific channels. Since you never really have a tracking profile when using YouTube this way, it’s very obvious when YouTube is trying to shoe-horn in political channels and clickbait, and you can just continually keep blocking those channels in the recommended section until you get all of them. I’m still missing a way to boost the volume on certain videos that are too quiet for me, though. I use LibRedirect to auto-open YouTube links in FreeTube. FreeTube has occasionally broken because of YouTube API updates, which requires them to figure out the problem and push a new FreeTube release (which could take a day or more), but other than that I’m fairly happy with it.


  • I’m speaking from an American POV on credit cards: getting a good credit score requires doing a lot of things that don’t really make sense. I’d just make your peace with that and play the game. Opening as many credit cards as possible, never missing a payment, and sending a small payment through each one once a year to keep them active is an extremely good way to build a solid credit score. Before you read further, please note that opening credit cards temporarily dips your credit score due to hard inquiries, but all forms of credit score dings are removed after a specific amount of time based on their severity; generally you can expect hard inquiries to go away after ~12 months.

    The system encourages you to have a lot of accounts, and it encourages you to have a long average account age. People who never use credit cards may have a poor credit score due to lack of history, and people who only have ~one long-running credit card will have a fragile credit score due to the average account age being prone to literally breaking in half as soon as they open any other credit account. Opening as many accounts as early as you can will temporarily dip your score, but it will come back much stronger. Sometimes you’ll get rejected for a credit card and will still have to eat the hard inquiry, so it’s a delicate game of trying to open accounts and also trying not to appear too desperate. Having a lot of income also helps credit card companies be more amenable to your thin history.

    Also as a last note since you seem like someone who “takes money seriously” enough to not be in debt: at least in America, credit cards are great for your finances as long as you pay them off. Credit cards do not charge you any interest or fees as long as you pay your balance on time, and generally you shouldn’t be applying for any credit cards that have an Annual Fee charge. It’s not too hard to get an unconditional 2% cashback card, which means they will give you 2 cents back for every dollar you spend (this doesn’t count as taxable income). You can further diversify to get specific 5% cards for your most-used categories like gas and utilities.


  • I’m not a security expert by any means, but here are a few things I know as a regular user:

    Always keep your system up-to-date and only download and execute software from the official Arch repository if you can help it. Malware often takes advantage of outdated systems that don’t have the latest security patches, so by staying as up-to-date as possible you’re making yourself a very difficult target. The AUR is a user-based repository and is not inherently trusted/maintained like the official Arch repos, so be careful and always read PKGBUILDs before you use AUR software. Don’t use AUR auto-updaters unless you’re reading the PKGBUILD changes every time. Ideally try not to use the AUR at all if you can help it; official Arch Linux is usually quite stable, but AUR software is often responsible for a lot of the “breakages” people tend to get with Arch. If you have to run sketchy software, use a virtual machine for it, as a 0-day VM escape is almost certainly not going to happen with any sort of malware you’d run into. ClamAV or VirusTotal may also help you scan specific files that you’re wary of, but I wouldn’t trust that a file is clean just because it passes an AV check. Also, never run anything as root unless you have a very specific reason, and even then try to use sudo instead of elevating to a full root shell.

    Don’t open up any network ports on your system unless you absolutely have to, and if you’re opening an SSH port, make sure that it: isn’t the default port number, requires a keyfile for login, root cannot be logged into directly, and authentication attempts are limited to a low number. If you’re opening ports for other services, try to use Docker/Podman containers with minimal access to your system resources and not running in root mode. Also consider using something like CrowdSec or fail2ban for blocking bots crawling ports.

    As far as finding out if you’re infected, I’m not sure if there’s a great way to know unless they immediately encrypt all your stuff and demand crypto. Malware could also come in the form of silent keyloggers (which you’d only find out about after you start getting your accounts hacked) or cryptocurrency miners/botnets (which probably attempt to hide their CPU/GPU usage while you’re actively using your computer). At the very least, you’re not likely to be hit by a sophisticated 0-day, so whatever malware you get on your computer probably wants something direct and uncomplicated from you.

    Setting up a backup solution to a NAS running e.g. ZFS can help with preventing malware from pwning your important data, as a filesystem like ZFS can rollback its snapshots and just unencrypt the data again (even if it’s encrypted directly on the NAS). 2FA’ing your accounts (especially important ones like email) is a good way to prevent keyloggers from being able to repeat your username+password into a service and get access. Setting up a resource monitoring daemon can probably help you find out if you’re leaking resources to some kind of crypto miner, though I don’t have specific recommendations as I haven’t done this before.

    In the case of what to do once you’re pwned, IMO the only real solution is to salvage and verify your data, wipe everything down, and reinstall. There’s no guarantee that the malware isn’t continually hiding itself somewhere, so trying to remove it yourself is probably not going to solve anything. If you follow all the above precautions and still get pwned, I’m fairly sure the malware will be news somewhere, and security experts may already be studying the malware’s behavior and giving tips on what to do as a resolution.