dracs

joined 1 year ago
[–] dracs@programming.dev 9 points 3 weeks ago (2 children)

I've got a few old PCI cards around somewhere. I should pull one of them out and give them a try at this.

[–] dracs@programming.dev 10 points 5 months ago

The page says it captures game audio only by default. But you can switch it to all audio if UPI want to capture something like external voice chat.

[–] dracs@programming.dev 4 points 5 months ago (1 children)

It's not that it's closed, it's more that none of the exiting email protocols support a server which can't read your email (as it's all encrypted). They do offer Proton Bridge which you can run locally which will handle all the decryption and local mail clients can talk to that as the would any other mail server.

I don't know off hand if it supports calendar syncing though.

[–] dracs@programming.dev 10 points 5 months ago (1 children)

Proton is not the same as a VM. It has direct access to your filesystem. It could delete your entire home directory if it wanted to.

[–] dracs@programming.dev 2 points 5 months ago* (last edited 5 months ago) (1 children)

Even if it doesn't look as good, it'll hopefully include some better APIs that extensions can utilise to improve their experience. E.g. hide the native tabs.

[–] dracs@programming.dev 15 points 6 months ago (1 children)

As I understand it (from my non-legal casual read of the new coverage). Having a monopoly isn't illegal, abusing it is. For Google they found that google was secretly paying companies to not put their apps on other stores. That was what they got the judgement against them. They didn't find anything like that for Apple.

[–] dracs@programming.dev 2 points 6 months ago (1 children)

It's been a while since I've had to touch it too. But couldn't Alice provide Charlie with both the plain text and her public key. Charlie could then encrypt the text and see it came out the same as blob Bob sent Alice?

[–] dracs@programming.dev 3 points 6 months ago (4 children)

Typically end to end encryption includes digital signing of the message so you can verify who the sender was.

[–] dracs@programming.dev 7 points 6 months ago (6 children)

Yeah, end to end encryption means its not possible for someone to intercept the message between person A and person B. Nothing stops person B then forwarding the message to person C to report it.

[–] dracs@programming.dev 5 points 6 months ago

Yeah, no need for ID to vote here in Australia. Just rock up at any polling place and give your name and they'll cross your name off.

Don't even need ID to register to vote. Any other person on the electoral roll can vouch for your identity.

[–] dracs@programming.dev 5 points 7 months ago (1 children)

It certainly can be a bit involved. When I moved from Gmail address to my own personal domain I did it slowly over a few months.

I set my Gmail address to automatically forward to my new email address. Then I setup a quick filter which added a label on everything that had been forwarded. Once a week or so I would look at all the emails that had been forwarded and update them to my new email (or delete them if unwanted).

[–] dracs@programming.dev 6 points 7 months ago (1 children)

I'm not sure if their app does it. But the gluten docker container supports their port forwarding. Works really well if you're looking to route other containers through a VPN.

view more: next ›