kbal

joined 1 year ago
[–] kbal@fedia.io 8 points 7 months ago

What the Firefox User Research team is doing: Translating team-focused product development insights into human-centered global public expert strategic knowledge to reduce risk.

What I would rather see it do: Whatever is necessary to get the url bar selection behaviour on linux fixed.

[–] kbal@fedia.io 20 points 7 months ago (1 children)

I have one minor complaint based on that screenshot: "Installed size 44,6 MB" does not have the same meaning as "After this operation, 44,6 MB of additional disk space will be used."

It's okay to have it use fewer words, but it should not be at the expense of accuracy.

[–] kbal@fedia.io 6 points 7 months ago

You wouldn't want a laptop for that. A cheap "mini PC" would be the more appropriate choice. Shop around, you can probably find a second-hand or refurbished one with an hdmi port for under $100.

[–] kbal@fedia.io 3 points 7 months ago (1 children)

azirevpn.com is the one I'm on at the moment. Dunno if it's well-regarded but it seems good enough for my purposes. As well as Proton there's also Airvpn. If all you need it for is torrents then getting a seedbox is another option.

[–] kbal@fedia.io 14 points 7 months ago (10 children)

One benefit of port forwarding is that torrents work properly when it's configured. You may be able to download some things without it, but not as many things will be accessible, you can't seed anything, and your ratios will suck.

That's not the only thing I use it for, but the lack of port forwarding was why I left mullvad.

[–] kbal@fedia.io 33 points 7 months ago (1 children)

Too many people are acting as if this type of attack is somehow peculiar to open source projects. Very similar methods can be — and by now probably have been — used against closed-source non-free software. The level of defence against it probably varies even more in the rest of the software world, outside that part of it which is free software. How many of the vulnerabilities that have been discovered in Cisco routers were deliberately planted by outside adversaries? I don't suppose there's any way to know for sure. The main thing the open source nature of the project did here was make it easier to detect and impossible to cover up afterwards.

[–] kbal@fedia.io 7 points 7 months ago (1 children)

Matrix is easy unless you try to do something complicated with it.

[–] kbal@fedia.io 272 points 7 months ago

false alarm it's only threads

[–] kbal@fedia.io 12 points 7 months ago

Looks like a contender for the obfuscated sh script contest. I have a feeling that next time I see something I don't understand in a Makefile I'll be looking at it more closely than I would've last week.

view more: ‹ prev next ›