• 0 Posts
  • 236 Comments
Joined 2 years ago
cake
Cake day: June 10th, 2023

help-circle
  • Controllers I’ve had (all of which should work on Linux easily, some with minor adjustments needed) in the order I think you should consider them:

    • 8BitDo Ultimate 2 Wireless
    • PS5 Controller
    • Xbox One controller
    • PS4 controller
    • PS3 controller
    • Xbox 360 controller (only connects through dongle)
    • Steam Controller (doesn’t have d-pad)

    Most controllers should work wired, but I haven’t tested any of them like that because I like my controllers wireless.


  • In a world where I am limited by hours in a day and how many engineers I have on staff? A bug that nobody knows about is not a bug.

    But people know about it, so much that they are reporting it, you don’t know about it, but everyone else does.

    That is obviously playing with fire

    Exactly, without the report you wouldn’t know what type of bug it is that affects people.

    “linux users are smarter and make better bug reports and also have bigger dicks”

    No one claimed any such thing, have you actually read the article? He claims Linux users are just more used to making bug reports, so they keep doing that on games the same way they would on any other piece of software. It’s about the mentality than intelligence, most people experience a bug, curse/laugh and carry on. Let me ask you, have you ever reported a bug in a game you played? I’m sure you’ve experienced many, but have you ever actually reported one?

    But I think it DOES ignore the reality that adding actual support for a new platform does drastically increase the testing and build/deployment overheads which are usually the realest of costs anyway.

    That is true, which is why the majority of games released for Linux are indie, since only indie developers have the necessary funds to carry such big overhead… But being serious, yes, there’s some overhead in setting a Linux build, but it’s usually one of the easiest to make, most games are already doing Windows/Xbox/Playstation/Switch adding an extra pipeline there should be much simpler than you’d expect.

    Fix things as they come up" really is the best of both worlds.

    How would you know things came up without bug reports?


  • Its not burying your head in the sand.

    It is, just because people haven’t reported it doesn’t mean they haven’t experienced it. Maybe 90% of the people experienced that bug, but only the ones on Linux reported it. It had to be a very big number so that statistically less than 6% of the population experienced it enough to report it. Think about it, what are the chances someone specifically would get a generalized bug? If it’s 1% the chance that that 1% happens to be within the 6% of Linux users is very slim, for that to happen 400 times it’s inconceivable, those bugs were widespread, just not reported.

    If it is isolated or people just don’t care? Then… it kind of doesn’t actually matter.

    Again, you’re making an assumption, the bugs were probably not isolated, and we don’t know what they were so maybe they were big deals, just unreported big deals.

    You scan the forums and optimally have community managers/PR people to do the same to keep an eye out for “This was weird?” style comments but you mostly focus on the stuff that naturally rises to the top or that you identify as an issue.

    So you’re saying getting a bug with reproducible steps is worse than having to hire people to search the internet for posts and then pay engineers money to try to reproduce, so that you can finally have the same thing you would have gotten for free? Dude, sometimes people say “the game crashed, piece of shit” and that’s all the info you get in a forum, whereas a bug report is more akin to “When talking to NPC X the game crashed, here’s the stack trace, here’s my save file right before, I’ve confirmed that going and talking to X immediately triggers the issue”, but you do you, hire a community manager full time to read posts in case someone says the “the game crashed”, then pay a QA to sit on their hands until such report comes and then spend months to try to reproduce the issue, to finally get the same bug report that some random person would have given you for free.

    The more bug reports you have? That is engineer time spent assessing what is and isn’t a priority.

    No, engineers fix the bugs, project managers asses whether a bug is or isn’t a priority, or you thought their job was just to guide you through scrum practices?

    And the sad reality is that it is a LOT easier to say “we have our five thousandth number one priority” rather than to say something doesn’t matter.

    All you have to say is “your bug has been reported, we will look into it”.


  • I disagree sort of. I find it hard to believe a new distro is easier to set up than mint or Ubuntu

    Mint is easier to setup than Ubuntu, and not only it’s newer, it’s based on Ubuntu. Ubuntu also is easier to setup than Debian even though it’s newer and based on it. Being a new distro has nothing to do with being easy to setup.

    Bazzite is special because it’s an immutable distro, so it’s highly unlikely you’ll break stuff by poking around.





  • Ok, so, there are multiple things you should be aware.

    First of all you’ve set that DNS to be 10.0.0.41, that range of IPs is reserved for lan, similar to 192.168.0.41 would be. Only people in the same local network as you might be able to access it.

    Also, usually your home router doesn’t use the 10.x.x.x range, but some ISPs might do it in their internal network, which means your router doesn’t get an internet IP, instead your ISP router does and it shares the same external IP with different houses, so you would need to use something like https://www.whatsmyip.org/ to know what your external IP is.

    But there’s more, since you don’t control that router putting that external IP in the DNS won’t work either.

    You need to do something more complicated, I recommend you read on cloud flare tunnels for example.

    And one final piece of advice, don’t share your urls with randoms on the internet, security by obscurity is not security and all, but publicly advertising your url is asking for trouble, even without doing that you will see several attempts of logging into your servers constantly.



  • Nibodhika@lemmy.worldtoLinux@lemmy.mlPrinters for Linux
    link
    fedilink
    arrow-up
    3
    arrow-down
    1
    ·
    11 days ago

    Honestly, I’ve had HP for most of my life, and they have always worked until I couldn’t find cartridges for them or broke them while moving, or something similar. Latest time I needed one I decided that I print stuff so sporadically that a laser printer would be a better investment (previously, almost every time I tried to print stuff the ink was dried, because I hadn’t used it in months). I’ve had this HP for about a year and haven’t had any issues at all. But like I said I don’t print that much, but whenever I needed it it’s been there. And to me reliability is the best quality on a piece of equipment that doesn’t get much use but when it does sometimes is critical.


  • Plex is an enterprise solution, if you need your tech illiterate grandma to access the media it’s easier to pay them. If it’s just a local network or you’re okay with going down a rabbit hole of setup, then Jellyfin does everything and does it better IMO (Plex requires you to be online to login before it shows you your local data, plus you’re sharing information on what media files you have to Plex).

    I personally have been using Jellyfin for years, and my only complain is that the LG app is slow and I get some videos that stuck for a few seconds in it (probably some codec thing, that I could fix by transcoding the media but I haven’t been bothered enough to figure it out)



  • They can check the url.

    And do what? The URL might be invalid because it was temporary, or it could be a valid url that has a message in it, it’s impossible to know if the random characters in a girl are random or have a meaning behind.

    From where does the server get the content if every port is blocked but from licensed servers? You could contact them directly.

    How do you think that would work? My server has an IP, I control the ports on that machine. Sure, my ISP could try to block me by putting me inside a LAN or something so I don’t have access to the internet IP, but packages have to make it from and to my computer, so a path must be established, and where there’s a path you can do all sort of fun stuff with it, such as reverse shells or proxies. At the end of the day you can’t block stuff unless you block everything.

    It doesn’t have to. People can still meet offline and share secrets. It’s enough to limit the amount of secret communication. It’s enough if people cannot share books and videos in secret.

    You haven’t proposed any solution to the sharing of videos of books, hell, you can share pirated movies on Facebook if you want to without them knowing by taking a page from usenet and encoding the video in text and publishing it on several different pages and sharing an external file linking all of them together. Add an extra layer that uses AI to convert each post into something that sounds reasonable and no post in particular would raise any alarm, and even looking at all of them together nothing makes sense, unless you know the order and the key to decrypt it.


  • My point was that if you can get one message past the AI scanner you can get any number of them in the same manner.

    How, if all ports are blocked but for specific P2P connections?

    Port 80/443 would still need to be opened, TCP/IP can be used to do whatever you want.

    Your phone is not yours. The excessive use of qr codes will be reported.

    What is an excessive use? I read a QR code daily when catching the bus to know how long it will take, I use qr codes to login on multiple services because it’s convenient and faster than typing my password, lots of ads and other things use qr codes. Plus, that was just one example of an easy way to do this, there are thousands of other ways, moving data between devices is one of the most common things one can do.

    Exactly. Without movements there is no need for encryption.

    No, you’re missing the point, encryption is used between known members of a movement, not to recruit or contact the exterior, that would be impossible as no one outside of the movement would understand the messages.

    Also there’s always need for encryption, you don’t want your bank details to be sent unencrypted, and if you’re allowing even one encrypted messages you’re fucked because any encrypted messages should be (by definition) completely indistinguishable from another similarly encrypted message, that’s the whole point of the thing.


  • If you can only send facebook messages, facebook can block anything with more than 5 random characters.

    Congrats, you now blocked people from sharing urls, setting their delivery address on areas where code has numbers, or prevented people from communicating in a different languages or using slangs since it’s impossible to keep track of all of that. Also are you blocking images too? Otherwise you can put text in the image in several different ways.

    VPS - virtual private server? The server is behind a router. Of course it can be firewalled. It’s also on a host server so all your files can be read without you noticing.

    I also mentioned my home server, but in case you didn’t knew you can encrypt files on a VPS, sure there are attacks to access the contents when they’re being decrypted by the VPS, but there are lots of ways to have the server send the content encrypted and only decrypt it locally.

    Everything can be blocked by default and only AI monitored channels from official services can be accepted. Short messages can be hidden with crypto tricks but that is a very limited freedom for very few people.

    How would AI know the difference between “hey check this video <link to video>” and “hey check this video <link to video whose url has an encoded message>”? Or even “see you at the party tomorrow” and “see you at the party tomorrow” (i.e. the secret meeting will be tomorrow). Cryptography is so much more than just making your messages look like random characters, hell, using AI it’s very possible to have it write a text that uses all of the random letters on a gpg encrypted message in a specific way that others can decrypt, but since hose are still random characters it’s impossible to know there’s a message there.


  • Single messages can be hidden in random conversations

    That’s all it takes, cryptographic communication is a list of single messages, if you can pass one without being detected you’re done.

    If network access is only allowed for bootlocked phones, how would you send those messages but by typing them by hand?

    First of all that is impossible, TCP/IP is an open protocol, you can build your own small computer and connect it to a network. But let’s for a moment assume this was possible, you can encrypt/decrypt messages with an offline machine and send them to the online one by any number of means, e.g. Build a QR code and scan it with your phone.

    That’s useful for activists but destroys any ability to organise a movement that needs to recruit followers.

    A movement that needs to recruit followers won’t encrypt their messages since they need people to be able to read them. They could use public key encryption to ensure that people could send messages to them and they can sign messages, but encrypting the messages is pointless. You only encrypt messages when you trust the other party, otherwise anyone could intercept and encryption is pointless.



  • You do know that cryptography predates computers right? Anything that can send text can be used to send encrypted messages, don’t believe me? Here you go:

    -----BEGIN PGP MESSAGE-----
    hQGMA8yC6PUxUgJ0AQv/bN6XNyCbXByubaxT9SrBIg+qrvJFT8Qp5c8m4IWtt80s
    Ugm3H4cWleXFxhQkq8THI2VnXdyNDGFlhpOB0eTeVpXkKlwlWF/cjPV3pCmKnv86
    xOGevoKU4Qb0IPN/MAugHHbGPpnPTjH9Mj6WMMA4UwwmPcGvposvpMDrvkbKE4xf
    RYj1o9EwGcqcMW0IEzXoX2g2ViZ2qbJGfkTBqm1+SR7uIKet/00MrG6uSW5jv1Hd
    a6lyNqu4kiYSHGtQWlLypJDZLe1lbKVu7FKpiE3ZiA7Lt8b4eb8kqdfFzwCZv1L/
    kwQbYB+rc88SdwSsYFATV7+hytyyJuZf2WazKe7NzUf8EVkia+I+/WHuuBFzAt6I
    2+rEDVZE9MDnwPJkuFKUAL42M9B5UIyKKDDfgbnxiVX9P5MIZTFNWU4d7r75teQT
    sPx9gS8BrDggXuC5QjhuyWMQStdFpvh/qtIQPL+XK57X5bKPmKNHGloSV+VjcMvm
    WFnpx3Vj99EwzN7XPYfx0ukBfDJrxZUZEls7y5IdlG6pczxd1yqIgrahKVe8PZrj
    chH8oT2rAyxqYh0k3ks2GKuuuGI8ICp50d7CsDhexc3Htao+qszIxLk4Jd7VZkkg
    rV9oR34r8Z4WLybhWA10wH4FRXfIIppCwocm03wiKUNRadeLLXsnlPGgdiWMjlN8
    1JAoYXTMyCWcjM+NFRf4+nCb3Az/Fn7BbtXJU3UcqdBwoCEZZ2sObY3Jy+rLEBYb
    NofoNHS2iLZlihdf4kKp8UfwqzQ2bHdSN4r28SVZv+bTnGilH/FGGoU2fkfPPux6
    4q/hwtRRryBTgaGk+LqExDXXXBnM+pwjeVZepzEOcUwbTD3E7sBOD7ETW6GvpRQZ
    nrcaVeH5YcbBq5QtMXP6WUcDas5JHld+Us8wFOctz5t7IGUwHKZ8Clsk+dfWuoK5
    X9eaFCGdfy/xuL8CZ1X99oVO8BATekRaZcNYmWdopf1P339qw0mDusF7r5q3YynZ
    HqylFuIro0GK4xorABpErnSzyP5BQMacE5wI5XDWZbkWpocYpNXetl3ZSN+FhW4m
    Xa+LVKKZuGxC7lBYlAbzCFQbSXOrdCD6YTG6D1cD6hd3PjxRVl3wpcCdzo5YFISW
    +P/XtQe/SV8ZnkN+z+O9Iuu9ajQ/dNL3HZ+y12KBxQDNErKoApDBfEqBgOqj7t8r
    RS9CmP2p0UVZThh440FPkJOVN4lml2AxWuMCXJqacu83y0px0lr9Y+0gn3I3Odej
    rg==
    =kS8o
    -----END PGP MESSAGE-----
    

    There’s no way you will be able to read the message above unless I give you the key for it. How would they stop me from sending that?

    Also, are they going to firewall my VPS? What about my personal server? What if we use text files on my personal server, using ssh keys to connect to it? There’s no way to block all cryptographed communication without blocking all communication.