[-] [email protected] 3 points 23 hours ago

in my understanding offset is technically the "relative index", or how much you have to go further

[-] [email protected] 2 points 1 day ago

oh, it's a tool! I see

[-] [email protected] 1 points 1 day ago

People will say you should be afraid of the batteries exploding or venting. I’m honestly not too concerned, but be sure to check them maybe once or twice a year.

I'm more concerned with the power supply. Laptop power supplies often heat up a lot.

[-] [email protected] 1 points 1 day ago

why does it look like bash?

[-] [email protected] 5 points 1 day ago

1, 90 or 9 minutes, in any case it needs a speaker to be watched, and often mobile data cap when not at home.

and a fair amount of rewinds for a lot of non-native english ~~speakers~~ knowers

[-] [email protected] 2 points 2 days ago

why in this community, though?

[-] [email protected] 8 points 2 days ago

you aren't. to me this is just PR

[-] [email protected] 4 points 2 days ago

that's only a few files out of the 153

[-] [email protected] 3 points 4 days ago

I'll try this, thanks. but to fill in some missing context from my part, this is what I have been experiencing for the little more than a year I'm running an I2P router.

[-] [email protected] 4 points 4 days ago

the catch is that you don't own that camera, only the manufacturer does. besides requiring an account and a connection to china to be able to use it, they have access to both your network, and to the camera feed. they'll use the network info to gather info about you, and the camera feed to train their face and gait recognition AIs, possibly also for intelligence

[-] [email protected] 17 points 5 days ago

as a node

  • you are unable to see the contents of traffic you route thanks to layered encryption
  • you wont be routing traffic to the internet (unless you specifically set it up), but only to other I2P routers
[-] [email protected] 9 points 5 days ago

I know nothing about seedboxes, but on a computer you can point multiple torrents to the same directory. If you make it read-only, by permission or mount options or whatever, the torrent client can't even fuck it up

18
submitted 10 months ago by [email protected] to c/[email protected]

Introduction of the first Managing Director

21
submitted 1 year ago by [email protected] to c/[email protected]

I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/.

Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.

I have checked the version of gem by running gem --version. This is on a Debian Bullseye based distribution.

60
submitted 1 year ago by [email protected] to c/[email protected]

The video is a short documentary on Trusted Computing and what it means to us, the users.

If you like it and you are worried, please show it to others.
If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.

view more: next ›

ReversalHatchery

joined 1 year ago