@mirabilos @scuttlebutt The more modern ones do speak 4G. The difference between 4G and 5G is data bandwidth, which for a dumbphone is only relevant if you want to turn it into a mobile hotspot (but then you can buy a device specifically for that). For phone calls, a 4G dumbphone should be good for years to come.
Of course that doesn't answer the reliability, but then that's probably just another case of planned obsolescence, not much I can help with that...
Of course that doesn't answer the reliability, but then that's probably just another case of planned obsolescence, not much I can help with that...
@mirabilos
They do still make dumbphones. It takes a bit of looking, but they're there.
https://www.bestproducts.com/tech/electronics/g60343009/best-dumb-phones/ has a few examples (I have nothing to do with this site, just found it by a simple web search)
@scuttlebutt
They do still make dumbphones. It takes a bit of looking, but they're there.
https://www.bestproducts.com/tech/electronics/g60343009/best-dumb-phones/ has a few examples (I have nothing to do with this site, just found it by a simple web search)
@scuttlebutt
@linuxallday
X11, because awesomewm does not work with Wayland ๐คท
X11, because awesomewm does not work with Wayland ๐คท
@disaster2life
Always ๐
I mean, even if you don't do pepperoni, there's still tomatoes and olives ๐คท
Always ๐
I mean, even if you don't do pepperoni, there's still tomatoes and olives ๐คท
Unpopular opinion:
There is nothing that screams more 'pizza' than pepperoni.
Everything else is just 'I'm trying but I can't quite get there'
There is nothing that screams more 'pizza' than pepperoni.
Everything else is just 'I'm trying but I can't quite get there'
@rrrrroseazerty
Which jurisdiction?
I know someone who wrote a book on that, from Belgium. Dunno whether that's helpful though.
Which jurisdiction?
I know someone who wrote a book on that, from Belgium. Dunno whether that's helpful though.
@aeva
I should add:
Obviously a part of why it only took half a day was because I didn't care about having a smooth, polished experience. I could have spent a lot more time fine tuning the config.
It served its purpose, which was to get a laugh from the guy, and it was 100% functional from the physical CD which we gave him at the goodbye party, but it was a bit rough around the edges. With a few more days I could have fixed that, but there was no point, obviously.
I should add:
Obviously a part of why it only took half a day was because I didn't care about having a smooth, polished experience. I could have spent a lot more time fine tuning the config.
It served its purpose, which was to get a laugh from the guy, and it was 100% functional from the physical CD which we gave him at the goodbye party, but it was a bit rough around the edges. With a few more days I could have fixed that, but there was no point, obviously.
@aeva
Debian has a tool called 'live-build' it's used for creating the official live images and can be configured quite easily for creating custom ones.
I once used it to create a prank 'distribution' as a gift for someone who was leaving a job and which did all the things he had been railing about what we shouldn't do in our software for Linux distributions. Took me half a day to do, most of that was writing the script that it would start at boot time.
Debian has a tool called 'live-build' it's used for creating the official live images and can be configured quite easily for creating custom ones.
I once used it to create a prank 'distribution' as a gift for someone who was leaving a job and which did all the things he had been railing about what we shouldn't do in our software for Linux distributions. Took me half a day to do, most of that was writing the script that it would start at boot time.
re: password manager PSA (keepassxc)
@Ember
OK. I see what you mean. It's a risk, though I don't see it as likely as you seem to think.
IME, reviewing code is faster than writing it from scratch. This applies whether the code is generated or submitted. Whether that happens is the more interesting question, rather than whether LLMs are used, IMO
Corruption bugs are always possible, LLMs may increase the risk but they don't introduce it. You need backups of your vault regardless.
OK. I see what you mean. It's a risk, though I don't see it as likely as you seem to think.
IME, reviewing code is faster than writing it from scratch. This applies whether the code is generated or submitted. Whether that happens is the more interesting question, rather than whether LLMs are used, IMO
Corruption bugs are always possible, LLMs may increase the risk but they don't introduce it. You need backups of your vault regardless.
password manager PSA (keepassxc)
@Ember
How is it different from allowing pull requests from rando's on the internet?
Using LLMs for coding has some ecological, legal, and ethical repercussions, but as long as you review the generated code properly the same way you're supposed to review code from 3rd parties, *security* should not be an issue, in my view.
Am I missing something?
How is it different from allowing pull requests from rando's on the internet?
Using LLMs for coding has some ecological, legal, and ethical repercussions, but as long as you review the generated code properly the same way you're supposed to review code from 3rd parties, *security* should not be an issue, in my view.
Am I missing something?
@jelmer
Or that, yes
Or that, yes
@zorinlynx
Any ideas of what it does?
Any ideas of what it does?
@freequaybuoy
Some of them will, yes. Not all of them. This will still be a positive outcome.
Some of them will, yes. Not all of them. This will still be a positive outcome.
@mirabilos
Heh, okay. Thanks anyway! ๐
Heh, okay. Thanks anyway! ๐
@foone
... Except that ed25519 isn't ECDSA, it's EdDSA.
Similar enough that it doesn't really matter for the above advice, but still.
... Except that ed25519 isn't ECDSA, it's EdDSA.
Similar enough that it doesn't really matter for the above advice, but still.
@foone
Anything ECDSA will do really, though some curves are better than others.
Personally I have an RSA key for annoying old machines and a NIST P-384 key for everything else, but ed25519 is pretty popular too and in the same ball park.
Some people don't like the NIST curves because the NSA muddled with Dual_EC_DRBG, but that incident was suspected before confirmed by Snowden, and no similar suspicions exist for the NIST curves.
Anything ECDSA will do really, though some curves are better than others.
Personally I have an RSA key for annoying old machines and a NIST P-384 key for everything else, but ed25519 is pretty popular too and in the same ball park.
Some people don't like the NIST curves because the NSA muddled with Dual_EC_DRBG, but that incident was suspected before confirmed by Snowden, and no similar suspicions exist for the NIST curves.
@mirabilos
When you mention something like that, it's good style to link to an example for those of us that are interested but lazy ๐
When you mention something like that, it's good style to link to an example for those of us that are interested but lazy ๐