

I host a lemmy instance.
Calculator Manipulator
I host a lemmy instance.
I’m trying to use simplex, mainly for the instance’s chat. 2 things to say:
Will try to squeeze in a 1v4 game of aoe4 against easy bots. Assuming kid goes to sleep early enough :)
Would love to get better to increase the difficulty, but a few matches a week just isn’t enough 😮💨
Much more politics, much more to the left, most people seem to actively look for reasons to get offended.
Welcome aboard!
I did jump onto Gentoo ship chasing performance, but stayed because of USE flags.
What’s the movie?
Slackware or Gentoo if you hate yourself
Hey!
Only commenting on the orc part, but that’s what russians call themselves.
Don’t know, been rolling with Gentoo for some time now.
I wouldn’t trust “out of the box” support anyway as that would imply trusting microsoft keys.
I’ve not read all of it, but if you’re referring to the stuff at the beginning - none of those limitations apply to 5700xt.
If you mean something else - then, naturally, I would ask if it actually affects your media in the first place. It might, but I wouldn’t expect that.
Podcini, got it on f-droid. Does what it says on the tin!
It is a good thing!
I mean if you’re keeping the GPU - you can just set jellyfin to use VAAPI and utilise the gpu that way.
Do you know how that works? Is it something like Ubuntu where Canonical uses some sort of chain from Microsoft or do you have to embed the cert they provide into UEFI yourself?
Yes, failing to safeguard keys is fatal, but that applies to everything. But if fs you’re storing keys on is behind luks and they’re readable by root only - you’re as safe enough. There’re also LSMs like selinux that can increase the complexity of attack.
I don’t know about nitrokey specifically, but TPM is an option (not good enough, imo) and a simple luks encrypted usb. You could get some convenience by storing the key to unlock it somewhere on the encrypted root.
In general - you cannot stop a targeted attack no matter what, but staying safe from all the automated ones is doable.
No it can’t. You’re still thinking about github and its built in “forking” mechanism.
I was looking into it, but the more I learn about it the more I’m leaning towards something else - misskey, akkoma, etc. Same function, but, supposedly, fewer headaches hosting.