Arguably Ghostbusters (1984) is prior art for throwing a capsule and capturing 🤣
Edit: they even had a video game with the ghost trap.
Arguably Ghostbusters (1984) is prior art for throwing a capsule and capturing 🤣
Edit: they even had a video game with the ghost trap.
I run Gentoo as my main distro, and have for a couple years now. It’s a pretty stable rolling release (IMO more stable than Arch), and since you’re already an advanced user, the experience should be pretty rewarding!
The wiki is great, and the installation handbook is top notch.
You get to control exactly what features each package is compiled with, so no bloat at all.
KDE 6 just landed too!
Shit, that’s where my sex drive went. Can I have it back please?
Bah, real power users only need a magnet and a pin.
Linux is whatever the Linux Mark Institute says it is.
The risk of mis-ordering your layers is a security issue.
There are two ways to layer a VPN and tor:
In the first option, you gain little. Tor already encrypts your traffic, so your ISP can’t see inside them. Technically, Tor over a VPN hides the fact that you’re using Tor from your ISP, but Tor’s snowflake does something similar if you need that.
In the second option, you’re revealing your VPN account information, which could theoretically be associated back to you. Tor adds nothing over just a VPN in this case.
Don’t mix tor plus VPN.
If you’re using tor browser without tor for some reason, carry on.
It’s FOSS. It’s pretty normal for it to be a passion project or a community effort.
Let me preface this by saying I don’t see the value of 99% of NFTs either, but it is technically possible to make one that stores the image on the blockchain or on IPFS. Most don’t, obviously, but it is possible.
I am aware. What processing is only possible in the cloud, and not locally?
Edit: My apologies, I didn’t realize you weren’t the same person I originally replied to. Please disregard!
Until homeomorphic encryption becomes a thing, cloud can’t be secure or private.
Why do you need homeomorphic encryption? Isn’t client-side encryption good enough for most use cases?
I’m still pretty happy with my Miele vacuum from 2018, and they seem to promise spare parts for 15 years.
I bet my model is nothing compared to what they were 20 years ago though 🤣
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
I’d like Gentoo ebuilds to run in a fully isolated namespace/container with only the dependencies explicitly enabled by portage configuration. Something like a mix of nix but with the ebuild syntax.
Yes, this. Don’t put your whole home directory in git.
There are dozens of us!