

I use SpamAssassin. It’s fine, but definitely needs training. I might look into migrating to rspamd as it seems better, but I don’t have time atm.


I use SpamAssassin. It’s fine, but definitely needs training. I might look into migrating to rspamd as it seems better, but I don’t have time atm.
The key was published in the files. It’s not suspicious to use the key given that it’s public info; it’s not illegal to read the released files.
I think the point of the reddit screenshot is to show what Windows users are putting up with, not to share the meme itself.


This is just an archive. No different from using the wayback machine or any other archive of web content.
10 years old is 2016. That’s not that old. I still have multiple devices from 2017 going strong, and they don’t feel old.
That’s why you don’t keep clothes if you wore them while committing a crime. Burn them.


So it mirrors repos before they go down? I think I get it if that’s the case; I thought it was just a host for “lost” software/source code in which case if you have a copy you can upload it to any software forge (if permitted by the licence). But if it’s meant to contain all software that currently exists, even if it shows no sign of disappearing, that makes more sense.


My point is that you don’t need a separate website for this; you can use existing software forge software and websites.


I don’t think it does address the question. In order to archive source code, you need to have the source code in the first place, ie you can’t archive truly lost source code. If you have the source code, you can upload it to any software forge.


That’s cool but is it necessary? If the licence permits redistribution then anyone can just upload to an existing software forge like Codeberg etc


How do you like your carrots? Whole, chopped in a certain way?


I do actually not find buffalo flavoured things (I don’t eat buffalo wings but I do buffalo cauliflower & tofu) spicy. And yeah I like to add hot sauce to foods that are not already spicy, but if they are already spicy I don’t add hot sauce.
I don’t think my spice tolerance is crazy tbh. I’ve definitely eaten things that were too spicy for me. I tried the Buldak 2× spicy and found it nice but once I got to the end of it I was struggling. Still managed to finish it though.
Hot sauces are very variable in spice levels imo. Most of them I don’t find spicy at all, but some of them are so spicy that even adding a little bit to my food has ruined it before.
Is there something genetically different with people who enjoy this?
Probably. My parents are from a place known for their love of spice, though I mostly grew up in places that were very conservative on spice.
Get a carbon monoxide detector. Maybe that?


The short arms thing is real as fuck. I’m 5’1 and am constantly inconvenienced by how short my arms are (elbows don’t reach armrests, can’t reach the back of the cupboard, can’t reach the corner of the kitchen countertop, etc). I think in a fight with a taller person they would have the advantage: faster due to longer legs and longer range arm reach.


Use trash-put and trash-cli.


Yeah. It looks like a lot of the BSDs might be the way to go if for whatever reason you want/need to stay on X11. I’ve been trying out OpenBSD on one of my machines, and following for quite a lot longer, and progress on Wayland support seems to be relatively slow over there.


I imagine that some graphical environments will always support X11. I’d suggest you switch to one of those. If someone forked Plasma, it’d have far fewer eyes on it than something like i3. I assume XFCE will continue to support X11 for a while too since it’s only just working on Wayland support. Maybe some of the less common DEs like MATE are worth looking into?
Security and difference of design philosophy. I run OpenBSD on one of my machines and I enjoy it. It has better software availability than I expected and it feels like a neater, more minimal system than Linuxes. Definitely falls into the “hobbyist computing” category rather than something I’d recommend for a practical use case, but it’s fun.
I think it’s just clickbait/being hyperbolic. I imagine the videos themselves are just normal tutorials or intros to the topic.
If you can’t feasibly vet the code yourself (I think it is feasible for things like scripts and other small projects) and the star count is low/it’s not already well known and trusted, probably try running in a VM first and look out for signs of it doing things it shouldn’t, e.g. if it’s sending HTTP requests to the internet despite it being a program that should be completely offline. Using things like AppArmor and SELinux to prevent programs from doing things they shouldn’t need to do is also good practice.
Also, the tool itself may be low star count, but is the developer known at all? Someone with any kind of a reputation wouldn’t risk putting malware on their profile.
I suppose you could also look at the list of dependencies of the program. Is it using any libraries that don’t make sense? e.g. with the above, is there some kind of HTTP request library being used for a program that shouldn’t need to access the internet at all?
I think generally the risk is quite low as the author would be hiding their malware in plain sight if the source code is available. They’d have to bet on literally nobody checking. Which is fine for very obscure projects, but if you want your malware to spread, you want a good number of people to use it, at which point someone would presumably look at the code and notice it’s malware.