• 0 Posts
  • 23 Comments
Joined 1 year ago
cake
Cake day: July 4th, 2023

help-circle
  • In mint I can right click in a folder and reopen the folder with elevated privileges. That’s my primary, I assumed it was standard but if it’s not common I guess it’s a cinnamon thing. If so, maybe cinnamon is the desktop of choice for avoiding the terminal.

    I didn’t do my full diligence to the samba GUI thing, apparently. That’s a good catch.

    To salvage my argument, yumex has a GUI and extends yum, so while the instructions expect the terminal, I think it’ll be optional.

    I still recommend it to nobody, but someone who set out to avoid the terminal doesn’t have to fail.

    yumex, pip-gui, and aptitude give yum, pip, and apt GUI’s, respectively, so most anything that expected the terminal should be doable without it. All it costs is a bunch of effort troubleshooting GUI things or finding out one doesn’t display error messages and logs them weirdly or whatever.


  • Well if i double-click a file I’ve made executable, it will ask if I’d like to run it, and most software will have a github or downloads page that will give you direct downloads to the software.

    In other words, I can successfully install things like a windows user, I just have to go the extra step to open the file’s properties and make it executable with the GUI first.

    Apt is faster, and it’s also faster to do a direct download, make it executable, then execute it in the terminal, too. But I CAN do it.

    Config files can be edited in the GUI text editor, it’s just slower.

    To test my claim and prove your third point, this link is the repository for a samba GUI, found at https://www.samba.org/samba/GUI/. Specifically, it’s SMB4K, the first one.

    Convenient? No. Would it update automatically? No. Do I want to do it this way, or recommend it? Still no. But it does function.





  • The more the code is used, the faster it ought to be. A function for an OS kernel shouldn’t be written in Python, but a calculator doesn’t need to be written in assembly, that kind of thing.

    I can’t really speak for Rust myself but to explain the comment, the performance gains of a language closer to assembly can be worth the headache of dealing with unsafe and harder to debug languages.

    Linux, for instance, uses some assembly for the parts of it that need to be blazing fast. Confirming assembly code as bug-free, no leaks, all that, is just worth the performance sometimes.

    But yeah I dunno in what cases rust is faster than C/C++.


  • According to The arch wiki, x11vnc operates differently than some other servers and is not capable of going headless. You’d need the dummy plug.

    On that same page, though, it lists the alternative to x11vnc as Xvnc, and links to TigerVNC which is capable of going headless, and has an example config for going headless.

    I haven’t tested tigerVNC specifically, but it’s known, so I expect this is the solution to your problem.





  • Possibly. I’m not a big crypto guy, but it’s my understanding that any kind of transaction has a chance of being repeated. If there were a bad actor, and that bad actor used a VPN to swap identities, he could narrow this down considerably and weaken encryption. My code is as dumb as it gets, willing to consider 1 as a valid encryption key, but smarter code would be a lot more efficient.

    On top of that, you wanted this minimum code to run on A’s computer. If you do not trust A, then you’ve given a potential bad actor a program that could be decompiled to unencrypt your keys.

    It sounds to me like in your current state, you need to trust A before you do this operation, and if you do, you can just share an unencrypted B.


  • If A can run this program at will and it determines the minimum value, it’s O(log(n)) to determine what B is, even with perfect encryption, by using arbitrary values of A.

    INT X = MAX INT PREV_X = 0 BOOL B_IS_MIN = True

    While (X != PREV_X){

    PREV_X = X B_IS_MIN = Encrypted_Min(X,B)

    If(B_IS_MIN), X = X/2 If(!B_IS_MIN), X = X*1.5

    }

    Unless I’ve made a typo, this psuedocode will step to B in log time, and will break the while loop once it’s found, even if the user has no way to know the value of B besides the minimum.




  • I used a pi 3 to host a Foundry server (TTRPG software).

    I use Docker to simplify things, since I run two instances of it. Simple port forwarding setup within the docker container. the main reason I used a pi instead of my computer is so my players could access their dnd stuff all the time.

    I stopped because I switched ISPs and they won’t let me port-forward. My vpn supports it but the latency isn’t ideal. I host the same thing through a cheap server now.





  • Mozilla still has terms and conditions, so there’s still a relationship, and still a liability for them letting a customer misuse their browser, even if they don’t keep data on everyone.

    While I absolutely agree it’s ridiculous, as I read it, it would also apply to self-hosted software and things like thunderbird that are technically a browser.

    Still, I expect enforcement to really only care about “real” browsers, not one user and their own thing or someone using Thunderbird to browse the web. France (and most other governments) have shown multiple times that they don’t really look into the how they’d do these things before they try to make it law and it’d be a mess.

    As per the article this post linked, this would definitely be a new precedent, browsers have never been responsible for this content, and whatever actually happens is up in the air. I’m mostly talking worst-case scenario. It’s entirely possible some other business or consumer protection law makes this unenforceable, or any number of other situations, but since the French government decides how unreasonable they’re gonna be, that’s all up to them. Maybe they crusade against Firefox, maybe they give up when they realize there’s only so much to do without drafting even more, and maybe they do go after everyone, including thunderbird or any other app that opens a webpage. Probably just ones that navigate to the illegal webpages though.

    Still, a measure that’s completely defeated by a VPN, unless they add all of them to their illegal pages.


  • Making something available when it’s not legal to do so is still a crime. Mozilla can’t put the burden of “Is this illegal?” on the downloader. On top of that, with the specific nature of this law, they’ll likely get added to this blocked list.

    “For research” changes nothing, there isn’t an exception for research in the French law (as far as I know, at least).

    Nothing would stop a French person from taking extra steps to circumvent the law, so it’s true that it could be gotten around with a VPN or peer-to-peer sharing of the installer, and Mozilla isn’t liable for that, but also that would still dramatically reduce Firefox installs in France. It isn’t really a good solution for Firefox to need the same steps as piracy for people to access it.

    Firefox not needing user accounts isn’t that relevant, because it’s the distribution of illegal software that will be acted upon.

    While it’s true that they wouldn’t necessarily have to pay a French fine, most large companies have assets in a lot of nations. For Mozilla, this could be people that translate the browser to French, who may have office space or supplies, and the French government could seize Mozilla’s French assets, which also impacts their other projects like Thunderbird.

    A search tells me they do have such an office in Paris which would be threatened by their noncompliance, which does include just telling French people it’s illegal but letting them do it anyway.