Melody Fwygon

  • 0 Posts
  • 45 Comments
Joined 1 year ago
cake
Cake day: June 1st, 2023

help-circle


  • Microsoft is stupid, someone high up is getting greedy or desperate.

    Patching HWID is annoying and doesn’t stop piracy. In fact it will break a lot of legacy systems in general; which is probably what they intended and why they are guilty of corporate greed in this case.

    I hate Micro$hit but I am REQUIRED to use Windows by too many stupid fucking different idiots, apps, and games to count. Linux is still not there yet for me usability-wise; though it probably is still improving.

    No; I will never accept that CLI is an acceptable end-user implementation; GUI is required; along with ease of use and the polish that comes with it. I don’t mind CLI interfaces; but I do feel they’re not user-friendly enough usually. They REQUIRE YOU to LEARN a few things to get used to them; which is the opposite of an intuitive interface.

    NOTE: I am very FLOSS accepting when it meets my needs; but I will not hold back criticism. Do not try to shout me down. You will always be wrong. Windows is factually more user-friendly and application compatibility diverse than Linux.

    I genuinely hope that Linux finds more ways to 100% match Windows functionally without forcing the user to compromise. We need to punish Microsoft for all these years of monopoly holding and reclaim computing more effectively.




  • Lending the “copy of Your Copy” is arguably not always personal use. The law explicitly only authorizes copies of your copy if those copies are “at rest” for “archival” purposes. I only ignore the distinction that this rule is only for computer software because I view digital video/audio data files as computer software itself. It’s just a standardized format that tells an application what to draw and present on the screen and/or what sounds to make.

    If you’re not going to abuse the mechanic and only lend out fewer copies of your copies than you can count on one hand…then sure, knock yourself out. I don’t think the law is ever going to be robustly enforced enough to seek you out specifically for doing this. Personally though; I don’t think doing this passes muster under the expected fair and personal use unless you’re loaning said copy to someone you live with.


  • When you purchase a physical copy of a movie in general; you obtain and retain the right to “copy your copy” and “use it strictly for personal use” ad infinitum.

    So yes, it’s completely 💯% ethical piracy to pirate titles you already paid for but found the format to be lacking. You don’t owe filmmakers a second purchase for a new or better format. Don’t bother getting into the weeds over per-screen or per-head copies either; you don’t owe them that either. Just don’t screen a film for more than 3-5 people outside of your immediate household family who are not related to you by blood or name and you’ll probably never run into Copyright Lawsuits… because it’ll never be worth their time to bother.

    Pirate away happily matey. Don’t let people fool you into thinking you are more or less ethical in your piracy than what you yourself believes is ethical or unethical. You decide how you will and want to pirate because a pirate is free.




  • They can’t detect if you boot into Linux; but they can detect the presence of external storage devices and scan their contents. It is best if you do not plug in your LiveUSBs or disks while the system is [ONLINE] (Meaning while the device is booted into any default operating system)

    Chances are if your hardware has not changed; the capabilities have also not changed. I do however have a few tips for you:

    • DO NOT MODIFY THE DEFAULT OS OR SPYWARE! It sounds like they are now monitoring the files for the software and will now notice if you have disabled it; as your machine will probably be sending heartbeats to a centralized server. You must accept this spyware when operating the machine as intended to interface with your school environment; but you can limit yourself to submitting schoolwork only on it
    • Boot into a Live(CD/USB/Media) environment of Linux with Persistence. Google it. They can’t detect this without BIOS tampering.
    • Do Not plug your Live Media into the system when booted into it’s default mode. Your drives are probably being scanned.
    • Keep a separate media storage device for storing your documents and such.
    • You can boot into your Linux key to work on school things and browse the web privately. Remember though that you are [OFFLINE] and may be unable to access the school network and will be required to save your work on a different piece of media, shut back down and boot into the default OS again to submit your work.
    • You may be unable to complete assignments in Linux [OFFLINE] that require you to respond to questions interactively [ONLINE] or otherwise require that you be interactively [ONLINE].






  • The trouble with Rooting is trust. You are placing trust in a number of apps and software components to not abuse that access.

    If you limit apps that are granted root access and make sure only safe apps are granted access; then all should be well. But don’t blame anyone if you damage your device.

    This is why Rooting your device should ideally only be done after any manufacturer, OEM and carrier warranty has expired. It has benefits; but so too do the guardrails we program into modern operating systems. Rooting your device can be akin to bowling without the bumpers preventing your ball from falling into the gutter.


  • “Rooting” is literally the act of taking control of the “root” user profile. This is the same as SYSTEM on Windows and even “root” on a Macintosh. As the names imply; the “root” user is the first user. When you are “root”; there are no rules about what you can run. You are essentially as powerful as the operating system itself.

    But that omnipotent power does come with a great responsibility. With root access you can literally order the Operating System or even the hardware to kill itself; deleting important files or altering core code is not going to be met with resistance. Sometimes it will even comply with your commands without even checking if they are valid.

    Without appropriate understanding of what you are commanding your device to do…Yes, rooting can be dangerous. However; if you do know exactly what you are doing, or are following instructions that are well known to work exactly how you intended them to that were written by someone who does know what they are doing…then Yes, Rooting can be Safe




  • Melody Fwygon@lemmy.onetoPrivacy@lemmy.mlPay with Palm
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    Who needs an NFC chip when you can just place a nail shaped NFC sticker on them and gel paint over them? We don’t need implantables; those could get copied anyways and cause the need for unnecessary surgeries to replace them as well.

    Buy the tags; apply them to your nails and paint them any color you want; pair them to your phone and use appropriate username + password + 2FA + Fingerprint combos to authenticate to your financial institution.

    Lost a nail? No big deal. The tags don’t carry financial data; they just provide a URI to the merchant; which can ping your phone/smartwatch and ensure that you are:

    • Present at the location.
    • Not too far away from pay terminal.
    • Have not signaled to your devices you are under duress. (Spoken keyword and/or excessively stressed biosigns)
    • Have not blocked spending by tap.