bluespin

joined 1 year ago
[–] bluespin@lemmy.world 8 points 1 week ago (4 children)

I wanted to love their socks, but the way they fit my feet is just awful. Tight in the wrong places and loose in others. Curious if others have the same experience

[–] bluespin@lemmy.world 11 points 1 week ago

They aren't referring to entertainment options

[–] bluespin@lemmy.world 21 points 1 week ago (2 children)

It's cultural. If you've grown up eating it with everything, it's like a comfort food

[–] bluespin@lemmy.world 21 points 1 month ago (4 children)

The owner of the platform blatantly and openly supporting one side is new. We used to call that election interference

[–] bluespin@lemmy.world 2 points 1 month ago

I have one that takes d cell batteries and works great. Have used others that barely function, though

[–] bluespin@lemmy.world 3 points 1 month ago

It's very similar to the first, but with most of the mechanics expanded and (slightly) polished. Exploration is the same, with some enemies requiring specific gear to beat, although magic-only builds are more viable with each magic school received more unique interactions. Armor is still the single most important thing you'll equip. Great game overall, but your gripe with the first will also apply to the second.

[–] bluespin@lemmy.world 4 points 1 month ago (2 children)

Have been having a ton of fun with Magic Research 2

[–] bluespin@lemmy.world 6 points 2 months ago

Major respect for being open to correction. Godspeed on your grammar journey

[–] bluespin@lemmy.world 19 points 2 months ago (2 children)

Each of those "your"s should've been "you're"

[–] bluespin@lemmy.world 2 points 2 months ago (1 children)

Fair enough. Every service I run depends on encrypted data, so starting the machine without decrypting isn't worthwhile in my case. I have to decrypt to get everything back up after power loss anyway.

Main advantages I'm aware of for full disc encryption are encrypted swap and system config. Overkill for some use cases so YMMV, but wanting to point out that decrypting at boot can be done.

[–] bluespin@lemmy.world 1 points 2 months ago (3 children)

I may be missing something in your use case. As long as you have the port forwarded you can decrypt from anywhere. Use pub key auth and you're good to go

[–] bluespin@lemmy.world 2 points 2 months ago (5 children)

You can decrypt via ssh at boot. I used dropbear to accomplish that on my machine

view more: next ›