Nothing better than a properly formatted data file.
Self hosting teaches you this
towerful
The issue is big companies.
Google/Amazon/Microsoft can now fork sudo-rs and not have to upstream their changes.
So then Google fixes an exploit for their sudo-rs implementation (or whatever software) and patch it under a different licence. Now the upstream, Amazon and Microsoft forks don't know if that exploit is also in their implementation, is related to their implementation, or how to potentially fix it.
The only way it works is if sudo-rs is implementing new features in a way that it benefits Google/Amazon/Microsoft to contribute back to upstream so they don't have to keep merging/fixing their exploit code.
For something as stable as sudo, it actually benefits Google/Microsoft/Amazon NOT to share their changes.
If they are rolling and recommending their own distros (which I'm sure they already are) that include their forked changes, then they can say that their software is more secure than other brands.
It benefits them for their competition to suffer security breaches, especially if they trace back to these kinda changes.
Which makes everything worse for everyone.
Your threat assessment is way off.
So, you import a phone. What sim do you use? Where do you use it? When do you use it? Who do you contact with it?
All of that is more valuable and easier to get for the police than some sort of modification of firmware or platform as it passes through customs.
If in doubt, flash your own firmware.
If this is actually a threat assessment to you, asking on Lemmy is the wrong place. You need people with the same experience that an entire country has at their disposal.
If it's a concern as opposed to an actual threat, buy some 2nd hand phones from random places and buy some prepaid sims (ideally via smurfs or black market means). And be aware of how you use them
Yup, fair point.
In my opinion, there is a difference between sharing your experience and pushing a narrative.
Ideally, viewers/readers would consider the perspective and draw their own conclusions instead of wholey adopting the celebrities view point.
The commands you used to start the docker containers, or the docker compose contents.
That's what dictates how much "power" a docker container has
People sharing their experience with a medical condition is huge. Especially if they have the reach to inform thousands.
Everyone has the right to privacy, and that's fine if that's the path they take. But sharing their story might get a few people to reconsider symptoms and seek/get help.
Yeh, I commented before I realised the community.
Re-using is absolutely better
And if you actually want something new, get an n100 minipc.
They are cheap and punchy
The whole "well, it's already broken: what's the worst I can do?" is such a liberating position to be in.
Stop trusting VPS providers! Run your own servers at home!
Unless you infiltrate someone else's network, the endpoint your basic VPN connects to can always be traced back to you.
So, either you trust a VPN company doesn't hold logs and try to hide within all the other traffic.
Or you host your own VPN on a VPS knowing you haven't set up any logging (and hope that your VPS hasn't been tampered with), but then have a static IP that comes back to your identity.
Is "End of Life" being used correctly here?
EOL, to me, means no longer supported and no further software updates.
Which makes the 3 years lifespan absolutely abysmal, and would make me not even consider an Intel GPU.
It sounds/reads more like Intel is discontinuing them as opposed to EOLing them. Which isn't so bad.
Computer/laptops WiFi card is dead. Can't connect to an android hotspot if your WiFi isn't working.
Thus, usb tethering. It's a wire, doesn't need a WiFi card. And the android device can then share ITS WiFi/Data connection through the USB cable