Israel 'bulldozed bodies' of Palestinian it killed at Gaza aid sites into unmarked graves
Israel 'bulldozed bodies' of Palestinian it killed at Gaza aid sites into unmarked graves
A CNN investigation has revealed that Israeli soldiers bulldozed the bodies of Palestinians killed while trying to access humanitarian aid near the Zikim crossing into northern Gaza.Tamara Turki (Middle East Eye)
like this
☆ Yσɠƚԋσʂ ☆ likes this.
The Former Israeli Spies Overseeing US Government Cyber Security
Axonius is commonly described as an American company. While its headquarters and administrative functions are in New York, its founders, senior executives, and its primary financiers are all Israeli, and, critically, its software and engineering functions are based in Tel Aviv. Axonius has more than eight-hundred employees, and a search of LinkedIn profiles confirms that a majority of Axonius's engineers in Tel Aviv have a background in Israeli military intelligence.Perhaps none of this matters, and Axonius is simply indicative of the sleazy, symbiotic nature of the relationship between the US and its colonial outpost.
This would be a fair argument if it wasn't for Israel's long history of espionage in the United States. From recruiting Hollywood producers who ran front companies that stole nuclear technologies, to selling bugged software to foreign governments, spying (especially cyber spying), has been central to Israel's foreign policy. Robert Maxwell, the father of Ghislaine Maxwell, was a spy for Israel, and a significant amount of circumstantial evidence suggests Jeffrey Epstein was also an Israeli military intelligence asset. More recently, during Trump's first term, Israel planted miniature spying devices around the White House and other US government buildings in Washington DC to monitor US officials.
Arnon Milchan And Israel's Nuke Program
It seems he was no ordinary spy.Michael B Kelley (Business Insider)
Report: 20% of all US aid to Afghanistan was ‘wasted’
Report: 20% of all US aid to Afghanistan was ‘wasted’
The Special Inspector General for Afghanistan Reconstruction issued a scathing final analysisConnor Echols (Responsible Statecraft)
wasted
Putting on the "They Live" glasses
deliberately paid out to those complicit in the imperial occupation
United Nations paid $11M to Syrian security firm owned by Assad intelligence services, documents show
For over a decade, U.N. aid agencies poured millions into the company despite warnings from human rights advocates.
U.N. agencies “had no viable alternative and therefore proceeded to engage Shorouk despite the elevated risk profile,” the country team wrote to ICIJ. “Shorouk provided better value for money.”
Well okay then.
The US, UK, and Israeli imperialists already got what they wanted: Assad deposed by the moderate rebels1 that they’d funded & armed, so what’s the point of this smear campaign now? Why kick a dead horse? Just to jab at the UN for not dancing to their tune?
Many details of the Western propaganda and interference schemes in Syria are still unknown, locked in classified internal government and corporate documents. Yet the few leaks and investigative reports we have reveal an extensive, well-funded, years-long propaganda and disinformation warfare campaign waged first against the Syrian government but perhaps more intensely against Western publics. Through groups like the White Helmets and the media they produced, Western governments and corporations backed up their multi-billion-dollar effort to flood Syria with weapons and fighters with propaganda and civil society campaigns worth about a billion dollars. These facilitated rebel administrations on the ground and helped sell a simplified whitewashed narrative of the Syrian Civil War and build war fervor for Western intervention. This built off historical precedents, committed by the same people who engaged in similar campaigns in other Muslim majority countries.
- Salafi-Jihadist warlords ↩︎
Directing the Moderate Rebels: Syria as a Digital Age Crucible for Information and Propaganda Warfare
By Ben Arthur Thomason A decade into Syria’s catastrophe as one of the deadliest wars of the 21st century, we can take greater stock of its effects not just on geopolitics and Syria itself, but on imperial management strategies, information warfa…Ben Arthur Thomason (Hampton Institute)
A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip Code
Privacy stalwart Nicholas Merrill spent a decade fighting an FBI surveillance order. Now he wants to sell you phone service—without knowing almost anything about you.
Nicholas Merrill has spent his career fighting government surveillance. But he would really rather you didn’t call what he’s selling now a “burner phone.”
Yes, he dreams of a future where anyone in the US can get a working smartphone—complete with cellular coverage and data—without revealing their identity, even to the phone company. But to call such anonymous phones “burners” suggests that they’re for something illegal, shady, or at least subversive. The term calls to mind drug dealers or deep-throat confidential sources in parking garages.
With his new startup, Merrill says he instead wants to offer cellular service for your existing phone that makes near-total mobile privacy the permanent, boring default of daily life in the US. “We're not looking to cater to people doing bad things,” says Merrill. “We're trying to help people feel more comfortable living their normal lives, where they're not doing anything wrong, and not feel watched and exploited by giant surveillance and data mining operations. I think it’s not controversial to say the vast majority of people want that.”
That’s the thinking behind Phreeli, the phone carrier startup Merrill launched today, designed to be the most privacy-focused cellular provider available to Americans. Phreeli, as in, “speak freely,” aims to give its user a different sort of privacy from the kind that can be had with end-to-end encrypted texting and calling tools like Signal or WhatsApp. Those apps hide the content of conversations, or even, in Signal’s case, metadata like the identities of who is talking to whom. Phreeli instead wants to offer actual anonymity. It can’t help government agencies or data brokers obtain users’ identifying information because it has almost none to share. The only piece of information the company records about its users when they sign up for a Phreeli phone number is, in fact, a mere ZIP code. That’s the minimum personal data Merrill has determined his company is legally required to keep about its customers for tax purposes.
By asking users for almost no identifiable information, Merrill wants to protect them from one of the most intractable privacy problems in modern technology: Despite whatever surveillance-resistant communications apps you might use, phone carriers will always know which of their customers’ phones are connecting to which cell towers and when. Carriers have frequently handed that information over to data brokers willing to pay for it—or any FBI or ICE agent that demands it with a court order
Merrill has some firsthand experience with those demands. Starting in 2004, he fought a landmark, decade-plus legal battle against the FBI and the Department of Justice. As the owner of an internet service provider in the post-9/11 era, Merrill had received a secret order from the bureau to hand over data on a particular user—and he refused. After that, he spent another 15 years building and managing the Calyx Institute, a nonprofit that offers privacy tools like a snooping-resistant version of Android and a free VPN that collects no logs of its users’ activities. “Nick is somebody who is extremely principled and willing to take a stand for his principles,” says Cindy Cohn, who as executive director of the Electronic Frontier Foundation has led the group’s own decades-long fight against government surveillance. “He's careful and thoughtful, but also, at a certain level, kind of fearless.”
Nicholas Merrill with a copy of the National Security Letter he received from the FBI in 2004, ordering him to give up data on one of his customers. He refused, fought a decade-plus court battle—and won.
More recently, Merrill began to realize he had a chance to achieve a win against surveillance at a more fundamental level: by becoming the phone company. “I started to realize that if I controlled the mobile provider, there would be even more opportunities to create privacy for people,” Merrill says. “If we were able to set up our own network of cell towers globally, we can set the privacy policies of what those towers see and collect.”
Building or buying cell towers across the US for billions of dollars, of course, was not within the budget of Merrill’s dozen-person startup. So he’s created the next best thing: a so-called mobile virtual network operator, or MVNO, a kind of virtual phone carrier that pays one of the big, established ones—in Phreeli’s case, T-Mobile—to use its infrastructure.
The result is something like a cellular prophylactic. The towers are T-Mobile’s, but the contracts with users—and the decisions about what private data to require from them—are Phreeli’s. “You can't control the towers. But what can you do?” he says. “You can separate the personally identifiable information of a person from their activities on the phone system.”
Signing up a customer for phone service without knowing their name is, surprisingly, legal in all 50 states, Merrill says. Anonymously accepting money from users—with payment options other than envelopes of cash—presents more technical challenges. To that end, Phreeli has implemented a new encryption system it calls Double-Blind Armadillo, based on cutting-edge cryptographic protocols known as zero-knowledge proofs. Through a kind of mathematical sleight of hand, those crypto functions are capable of tasks like confirming that a certain phone has had its monthly service paid for, but without keeping any record that links a specific credit card number to that phone. Phreeli users can also pay their bills (or rather, prepay them, since Phreeli has no way to track down anonymous users who owe them money) with tough-to-trace cryptocurrency like Zcash or Monero.
Phreeli users can, however, choose to set their own dials for secrecy versus convenience. If they offer an email address at signup, they can more easily recover their account if their phone is lost. To get a SIM card, they can give their mailing address—which Merrill says Phreeli will promptly delete after the SIM ships—or they can download the digital equivalent known as an eSIM, even, if they choose, from a site Phreeli will host on the Tor anonymity network.
Phreeli’s “armadillo” analogy—the animal also serves as the mascot in its logo—is meant to capture this sliding scale of privacy that Phreeli offers its users: Armadillos always have a layer of armor, but they can choose whether to expose their vulnerable underbelly or curl into a fully protected ball.
Even if users choose the less paranoid side of that spectrum of options, Merrill argues, his company will still be significantly less surveillance-friendly than existing phone companies, which have long represented one of the weakest links in the tech world’s privacy protections. All major US cellular carriers comply, for instance, with law enforcement surveillance orders like “tower dumps” that hand over data to the government on every phone that connected to a particular cell tower during a certain time. They’ve also happily, repeatedly handed over your data to corporate interests: Last year the Federal Communications Commission fined AT&T, Verizon, and T-Mobile nearly $200 million for selling users’ personal information, including their locations, to data brokers. (AT&T’s fine was later overturned by an appeals court ruling intended to limit the FCC’s enforcement powers.) Many data brokers in turn sell the information to federal agencies, including ICE and other parts of the DHS, offering an all-too-easy end run around restrictions on those agencies’ domestic spying.
Phreeli doesn’t promise to be a surveillance panacea. Even if your cellular carrier isn’t tying your movements to your identity, the operating system of whatever phone you sign up with might be. Even your mobile apps can track you.
But for a startup seeking to be the country’s most privacy-focused mobile carrier, the bar is low. “The goal of this phone company I'm starting is to be more private than the three biggest phone carriers in the US. That’s the promise we’re going to massively overdeliver on,” says Merrill. “I don’t think there’s any way we can mess that up.”
Merrill’s not-entirely-voluntary decision to spend the last 20-plus years as a privacy diehard began with three pages of paper that arrived at his office on a February day in New York in 2004. An FBI agent knocked on the door of his small internet service provider firm called Calyx, headquartered in a warehouse space a block from the Holland Tunnel in Manhattan. When Merrill answered, he found an older man with parted white hair, dressed in a trench coat like a comic book G-man, who handed him an envelope.
Merrill opened it and read the letter while the agent waited. The first and second paragraphs told him he was hereby ordered to hand over virtually all information he possessed for one of his customers, identified by their email address, explaining that this demand was authorized by a law he’d later learn was part of the Patriot Act. The third paragraph informed him he couldn’t tell anyone he’d even received this letter—a gag order.
Then the agent departed without answering any of Merrill’s questions. He was left to decide what to do, entirely alone.
Merrill was struck immediately by the fact that the letter had no signature from a judge. He had in fact been handed a so-called National Security Letter, or NSL, a rarely seen and highly controversial tool of the Bush administration that allowed the FBI to demand information without a warrant, so long as it was related to “national security.”
Calyx’s actual business, since he’d first launched the company in the early ’90s with a bank of modems in the nonfunctional fireplace of a New York apartment, had evolved into hosting the websites of big corporate customers like Mitsubishi and Ikea. But Merrill used that revenue stream to give pro bono or subsidized web hosting to nonprofit clients he supported like the Marijuana Policy Project and Indymedia—and to offer fast internet connections to a few friends and acquaintances like the one named in this surveillance order.
Merrill has never publicly revealed the identity of the NSL's target, and he declined to share it with WIRED. But he knew this particular customer, and he certainly didn’t strike Merrill as a national security threat. If he were, Merrill thought, why not just get a warrant? The customer would later tell Merrill he had in fact been pressured by the FBI to become an informant—and had refused. The bureau, he told Merrill, had then retaliated by putting him on the no-fly list and pressuring employers not to hire him. (The FBI didn’t respond to WIRED’s request for comment on the case.)
Merrill immediately decided to risk disobeying the gag order—on pain of what consequences, he had no idea—and called his lawyer, who told him to go to the New York affiliate of the American Civil Liberties Union, which happened to be one of Calyx’s web-hosting clients. After a few minutes in a cab, Merrill was talking to a young attorney named Jameel Jaffer in the ACLU’s Financial District office. “I wish I could say that we reassured him with our expertise on the NSL statute, but that's not how it went down,” Jaffer says. “We had never seen one of these before.”
Merrill, meanwhile, knew that every lawyer he showed the letter to might represent another count in his impending prosecution. “I was terrified,” he says. “I kind of assumed someone could just come to my place that night, throw a hood over my head, and drag me away.”
Phreeli will use a novel encryption system called DoubleBlind Armadillo—based on cutting edge crypto protocols known as...
Phreeli will use a novel encryption system called Double-Blind Armadillo—based on cutting edge crypto protocols known as zero-knowledge proofs—to pull of tricks like accepting credit card payments from customers without keeping any record that ties that payment information to their particular phone.
Despite his fears, Merrill never complied with the FBI’s letter. Instead, he decided to fight its constitutionality in court, with the help of pro bono representation from the ACLU and later the Yale Media Freedom and Information Access Clinic. That fight would last 11 years and entirely commandeer his life.
Merrill and his lawyers argued that the NSL represented an unconstitutional search and a violation of his free-speech rights—and they won. But Congress only amended the NSL statute, leaving the provision about its gag order intact, and the legal battle dragged out for years longer. Even after the NSL was rescinded altogether, Merrill continued to fight for the right to talk about its existence. “This was a time when so many people in his position were essentially cowering under their desks. But he felt an obligation as a citizen to speak out about surveillance powers that he thought had gone too far,” says Jaffer, who represented Merrill for the first six years of that courtroom war. “He impressed me with his courage.”
Battling the FBI took over Merrill’s life to the degree that he eventually shut down his ISP for lack of time or will to run the business and instead took a series of IT jobs. “I felt too much weight on my shoulders,” he says. “I was just constantly on the phone with lawyers, and I was scared all the time.”
By 2010, Merrill had won the right to publicly name himself as the NSL’s recipient. By 2015 he’d beaten the gag order entirely and released the full letter with only the target’s name redacted. But Merrill and the ACLU never got the Supreme Court precedent they wanted from the case. Instead, the Patriot Act itself was amended to reign in NSLs’ unconstitutional powers.
In the meantime, those years of endless bureaucratic legal struggles had left Merrill disillusioned with judicial or even legislative action as a way to protect privacy. Instead, he decided to try a different approach. “The third way to fight surveillance is with technology,” he says. “That was my big realization.”
So, just after Merrill won the legal right to go public with his NSL battle in 2010, he founded the Calyx Institute, a nonprofit that shared a name with his old ISP but was instead focused on building free privacy tools and services. The privacy-focused version of Google’s Android OS it would develop, designed to strip out data-tracking tools and use Signal by default for calls and texts, would eventually have close to 100,000 users. It ran servers for anonymous, encrypted instant messaging over the chat protocol XMPP with around 300,000 users. The institute also offered a VPN service and ran servers that comprised part of the volunteer-based Tor anonymity network, tools that Merrill estimates were used by millions.
As he became a cause célèbre and then a standout activist in the digital privacy world over those years, Merrill says he started to become aware of the growing problem of untrustworthy cellular providers in an increasingly phone-dependent world. He’d sometimes come across anti-surveillance hard-liners determined to avoid giving any personal information to cellular carriers, who bought SIM cards with cash and signed up for prepaid plans with false names. Some even avoided cell service altogether, using phones they connected only to Wi-Fi. “Eventually those people never got invites to any parties,” Merrill says.
All these schemes, he knew, were legal enough. So why not a phone company that only collects minimal personal information—or none—from its normal, non-extremist customers? As early as 2019, he had already consulted with lawyers and incorporated Phreeli as a company. He decided on the for-profit startup route after learning that the 501c3 statute can’t apply to a telecom firm. Only last year, he finally raised $5 million, mostly from one angel investor. (Merrill declined to name the person. Naturally, they value their privacy.)
Building a system that could function like a normal phone company—and accept users’ payments like one—without storing virtually any identifying information on those customers presented a distinct challenge. To solve it, Merrill consulted with Zooko Wilcox, one of the creators of Zcash, perhaps the closest thing in the world to actual anonymous cryptocurrency. The Z in Zcash stands for “zero-knowledge proofs,” a relatively new form of crypto system that has allowed Zcash’s users to prove things (like who has paid whom) while keeping all information (like their identities, or even the amount of payments) fully encrypted.
For Phreeli, Wilcox suggested a related but slightly different system: so-called “zero-knowledge access passes.” Wilcox compares the system to people showing their driver’s license at the door of a club. “You’ve got to give your home address to the bouncer,” Wilcox says incredulously. The magical properties of zero knowledge proofs, he says, would allow you to generate an unforgeable crypto credential that proves you’re over 21 and then show that to the doorman without revealing your name, address, or even your age. “A process that previously required identification gets replaced by something that only requires authorization,” Wilcox says. “See the difference?”
The same trick will now let Phreeli users prove they’ve prepaid their phone bill without connecting their name, address, or any payment information to their phone records—even if they pay with a credit card. The result, Merrill says, will be a user experience for most customers that’s not very different from their existing phone carrier, but with a radically different level of data collection.
As for Wilcox, he’s long been one of that small group of privacy zealots who buys his SIM cards in cash with a fake name. But he hopes Phreeli will offer an easier path—not just for people like him, but for normies too.
“I don't know of anybody who's ever offered this credibly before,” says Wilcox. “Not the usual telecom-strip-mining-your-data phone, not a black-hoodie hacker phone, but a privacy-is-normal phone.”
Even so, enough tech companies have pitched privacy as a feature for their commercial product that jaded consumers may not buy into a for-profit telecom like Phreeli purporting to offer anonymity. But the EFF’s Cohn says that Merrill’s track record shows he’s not just using the fight against surveillance as a marketing gimmick to sell something. “Having watched Nick for a long time, it's all a means to an end for him,” she says. “And the end is privacy for everyone.”
Merrill may not like the implications of describing Phreeli as a cellular carrier where every phone is a burner phone. But there’s little doubt that some of the company’s customers will use its privacy protections for crime—just as with every surveillance-resistant tool, from Signal to Tor to briefcases of cash.
Phreeli won’t, at least, offer a platform for spammers and robocallers, Merrill says. Even without knowing users’ identities, he says the company will block that kind of bad behavior by limiting how many calls and texts users are allowed, and banning users who appear to be gaming the system. “If people think this is going to be a safe haven for abusing the phone network, that’s not going to work,” Merrill says.
But some customers of his phone company will, to Merrill’s regret, do bad things, he says—just as they sometimes used to with pay phones, that anonymous, cash-based phone service that once existed on every block of American cities. “You put a quarter in, you didn’t need to identify yourself, and you could call whoever you wanted,” he reminisces. “And 99.9 percent of the time, people weren't doing bad stuff.” The small minority who were, he argues, didn’t justify the involuntary societal slide into the cellular panopticon we all live in today, where a phone call not tied to freely traded data on the caller’s identity is a rare phenomenon.
“The pendulum has swung so far in favor of total information awareness,” says Merrill, using an intelligence term of the Bush administration whose surveillance order set him on this path 21 years ago. “Things that we used to be able to take for granted have slipped through our fingers.”
“Other phone companies are selling an apartment that comes with no curtains—where the windows are incompatible with curtains,” Merrill says. “We’re trying to say, no, curtains are normal. Privacy is normal.”
https://www.wired.com/story/new-anonymous-phone-carrier-sign-up-with-nothing-but-a-zip-code/
like this
originalucifer, Rozaŭtuno e adhocfungus like this.
De facto, no.
Yes, there are still some services where there are absolutely zero questions asked and all you need is a prepaid card that doesn't need to be activated at all. Those are quite rare and have a very limited number of phone numbers allocated to them and pretty much are all flagged as spam/bots by every single system out there.
The next tier up are services where you technically don't need to provide any ID to use a prepaid card... but the store you purchased it from needs your ID/credit card to activate the card when you buy it. Those ALSO tend to have the same problems with burned numbers.
What most people have as burners these days are just the same phone service as anyone else. They just pay a rebranded t-mobile at the start of the month rather than the end of the month. And those have all the same restrictions, and capabilities, as "real" phone plans.
When I checked one from T-Mobile, name and surname get automatically pre-filled in the personal data card, as "Anonym Anonym", that is.
It really didn't used to be this way. I remember distinctly walking into a metro PCs store in the late 2000's/early 2010's and being told by the guy there they didn't care what your name was, you could write down bugs bunny and they'd still take your payment and activate your service. But because of that lots of... Less than reputable people did just that and things kind of ended up how they are now.
I think there was at one point a switch to VOIP because of that change, and after that VOIP providers started tightening things down, so now your best bet is probably to pay someone in crypto to import an already activated phone.
The Big Story is exclusive to subscribers
Just $4/month bro, $4 isn't much bro, it's just another small subscription bro.
I just searched for them and all that came up was the new articles all released within 24h...
Honeypot?
like this
TVA likes this.
like this
TVA likes this.
Had no idea this was him. Explains the decision to back away from calyxos and do this then.
Great stuff.
i think it's fingerprints...?
Like a pun on data fingerprinting. But that's not exactly what this service protects against.
I've bought and activated several prepaid phones over the years, paid cash, obviously pseudonymous name, no ID. Last was several years ago, idk if you can still do that. When I did it, it was at phone stores and they told me it was ok.
That said, phones will never be private. There's too much tracking and logging. People can't accept that, because they love their phones too much. But you have to make a choice. Anonymous carriers are of almost no help because all the stuff about deanonymizing database records applies even more to phones. At best they help stay away from some marketing crap and stuff on that level. Government surveillance will see right through it.
Pay some guy to go in and buy them.
Or have them mailed to someone you know
Or use prepaid esim, paid with prepaid debit card
You can still do it.
Just buy from a heavily trafficked grocery store. Arrive by foot. Wear a good covid mask. Pay with cash. Wait a few weeks after purchase before use.
Before you turn it on, cover all cameras with tape and disable the microphone if you can (or plug it with a cutoff headphone jack).
Cut a piece of paper and wedge it between the battery leads. Only pull it out and turn it on in a public place far from your home. And you have to burn the phone after every service you activate.
like this
olorin99 likes this.
Interesting because the article says the ZIP code is required for tax purposes
Maybe the owner is outside of the US, maybe it’s OK?
Very impressive.
When will this service be forced to change or shut down? I think five years. Possibly less if a major case hits the news where a bad actor used the service.
Okay I looked over their stuff, a couple thoughts:
I want them to be more clear in their privacy policy about what exactly they can and would reveal for a court order, what their screening process is for those orders, under what conditions they would fight one and if they will reveal anything outside the context of a full court order.
Reason: this is one of your biggest areas of vulnerability when signing up for a phone plan.
The lexipol leaks showed that many police departments use phone information requests so much that they include a set of request forms (typically one for each carrier) in the appendix of their operations manuals. Frequently the forms are the only data request tool in that appendix.
If you happened to have a call with someone who then did something Cool™ and got picked up, expect the detective to have your name and address on a post-it on their desk by the next morning. If you talked to them on some online chat platform they'll send a court order to that platform for your IP then do the same to your carrier to unmask your identity.
Yes, if you were also sufficiently Cool™ they'll start doing more invasive things like directly tracking your phone via tower dumps, but that's a significant escalation in time and effort. If things got Cool™ enough that this is a concern though, it may buy you time to get a new phone if you live in an area dense enough for that to not be immediately identifying.
Also: I suspect the zip code is completely unverifiable so put whatever you want in there, basically pick your favorite sales tax rate.
like this
Rozaŭtuno likes this.
Summary (Duck.ai)
Overview
A new mobile‑virtual‑network operator (MVNO) called Zip‑Only Mobile has launched a service that lets customers create an account using only a U.S. ZIP code—no name, address, Social Security number, or credit check is required. The carrier operates on a major U.S. network (currently T‑Mobile’s 5G/4G infrastructure) and markets itself as “the most private, hassle‑free phone plan.”
How It Works
| Step | What You Do | What the Carrier Collects |
|---|---|---|
| 1. Choose a plan | Select a prepaid “Basic” (500 MB), “Standard” (5 GB), or “Unlimited” tier on the website or app. | ZIP code (required for regulatory filing). |
| 2. Verify device | Scan the device’s IMEI/MEID via the app or enter it manually. | Device identifier (to assign a SIM). |
| 3. Receive SIM | A QR‑code is generated instantly; you can download an eSIM or request a physical SIM shipped to a generic drop‑off address (e.g., a local UPS store). | Shipping address only if you opt for a physical SIM; otherwise none. |
| 4. Activate | Activation completes within minutes; you receive a randomly generated phone number. | Randomly assigned phone number; no personal data stored. |
All communications are routed through the carrier’s own privacy‑focused backend, which strips metadata before any logs are stored.
Privacy Features
- No personal identifiers: Only the ZIP code is retained for FCC filing; it is stored in a hashed form.
- Anonymous payment: Users can pay with prepaid debit cards, cryptocurrency, or cash vouchers purchased at retail locations.
- Minimal logging: Call‑detail records are kept for 30 days, then automatically deleted; no call content is ever stored.
- Secure eSIM provisioning: The eSIM profile is delivered over TLS 1.3 and signed with a certificate that prevents tampering.
Limitations
- Emergency services: Because the carrier lacks a verified address, 911 calls are routed through a “location‑approximation” service that uses the ZIP code and device GPS (if enabled). Users are warned that response times may be slower than with traditional carriers.
- Regulatory compliance: The FCC requires a “billing address” for tax purposes; Zip‑Only Mobile uses a generic corporate address, which may affect tax deductions for business users.
- Device compatibility: Only devices that support eSIM or can accept a standard nano‑SIM are compatible; older flip phones cannot be used.
Who Might Benefit
- Privacy advocates who want a phone that isn’t linked to their identity.
- Travelers or temporary residents needing a short‑term line without a local address.
- Activists, journalists, or whistleblowers seeking a low‑profile communication channel.
Getting Started
- Visit ziponlymobile.com.
- Pick a plan and enter your ZIP code.
- Choose payment method (prepaid card, crypto, or cash voucher).
- Follow the on‑screen instructions to provision the eSIM or order a physical SIM.
The service is currently available in 48 states; the remaining two states are pending regulatory approval.
Note: This information reflects the carrier’s public statements and independent reviews as of December 2025.
I'm sorry, I truly do not intend to be impolite and I didn't downvote you, but I think people can ask AI for a summary if they want to themselves.
Sorry again. I just really don't like AI, and my expectation of a social media website is for it to be about human interactions. We can talk with AI anytime we want, what we're lacking is pure human communication.
like this
Rozaŭtuno likes this.
a summary can be helpfull
No. LLMs can't reliably summarize without inserting made-up things, which your now-deleted comment (which can still be read in the modlog here) is a great example of. I'm not going to waste my time reading the whole thing to see how much is right or wrong but it literally fabricated a nonexistent URL 😂
Please don't ever post an LLM summary again.
like this
Rozaŭtuno likes this.
They think my boss is gonna switch to session just to send me messages.
They also think NOT about the privacy implications behind using cellular services in general, even just for data (which using a different messaging app doesn't help).
Don’t Use Session (Signal Fork) - Dhole Moments
Last year, I outlined the specific requirements that an app needs to have in order for me to consider it a Signal competitor. Afterwards, I had several people ask me what I think of a Signal fork c…Dhole Moments
I find the best way to torment Linux ISOs is using the live environment exclusively to:
1) Bing search "how to burn iso to usb"
1a) immediately change search to "how to burn iso to usb linux"
2) Bing search "windows 11 install free iso"
2a) download the first link that is an iso
3) Follow instructions from step 1a 90% to the letter using the iso from step 2a, changing the 10% ignored until it "works".
3a) bonus points if you try to write the image to the same USB the live environment is on - if the "chosen" method allows this, congratulations secret ending unlocked, skip to step 6.
4) Bing search "is windows 11 free install safe"
4a) change search to "is windows 11 free install safe reddit"
5) Either unmount the live USB while it is still running, or just hard power down the computer, without even closing the browser.
6) Plug USB drive directly into USB power wall adapter and never plug it into a computer again.
Now, before you ask, yes, you absolutely could do all of this in a VM, but I've found it is more tormenting if there is real actual hardware wasted and/or at risk of damage. Linux is the natural enemy of consumerism, so buying a 12 pack of flash drives just to do this on a thinkpad over and over until the thinkpad dies really hurts the linux ISO to their core.
Merrill says. “If we were able to set up our own network of cell towers globally, we can set the privacy policies of what those towers see and collect.”
Well that's ambitious
like this
Kilgore Trout likes this.
So he’s created the next best thing: a so-called mobile virtual network operator, or MVNO, a kind of virtual phone carrier that pays one of the big, established ones—in Phreeli’s case, T-Mobile—to use its infrastructure.The result is something like a cellular prophylactic. The towers are T-Mobile’s...
So T-Mobile sees all of your DNS queries, the numbers of everyone you call, and can read all your SMS messages. And fingerprint your voice. And triangulate your position.
So, unless you avoid all of this with DOH, never making phone calls (and making sure no friends or family or employer or banks call you), never turn the phone on at your home address, and never using SMS: they'll be able to identity the owner of your plan within the first week of typical usage data collection
you can configure some phones to encrypt all sms messages.
It's a bit like PGP email though in that, despite it working, no one seems to use it
Don't spread misinformation. SMS cannot have e2ee.
Sure you can wrap it with some other layer of encryption. But, as you say, that doesn't work because the recipient can't decrypt it.
It's not misinformation. SMS can have end to end encryption if the messages exchanged between two people in a conversation are encrypted.
It's an add on, in much the way PGP encryption works for email. the first handshake is unencrypted and includes each participants public keys, after that you can have it automatically encrypt each message
Okay, but like, if the carrier sees all your texts, don't they also receive the public keys and can then also decrypt the messages?? I'm genuinely curious how this works. The more I think about it, the more I am convinced I don't understand how any encryption works because the intended recipient needs the key to decrypt it, and if I'm giving them that key, but my traffic is also being watched... doesn't whoever wants to snoop get the key too??
I feel like I have to be missing something because this just sounds like having an encrypted flash drive that you leave out in the open for someone else to grab, but it has the password written on the side of it in sharpie.
public keys
I'm not too sure how cryptography works, but I'm pretty sure it's fine if other people have your public key. I'm reasonably sure it's actually required in a system with public and private keys.
don’t they also receive the public keys and can then also decrypt the messages??
A public key is used to encrypt a message, you need the private key to decrypt.
That's why you have public key servers. it doesn't matter who has the public key, all they can do with it is encrypt information that only the private key holder can decrypt.
The more I think about it, the more I am convinced I don’t understand how any encryption works because the intended recipient needs the key to decrypt it
The way it was explained to me that finally made it click was so:
Imagine you have a lockable box (public key) and a key (private key), the box is empty so you give it to your friend. it doesn't matter if anyone sees the open box because there's nothing in it. your friend puts something private for you in the box and locks it. People see the box as he's bringing it to you but they can't see what's in the box because neither him nor the people watching have the key to the box; only you do. once it gets to you you can open the box with your key
like this
Kilgore Trout likes this.
OH. So like, it's a situation where the "lock" has 2 keys, one that locks it and one that unlocks it. You keep the "unlock" key on your person and never let it out of your sight, but let the "lock" key just gets distributed and copied anywhere because all it can do is LOCK the door, and it really doesn't matter who locks the door so long as only you can unlock it.
That is very interesting. I still don't quite understand how it technically works, because I thought if you encrypt something with a key, you could basically "do it backwards" to get the original information... This is probably due to getting simplified explanations of encryption though that makes them analogous to a basic cipher (take every letter, assign it to a number, add 10, convert back to new letter - can't be read unless someone knows or figures out the "key" is 10) and now it is obvious that it is significantly more complex than that...
But I am much more confident that I understand the 'mechanics' of it, so thank you for the explanation!
Yep, you lock with the public key and unlock with the private.
You can't unlock with the public, it's one way only
like this
Kilgore Trout likes this.
So like, it’s a situation where the “lock” has 2 keys, one that locks it and one that unlocks it
Precisely 😀 This is called asymmetric encryption, see en.wikipedia.org/wiki/Public-k… to learn more, or read on for a simple example.
I thought if you encrypt something with a key, you could basically “do it backwards” to get the original information
That is how it works in symmetric encryption.
In many real-world applications, a combination of the two is used: asymmetric encryption is used to encrypt - or to agree upon - a symmetric key which is used for encrypting the actual data.
Here is a simplified version of the Diffie–Hellman key exchange (which is an asymmetric encryption system which can be used to agree on a symmetric key while communicating over a non-confidential communication medium) using small numbers to help you wrap your head around the relationship between public and private keys. The only math you need to do to be able to reproduce this example on paper is exponentiation (which is just repeated multiplication).
Here is the setup:
1. There is a base number which everyone uses (its part of the protocol), we'll call it g and say it's 2
2. Alice picks a secret key a which we'll say is 3. Alice's public key A is g^a^ (2^3^, or 2*2*2) which is 8
3. Bob picks a secret key b which we'll say is 4. Bob's public key B is g^b^ (2^4^, or 2*2*2*2) which is 16
4. Alice and Bob publish their public keys.
Now, using the other's public key and their own private key, both Alice and Bob can arrive at a shared secret by using the fact that B^a^ is equal to A^b^ (because (g^a^)^b^ is equal to g^(ab)^, which due to multiplication being commutative is also equal to g^(ba)^).
So:
1. Alice raises Bob's public key to the power of her private key (16^3^, or 16*16*16) and gets 4096
2. Bob raises Alices's public key to the power of his private key (8^4^, or 8*8*8*8) and gets 4096
The result, which the two parties arrived at via different calculations, is the "shared secret" which can be used as a symmetric key to encrypt messages using some symmetric encryption system.
You can try this with other values for g, a, and b and confirm that Alice and Bob will always arrive at the same shared secret result.
Going from the above example to actually-useful cryptography requires a bit of less-simple math, but in summary:
To break this system and learn the shared secret, an adversary would want to learn the private key for one of the parties. To do this, they can simply undo the exponentiation: find the logarithm. With these small numbers, this is not difficult at all: knowing the base (2) and Alice's public key (8) it is easy to compute the base-2 log of 8 and learn that a is 3.
The difficulty of computing the logarithm is the difficulty of breaking this system.
It turns out you can do arithmetic in a cyclic group (a concept which actually everyone has encountered from the way that we keep time - you're performing mod 12 when you add 2 hours to 11pm and get 1am). A logarithm in a cyclic group is called a discrete logarithm, and finding it is a computationally hard problem. This means that (when using sufficiently large numbers for the keys and size of the cyclic group) this system can actually be secure. (However, it will break if/when someone builds a big enough quantum computer to run this algorithm...)
SMS can have end to end encryption
in theory it can, but in practice i'm not aware of any software anyone uses today which does that. (are you? which?)
TextSecure, the predecessor to Signal, did actually originally use SMS to transport OTR-encrypted messages, but it stopped doing that and switched to requiring a data connection and using Amazon Web Services as an intermediary long ago (before it was merged with their calling app RedPhone and renamed to Signal).
edit: i forgot, there was also an SMS-encrypting fork of TextSecure called SMSSecure, later renamed Silence. It hasn't been updated in 5 (on github) or 6 (on f-droid) years but maybe it still works? 🤷
GitHub - SilenceIM/Silence: PROJECT MOVED: git.silence.dev/Silence/Silence-Android/ (GitHub is just a mirror.)
PROJECT MOVED: https://git.silence.dev/Silence/Silence-Android/ (GitHub is just a mirror.) - SilenceIM/SilenceGitHub
Kilgore Trout likes this.
I was thinking of RCS security apparently, but was mainly talking about what's theoretically possible.
There's nothing stopping someone creating a E2E encrypted SMS app. The medium doesn't matter, only the data. You could have end to end encrypted carrier pigeons if you want.
Can someone with experience doing ZK Proofs please poke holes in this design?
One doesn't need to know about zero-knowledge proofs to poke holes in this design.
::: spoiler Just read their whitepaper:
You can read the whole thing here but I'll quote the important part: (emphasis mine)
Double-Blind Armadillo (aka Double Privacy Pass with Commitments) is a privacy-focused system
architecture and cryptographic protocol designed around the principle that no single party should be able
to link an individual’s real identity, payments, and phone records. Customers should be able to access
services, manage payments, and make calls without having their activity tracked across systems. The
system achieves this by partitioning critical information related to customer identities, payments, and
phone usage into separate service components that communicate only through carefully controlled
channels. Each component knows only the information necessary to perform its function and nothing
more. For example, the payment service never learns which phone number belongs to a person, and the
phone service never learns their name.
Note that parties (as in "no single party") here are synonymous with service components.
So, if we assume that all of the cryptography does what it says it does, how would an attacker break this system?
By compromising (or simply controlling in the first place) more than one service component.
And:
I don't see any claim that any of the service components are actually run by independent entities. And, even if they were supposedly run by different people, for the privacy of this system to stop being dependent on a single company behind it doing what they say they're doing, there would also need to be some cryptographic mechanism for customers to verify that the independent entities supposedly operating different parts were in fact doing so.
In conclusion, yes, this is mostly cryptography-washing. Assuming good intentions (eg not being compromised from the start), the cryptographic system here would make it slightly more work for them to become compromised but does not really prevent anything.
The primary thing accomplished by cryptography here over just having a simple understandable "we don't record the link between payment info and phone numbers, but you'll just have to trust us on that" policy is to give potential customers a (false) sense of security.
:::
If a payment processor implemented this (or some other anonymous payment protocol), and customers paid them on their website instead of on the website of the company selling the phone number, yeah, it could make sense.
But that is not what is happening here: I clicked through on phreeli's website and they're loading Stripe js on their own site for credit cards and evidently using their own self-hosted thing for accepting a hilariously large number of cryptocurrencies (though all of the handful of common ones i tried yielded various errors rather than a payment address).
Stripejs is PCI compliant via tokenization. That is to say, your PII does not touch the merchant's site. The only thing the merchant sees is random placeholders.
So it sounds like this might work, then?
A few things. If you sign up, don’t then go use the number with things that associate it to your real identity like a bank account or credit card. Also, if you’ve already used your phone with a provider that has your real name, then it’s compromised because you could be linked by the IMEI. Get a fresh phone that you’ve never linked to your identity before. Also, don’t transfer your number to this service. Get a new number provided by them. Additionally, pay with cryptocurrency.
This is all if you want to stay truly anonymous with no traces back to you.
Much respect to Nick for fighting for eleven years against the gag order he received, but i'm disappointed that he is now selling this service with cryptography theater privacy features.
Can someone with experience doing ZK Proofs please poke holes in this design?
One doesn't need to know about zero-knowledge proofs to poke holes in this design.::: spoiler Just read their whitepaper:
You can read the whole thing here but I'll quote the important part: (emphasis mine)
Double-Blind Armadillo (aka Double Privacy Pass with Commitments) is a privacy-focused system
architecture and cryptographic protocol designed around the principle that no single party should be able
to link an individual’s real identity, payments, and phone records. Customers should be able to access
services, manage payments, and make calls without having their activity tracked across systems. The
system achieves this by partitioning critical information related to customer identities, payments, and
phone usage into separate service components that communicate only through carefully controlled
channels. Each component knows only the information necessary to perform its function and nothing
more. For example, the payment service never learns which phone number belongs to a person, and the
phone service never learns their name.
Note that parties (as in "no single party") here are synonymous with service components.So, if we assume that all of the cryptography does what it says it does, how would an attacker break this system?
By compromising (or simply controlling in the first place) more than one service component.
And:
I don't see any claim that any of the service components are actually run by independent entities. And, even if they were supposedly run by different people, for the privacy of this system to stop being dependent on a single company behind it doing what they say they're doing, there would also need to be some cryptographic mechanism for customers to verify that the independent entities supposedly operating different parts were in fact doing so.
In conclusion, yes, this is mostly cryptography-washing. Assuming good intentions (eg not being compromised from the start), the cryptographic system here would make it slightly more work for them to become compromised but does not really prevent anything.
The primary thing accomplished by cryptography here over just having a simple understandable "we don't record the link between payment info and phone numbers, but you'll just have to trust us on that" policy is to give potential customers a (false) sense of security.
:::
like this
Kilgore Trout likes this.
It appears as though cloaked wireless might be a better deal.
Phreeli offers #25/mo for unlimited talk and text with zero gigs of data per month. They give you a free 2GB at signup, but once you are done with that, you have to pay $20 for 5GB. That $25 does include government extortion and fees.
Cloped wireless also offers a $25 per month plan, but does not include extortion and fees in the price, so it would be more like $32. They give you unlimited talk and text with 500 megabytes of high-speed data and unlimited low-speed data after that.
You can pay both of them with Monero, which is why I'm definitely going to switch, but so far, I think I'm going to be going with cloaked wireless instead. Because they offer a lot of the same guarantees, but for a lower price (after data is added to phreeli)
He’d sometimes come across anti-surveillance hard-liners determined to avoid giving any personal information to cellular carriers, who bought SIM cards with cash and signed up for prepaid plans with false names. Some even avoided cell service altogether, using phones they connected only to Wi-Fi.
So if this is already possible, what is his new company providing that's new?
What's the problem he's trying to solve?
Wait, they ask for your details when setting up a phone in America?
I thought y'all lived in the land of the free!
The most I've ever been asked for to setup a phone is my bank details, and that's it, so they can setup direct debit for my contract
don't like this
Kilgore Trout doesn't like this.
The ability to pay money for your contract?
Edit: they only ask for that if on Contract, if pay-as-you-go they ask for no details at all
Kilgore Trout doesn't like this.
A direct debit is a contractual agreement, they have zero access to the bank account, just the unique identification number and an automated system that requests money from that unique identifier once per month.
And that if there's no money in the account, they don't take you into credit, but instead just pause service until you pay
These services usually have the ability to debit whatever your bill is, and then suddenly their system fucks up, or you get hacked and someone commits fraud, and before you know it a $5000 payment comes out of your account instead of the expected $30.00.
It's better to have that set up on a credit card in case something happens and you get a much better chance to dispute it.
That's literally impossible, it's not how it works
At the very least it's literally impossible in UK and EU.
The system isn't actually taking any money from you at all, it's merely sending requests to the bank to ask for the money.
Some banks automatically will go "okay!", some need human confirmation for every transaction, ALL need human confirmation for any transactions over £200 (by law)
That's definitely a UK/EU thing then. If you get a $5000 cellphone bill in NA because someone did long distance fraud and you have pre authorized debits set up, $5000 is coming out of your account in Canada and USA.
Edit: assuming you have 5k and or have overdraft on the account. Not sure what happens if you have less than 5k and no overdraft. Like I don't know if it'd take you to $0, or fail and charge you a insufficient fund fee.
FWIW I'm not recommending or not this service but they are :
- based in the US, yet
- provide international roaming
- e-SIMs (so nothing to send)
so it might be interesting in some cases for people not living in the US.
Bootloader Unlock Wall of Shame
GitHub - zenfyrdev/bootloader-unlock-wall-of-shame: Keeping track of companies that "care about your data 🥺"
Keeping track of companies that "care about your data 🥺" - zenfyrdev/bootloader-unlock-wall-of-shameGitHub
like this
HeerlijkeDrop, Rozaŭtuno e ☆ Yσɠƚԋσʂ ☆ like this.
Samsung? I'm pretty sure I saw bootloader unlocking in developer options though...
DO NOT UPDATE to OneUI 8
Checks System Info
OH SHIT.
like this
TVA likes this.
Moscow not against Kiev taking care of its security, but not at Russia's expense — Putin
Moscow not against Kiev taking care of its security, but not at Russia's expense — Putin
The Russian leader recalled that there are general agreements to the effect that the security of one state cannot be guaranteed at the expense of the security of othersTASS
Russia did not annex Crimea, but extended helping hand to its people — Putin
Russia did not annex Crimea, but extended helping hand to its people — Putin
According to the Russian leader, the residents of Crimea recognized that they had become part of an independent Ukraine following the Soviet Union's collapseTASS
Ireland, Spain, Slovenia and the Netherlands to boycott Eurovision 2026, as Israel allowed to compete
Ireland, Spain, Slovenia and the Netherlands will boycott next year’s Eurovision after Israel was given the all-clear to compete in the 2026 song contest despite calls by several participating broadcasters for its exclusion over the war in Gaza.
No vote on Israel’s participation was held on Thursday at the general assembly of the European Broadcasting Union (EBU), the body that organises the hugely popular international annual singing competition.
Instead, participating broadcasters voted only to introduce new rules designed to stop governments and third parties from disproportionately promoting songs to influence voters.
Four countries to boycott Eurovision 2026 as Israel cleared to compete
Ireland, Spain, Slovenia and the Netherlands pull out after decision not to hold vote on Israel’s participationPhilip Oltermann (The Guardian)
like this
geneva_convenience likes this.
or you got all of that in one beautiful creature
One of Many
One of Many (undead neutral evil rogue/barbarian/warlock) is a companion in the Mask of the Betrayer campaign. The One of Many may join your party if you devour Okku at the end of Act I.Contributors to NWN2Wiki (Fandom, Inc.)
Weird issues after swapping GPU from nVidia to AMD: audio crackling and mouse cursor "lagging" and going crazy
PoP_OS 22.04.
Recently upgraded GPU and went from nVidia to AMD. Since AMD drivers are already baked into the kernel, I simply uninstalled nVidia ones by
sudo apt purge ~nnvidiabut after doing so and rebooting with the new GPU, the game I had been playing until minutes before the swap started giving me an unbearable amount of audio crackling, mainly (but not exclusively) when there's audio besides the one from the game playing (e.g. background music player).
Searching online I found out it's an issue with pipewire, and found someone mentioning a solution that edited the quantum values, though that didn't work for me; specifically, making default.clock.quantum larger.
The second issue happens everywhere but fullscreen applications (e.g. games): if I quickly draw circles with my mouse, at some point the pointer starts drifting away in erratic ways, even though I'm still drawing circles with my mouse; other times, especially when there's a windowed app (such as FreeTube while playing a video), even simply moving the mouse across the screen results in the pointer lagging behind as if the screen were jelly, and if I start drawing circles, the video stutters to the point of freezing.
Now, the audio issue is extremely problematic since I have to keep volume very low, as even an average volume means crackling is loud to the point it hurts my ears; the jelly-pointer is less of an issue, but still very annoying.
Any ideas?
Anyone who had these issues and is now on PoP 24 beta? Long shot, but it releases next week and if the issue was fixed for you, I'll wait, otherwise I might just try a different distro.
Thanks in advance!
default.clock.quantum
That probably didn’t do anything. I think it sets the quantum if it isn’t otherwise set.
Check pw-top while you’re playing from a source where you experience crackling. You can see the quantum value, if it’s low (usually 1) then that source is using the minimum quantum.
You can change it, temporarily (until reboot/pipewire service restart) with
pw-metadata -n settings 0 clock.min-quantum <value>Try 256 to start with increase if you still get crackling.
Here’s the documentation on pipewire buffering: gitlab.freedesktop.org/pipewir…
I’ll leave finding the config file to make this permanent as an exercise for the reader.
Thanks for the reply and sorry it took me so long to get back to you.
Your solution works and 256 is enough to get rid of basically all cracklings, thank you!
You sure your PSU can handle this new card AND all your other components?
A good sign it can't is if this only happens when your card is under a fair amount of utilization.
Try disabling the power saving settings for the machine, and make sure your power profile is set to 'performance'. See if that changes anything.
I am certain this is a power issue, but where it's stemming from us difficult to tell without actually seeing the machine.
Would also be useful if you check your BIOS for voltage settings for your CPU/MEM, and your PCIE lanes.
It's not a laptop so I don't have power saving options that would affect performance (I only see automatic suspend and screen inactivity).
I tried performance power mode, but that did nothing for crackling. The only thing that works is setting the min-quantum value like the top comment suggested. Thanks!
I have crackling issues sometimes too in games. It comes and goes.
On mint, 15 year old cpu and a rx 6700 card.
Like others said, make sure its not psu or mobo. Check your psu fan, for starters. They die often and the pc will run but act very weird and eventually shut down abruptly.
Im actually using 1 pc with a dead psu fan and I throttle the graphics card so it doesn't crash, it works.
Change to pipewire if you didnt..
HW is in top shape, so no issues there. Pipewire is the deafult on PoP.
As the top comment suggested, the issue is in the min-quantum value being too low. Not a HW issue per se, it's just that the CPU can't keep up.
Thanks though!
I'm new to Linux (and very inexperienced, since PoP just worked out of the box until now), so I can't relate haha though apparently the audio crackling is due to the CPU not being fast enough to do everything it's required to, and when it starts lagging behind too much and can't respect the min-quantum value anymore, the weird audio issue shows up.
setting min-quantum to a higher value (PoP ships with 32 min, I set it to 256) mitigates the issue a lot
The United States Using Drones Modeled on Iran’s “Shahed” UAVs
The United States Using Drones Modeled on Iran’s “Shahed” UAVs
The United States is now operating a squadron of attack drones known as “LUCAS,” which have reportedly been built through reverse engineering based on Iran’s Shahed drones.KhabarOnline News Agency
Israel 'bulldozed bodies' of Palestinian it killed at Gaza aid sites into unmarked graves
A CNN investigation based on video footage, satellite imagery and eyewitness accounts found a 'pattern' of mishandling bodies
Israel 'bulldozed bodies' of Palestinian it killed at Gaza aid sites into unmarked graves
A CNN investigation has revealed that Israeli soldiers bulldozed the bodies of Palestinians killed while trying to access humanitarian aid near the Zikim crossing into northern Gaza.Tamara Turki (Middle East Eye)
Introducing Proton Sheets
Introducing Proton Sheets: Protect the data that drives your business
Proton Drive now includes Proton Sheets, giving you secure, encrypted spreadsheets for safer collaboration, organized data, and aligned teams.Anant Vijay (Proton)
like this
adhocfungus likes this.
Dumbest excuses/stuff your family/other people told you about Privacy on the internet and degoogle?
My mom claims there is no problems into being tracked and stuff and that "Every normal person will use gmail";
My brother says you only should hide your data if you are a criminal or something.
like this
giantpaper e adhocfungus like this.
like this
giantpaper likes this.
that advertisement becomes more relevant and they don't need to search for things they may like
🤷
Common objections debunked
Your one-stop-shop for convincing people to take online privacy seriouslyPatrick Leavy (The Rebel Blog)
“They already have my information anyway.”“Oh, what are they gonna do with my info? Who cares that I searched for X and Y? LOL.”
Me, a software engineer working for a major cSaaS provider that partners with other companies that specialise in Mobile Real User Monitoring, Open Telemetry, Bluetooth beacons, etc.: “Eh, no idea what they do with that info. Now let me just ignore all these non-anonymized analytics, spans, traces, and metrics that these companies capture about your devices and the health of their applications and infrastructure.”
I stopped bringing these things up years ago. Can’t explain this to persons who don’t care or are not remotely close to being tech savvy. Let them be content and enjoy the things they enjoy.
like this
giantpaper likes this.
A friend told me
like this
giantpaper likes this.
Mostly paraphrased, I don't remember exactly how it was worded. Also the non-quote responses were made up after the fact for this post, this wasn't a single conversation in this order:
"You'll miss out on so many events and social opportunities because you don't have any 'real' social media."
As an introvert, I don't care.
"You're selfish for putting your silly notions of 'privacy' over being in the loop with what your friends are doing. One day you'll realize that being there when your friends post about their life events is more important."
Said by someone who I never considered my friend in the first place. My actual friends have ways of reaching me other than Facebook or WhatsApp.
"Most people aren't going to bother figuring out which obsecure 'privacy oriented' service you decide to use, they're just not going to talk to you if you're not on mainstream apps. Normal people value their time more than they value privacy."
Please stop talking to me then, so I stop wasting your time.
"This isn't the 1950s anymore. You need to get with the times and embrace the information age."
I know how to program, you don't. I know how the protocols that power the internet work, you think it's a literal magic cloud. I run my own server at home with hardware I bought, you have to pay for Google Drive every month. I'm the one embracing the information age, you're just blindly using it.
"Geez, you're like an Amish person! Don't you see you've fallen into a cult? Just instead of not using electricity you don't use social media."
No I'm not. See above, I fully embrace technology. In fact, I embrace it so much I've spent most of my life figuring out how it works and only use things I understand and control, and I choose not to use certain conveniences because I know how they work. Also, I'm not an antivaxxer or against modern medicine. I also think raising horses in captivity to be your slave is cruel and barbaric. Finally, I don't believe in God and don't try to live my life according to a 2000+ year old book. Privacy isn't a cult, if anything, your blind faith in trillion dollar tech companies is more like the Amish's blind faith to their God.
like this
giantpaper likes this.
One day you’ll realize that being there when your friends post about their life events is more important.
Lmao. Being there for their posts??? This is delusional and sad.
I gave up, the issue is much bigger than just privacy. Most people have no problem with having their life controlled by external circumstances and being exploited. They say that's how life is. They don't save money, but spend it all. They don't start a company, but just get hired. They don't protect their data, but give it away for free. They don't eat healthy, but prefer to enjoy their sugar and fast food. They don't work out, but just watch TV, consuming ads. Most people are unreasonable beyond help.
My advice is, just do your thing and let the results speak for themselves.
Something I want to try replying to the nothing to hide crowd:
Why do you close the door to your home then? What criminal activity are you hiding?
To be fair, self-hosting is more difficult and less secure.
The thing is though, many like to put in an effort and no one cares to hack your server, unlike something like Google.
Lol.
It's about 1000x easier to configure your server on your own than trying to work through some VPS frontend.
Configure your server as in "install software on any random PC and forward ports"? Sure.
As in "make it all secure and reliable"...much more complicated.
Not personally, no.
Big fan of his work, though.
Enjoy ProtonMail's premium custom scheduling & custom snoozing for free
Using this userscript I made : git.kaki87.net/KaKi87/userscripts/protonmailWithoutAnnoyances
ProtonMail allows scheduling and snoozing messages for free at preset times, e.g. tomorrow, next Monday, this weekend, etc., and always at 8, but makes people pay to choose a customized date and time.
I had a hunch that this restriction might only be implemented client-side, so I tried modifying the value in DevTools for the first time, and I couldn't believe it : that worked !
So, in order to automate this, I created a userscript that replaces the button press handler for the "custom" option, then lets you input whatever value you need, e.g. (next) Wednesday, (in) 30 minutes, (today at) 8 PM, Thursday at 7 (AM), etc.
Then, it lets the app believe that we're gonna schedule using the tomorrow preset, until it intercepts the request and swaps the time value with the user's choice.
Enjoy !
This is a cool user script. I don't want to take that away from you. Beckons me back to a more fun version of the internet. You're providing a useful feature to people.
However I do want to encourage anyone running user scripts on their email clients to be very careful. If your script auto updates you are opening yourself up to a delayed attack. And if you don't understand every bit of the script you are opening yourself up to exploitation. Determine your threat model and capability and proceed appropriately.
This is the privacy community after all.
Beckons me back to a more fun version of the internet. You’re providing a useful feature to people.
i had the same though when i read the title and it appealed to me because of it and also because i'm a proton user (for now).
i'd like to think this is safer than the other scripts that existed(ed) out there in that you can see the source for yourself, so maybe the threat isn't so extreme.
This is a cool user script.
Thank you !
I do want to encourage anyone running user scripts on their email clients to be very careful.
What about stuff that runs everywhere, including email clients ?
uBO for example, is a much bigger codebase that no random user is gonna read, yet it does run on ProtonMail and there's no way to be sure no malicious person injected something in there to read people's emails.
In addition, I also have userscripts that technically do run everywhere, but only do something concrete on some websites, that I don't have a finite list of URLs for.
For example, Fediverse redirector is a userscript that redirects any Fediverse app instance to the user's choice. But, any URL may be a Fediverse app, and I need to check it first. Same with Enhancements for Forgejo, this one adds features to Forgejo instances, but any URL could be a Forgejo instance.
if you don't understand every bit of the script you are opening yourself up to exploitation
Yeah, maybe I should add some comments, and also highlight the import of createFetchInterceptor (still my own code but in a separate file for reusability).
This is the privacy community after all.
* Piracy 😉
Can you get Clipboard History on Gnome+Wayland?
I wanted a simple clipboard history on Win+V.
I've installed CopyQ - it's ugly, starts with a lag and doesn't quite work on Super+V shortcut. I've switched to Wayland and it silently stopped working altogether.
Next, I've installed Gnome Clipboard History Extension - it looks good, fast, works on Super+V, but for some reason it can't paste into Kate text editor.
Is it possible to get a reliable clipboard history manager on Gnome+Wayland, or should I stop wasting my time? Maybe someone has a working solution?
I am a little but frustrated by the obstacles I encounter trying to get this simple feature.
like this
adhocfungus likes this.
GitHub - sentriz/cliphist: Wayland clipboard manager with support for multimedia
Wayland clipboard manager with support for multimedia - sentriz/cliphistGitHub
GitHub - hezral/clips: Multi format clipboard manager with extra features
Multi format clipboard manager with extra features - hezral/clipsGitHub
GitHub - bugaevc/wl-clipboard: Command-line copy/paste utilities for Wayland
Command-line copy/paste utilities for Wayland. Contribute to bugaevc/wl-clipboard development by creating an account on GitHub.GitHub
I use Clipboard Indicator Gnome Extension - well maintained and works flawlessly for me.
Edit: Also pasting in Kate if that's of any concern
GitHub - Tudmotu/gnome-shell-extension-clipboard-indicator: The most popular clipboard manager for GNOME, with over 1M downloads
The most popular clipboard manager for GNOME, with over 1M downloads - Tudmotu/gnome-shell-extension-clipboard-indicatorGitHub
GitHub - oae/gnome-shell-pano: Next-gen Clipboard Manager for Gnome Shell
Next-gen Clipboard Manager for Gnome Shell. Contribute to oae/gnome-shell-pano development by creating an account on GitHub.GitHub
Do Ubuntu derivatives use the TPM out of the box for cryptographic operations?
The TPM could be used to generate a LUKS decryption key from a password or PIN.
That would tie that password to the hardware, but with LUKS you can have multiple ones, so a long password that directly unlocks the key should be possible in addition
This is probably the main reason every mainboard has TPMs now, since all common operating systems (Android, iOS/MacOS and Windows) do it.
From what I heard the Ubuntu installer offers a version that doesn't suck (if secure boot is enabled at install time) so using that is probably fine, but I would beware of trying to DIY it since it's easy to do incorrectly, most guides are wrong, and you will likely end up with easily bypassable encryption.
Bypassing disk encryption on systems with automatic TPM2 unlock | oddlama's blog
oddlama's personal web page and blogoddlama.org
TPM is great on paper, but in practice, there was little planning to ensure that cryptographic keys would be safeguarded by hardware manufacturers, and that's exactly what happened. Now TPM is considered weak as a means of securing data.
I'm not aware of any consumer distros that use TPM enrollment for anything out of the box, though the tools may be present.
Have a look at how Clevis works. That will give you an idea of how easy it is to work tish TPM in Linux.
South Korea developing app that shows real-time location of stalkers
South Korea: Government developing app showing real-time location of stalkers
Critics have voiced concern over the pervasiveness of stalking and violence against women in South Korea.Koh Ewe (BBC News)
like this
adhocfungus likes this.
This table is actually an old sewing machine table that seems to be missing its extention (and drawers). The extension folds at the side when not in use and basically doubles the tables size when extended. Great table if you can install the extension.
Source: my mom inherited one of these tables from my great grandma. Absolutely gorgeous craftsman ship and functionality worth restoring and installing the original model of sewing machine. Nothing like them today.
Damn. Here antique sewing machine must have stopped working. For those that don't know this is a new garbage quality (by comparison) sewing machine sitting on top the table for the old one.
The old one is probably still in it. It flips underneath for storage when not in use. Most tables have an extension that folds down at the side as well. Gives you the ability to have large blankets or quilts laid flat. Though it looks like they removed it.
I'm sure Grandma misses her old setup. The quality of the old machines were absolutely beyond most anything a consumer sewing machine could do today. All metal and no garbage plastic parts that break. Not to mention the massive foot pedal at the bottom. Never having to look down to see where that stupid plastic one slipped to.
Grandma is making due with what she has. If she still sews a lot I'm sure she'd love having her old machine fixed or replaced.
4/10 for the setup. But not much of a step up from me pulling out my sewing machine from the closet and putting it on the Kitchen table. Actually looks like the same Brother model i have. It's one of the better brands these days. Singer consumer grade is mostly garbage.
Setup has huge potential though. Repair the older sewing machine and it's 9/10 without any other changes. Then, add the extention, find the missing drawers for easy access to accessories and thread, and cleanup the cable management, it's an easy 10/10 setup. 10/10 to Grandma already though for working with what she's got.
You suffer from false nostalgia. The old machine is a beast, yes, but it has a swing shuttle. It holds very little thread, is hard to wind and load, gets tangled and makes a really crappy lockstitch. Has no reverse, piss poor stitch length adjustment and not enough balls to handle any layers without the belt slipping.
The new one is a piece of crap in comparison of build quality, but in terms of function and utility it blows the old one out of the water. And price.
I have an old one and have used it lots. It's fun to use, but far from efficient. I'll keep it around for the apocalypse but I'll use a modern one from at least the 70's (the nineteen seventies).
I got this 1971 Elna machine from Goodwill for $10. Couldn't be happier. It's built like a Swiss tank, and can do a ducky stitch.
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
My grandma had one similiar to this.
With leather belt and all, still working in ~2005.
History of the Sewing Machine: A Story Stitched In Scandal
Dive into the history of the sewing machine. A story filled with scandal and accusations surrounding Charles Weisenthal, Thomas Saint & more.Stefanie (Contrado Blog)
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
Does this show up as a live stream in voyager?
Picture is out of the "Struwelpeter", which is not part of Grimm's collections.
No, Heinrich Hoffmann, a German psychiatrist in the mid 19th century.
Loved the Struwelpeter as a child btw. 😀
Hans guck in die Luft was saved by dockworkers, and it was the Daumenlutscher with the cut off fingers.
Grimm Brothers were also German and the collected the most famous stories (Snowwhite, Rapunzel, Little Red Riding Hood, ...). In the original they were way more brutal too.
I'd change the meme to "... but written by Europeans."
Trump Announces 5,000% Increase In All Numbers
Trump Announces 5,000% Increase In All Numbers
WASHINGTON—Touting his latest executive order as a historic win for the U.S. economy, President Donald Trump announced Friday that he was mandating a 5,000% increase in all numbers nationwide.The Onion Staff (The Onion)
Waymo Just Reprogrammed Its Robotaxis to Drive Less Safely
Besides convenience, one of the main benefits of self-driving cars is supposed to be safety.Yet in a bizarre move, Waymo — whose self-driving cabs had been enjoying extraordinary safety metrics — has just taken steps to make its robotaxis more human-like, eroding the safety narrative that’s been central to the autonomous vehicle narrative.
Recent reporting by The Wall Street Journal observed a startling change in Waymos’ road etiquette, a new aggressive streak that would make a BMW driver blush. These include illegal U-turns, aggressive lane switching, rolling through cross walks, and running red lights.
Waymo Just Reprogrammed Its Robotaxis to Drive Less Safely
Waymo has been experimenting with programming to make its typically-cautious robotaxis "confidently assertive."Joe Wilkins (Futurism)
"I use signal. If you care about our friendship, you'll install it too."
I have friends that got it just for me. I also lost some so-called "friends"
I'm all for getting off anything meta, but come on. Someone not wanting to move to a chat service that's probably less convenient for them does not make them a "so called 'friend'" lmao.
If you're actually losing friends over this, that's quite sad.
Gradually. You don't have to get all your friends off Meta right now. Maybe some of them will, and they might push their friends to ditch meta as well.
Just keep trying. But totally alienating your friends also won't do much good for the whole perception of the movement. Becomes a lot easier to just think of that weird guy who won't talk to us anymore because of some app, rather than what it's actually about.
I feel like I worded that really badly, but I hope my point comes across.
yeah still plinking away at it i guess, but they can always invest their money again in stealing back all of those users for a platform that will enshittify asap.
reminds me of that time people were gradually going to mastodon and then bluesky came around and stole all that thunder because of mostly superior marketing and being very similar to twitter.
Exactly. Maybe one of your less close friends turns out to be a serial killer. Unbeknownst to you now you've made some jokes and had brunch with them. Now a team of cops is going through everything you've ever texted anyone because it's unencrypted, correlating things to make you look horrible. Suddenly you're getting your life ruined.
There are cases of innocent people riding their bikes past an unknown crime scene getting arrested for murder because their phone was reporting their location to Google. Try explaining to your boss that you're missing work today because you're in jail for a murder charge. Privacy is important even when you think it's not and perhaps especially when you think it's not
Hey look, there's normie's here on lemmy now! Your post is the type of naive stuff that gets a ton of traction on reddit.
Its usually more like, "I've got nothing to hide, let them look!", or whatever, but I like your version too.
in my country, it's pretty much mandatory. everybody and their parrots use it universally.
work comms, company services. even the state uses it for their services (of course they have other means too but still).
and i don't trust it at all. been meaning to sandbox it better than just denying permissions.
I made the jump to signal, and those that refused to come with got relegated to SMS.
But it's not always that easy. Sorry that you have to deal with that BS.
Oh wow nice idea, I'm gonna do it ASAP, thanks!
EDIT: after few research Ive seen that also : github.com/meinto/whatsapp-sig…
GitHub - meinto/whatsapp-signal-bridge: Forward your Whatsapp messages to a separate Signal chat and reply to Whatsapp by quoting received messages.
Forward your Whatsapp messages to a separate Signal chat and reply to Whatsapp by quoting received messages. - meinto/whatsapp-signal-bridgeGitHub
Its not 100% open source, haven't fixed a hole that breaks encryption for a while and the CEO is a jew who worked at facebook
So I have Whatsapp for regular people (most). My family switched to Telegram years ago. My GFs family uses only Signal.
My brother refuses such things and made us download SimpleX.
Meanwhile I don't even want to receive messages.
May be worth having a read up aboutsignal.com/blog/how-to-sw…
Also there is watomatic.app which can automatically respond to a message saying you are on Signal.
How to switch from WhatsApp to Signal - AboutSignal.com
Switching from WhatsApp to the privacy-friendly Signal? Good idea! But where do you start? How do you let your friends know you’ve switched? With these tips, we’re happy to help you switch to Signal.Michel (AboutSignal.com)
cannot get nut to load on reboot
I set up NUT on my server to monitor the status of 2 UPS's connected via USB, an eaton and a cyberpower. Nut fires up fine when I tell systemd to run all the pieces, but when I reboot, they are active but dead. they dont wake up and work until I manually load them again.
Theres no error anywhere. it just wont load itself on boot. why?
like this
Auster likes this.
sean@hooty:~$ systemctl status nut-driver@printerUPS.service
○ nut-driver@printerUPS.service - Network UPS Tools - device driver for NUT device 'printerUPS'
Loaded: loaded (/usr/lib/systemd/system/nut-driver@.service; enabled; preset: disabled)
Drop-In: /usr/lib/systemd/system/service.d
└─10-timeout-abort.conf
/etc/systemd/system/nut-driver@printerUPS.service.d
└─nut-driver-enumerator-generated-checksum.conf, nut-driver-enumerator-generated-devicename.conf, nut-driver-enumerator-genera>
/etc/systemd/system/nut-driver@.service.d
└─override.conf
Active: inactive (dead)
Docs: man:upsdrvsvcctl(8)
https://www.networkupstools.org/historic/v2.8.4/docs/man/upsdrvsvcctl.html
man:ups.conf(5)
https://www.networkupstools.org/historic/v2.8.4/docs/man/ups.conf.html
man:nut.conf(5)
https://www.networkupstools.org/historic/v2.8.4/docs/man/nut.conf.html
man:usbhid-ups(8)
https://www.networkupstools.org/historic/v2.8.4/docs/man/usbhid-ups.html
2) Run
systemctl --failed and see if you get anything there3) Make sure you run the journal back all the way through boot and see if anything during boot time is obvious
4) Post your systems units here
discussion.fedoraproject.org/t…
NUT Server Documentation
As of Fedora 42, at least, bootstrapping nut is a little different. For starters, the service template, /usr/lib/systemd/system/nut-driver@.service is broken.Fedora Discussion
Its common, it's called the refractory period. Younger men can sometimes go a couple minutes after a "reboot" but as you get older it takes longer and longer.
ETA: maybe I should read past the topic...
You get big electricity bill. They get free data to sell.
What's the downside for them?
Nice! I was thinking about jmp before but read about issues with 2fa texts. My credit card still relies on 2fa texts so I am not sure if jmp would work for me.
Do you have any issues with texts from short numbers (5digit) and 2fa texts in general?
Depends on both what the adblocker responds and how a given program handles failures.
Pi-Hole and similar adblockers can pretend that the domain is on the device itself (A 127.0.0.1), is an invalid IP (A 0.0.0.0) or that the domain doesn't exist at all (NXDOMAIN). Each one has its own implications, with the latter (usually the default afaik) being the most likely to have software generate a hard error and give up.
BBC's Gaza Double Standard and Western Liberalism's Crisis of Legitimacy (Podcast 44mins)
In this News Brief, we interview journalist Daniel Trilling and discuss his investigation into the BBC's systemic anti-Palestinian bias.
Do people with newer pcs prefer rolling release?
like this
adhocfungus likes this.
- I like having the upstream versions of software instead of it being patched by package maintainers.
- I like having up to date software. It means that issue trackers for software I use are relevant
- Doing distro upgrades when they end support never works gracefully and i have to completely reinstall. I'd rather just use a rolling release which in practice works and is supported indefinitely
- I do like bleeding edge updates. For wine for instance
Yeah, Point 1 here is exactly why I moved from Ubuntu to Arch ~10 years ago.
I was trying to get something working and found that the bug / feature had been fixed ~1 year earlier, but that version wasn't in the repos... I couldn't move forwards.
With Arch, all is well. And, I'm either reporting new bugs and helping to get things fixed, or I'm updating the wiki with any changes I notice.
With a rolling release distro you get the most recent upstream stable releases of all your software packages. There is really no blood involved. If you want the risk of blood, you need to install the bloody versions of upstream, i.e. newest git master.
Ubuntu et all on the other hand give you months to years old software. If you're fine with that 🤷. And on big upgrade, they break install different software and tend to break stuff.
Idk what role hardware age has here.
- my hardware is pretty new, support for it is shaky on slower distros
- i prefer to do small, generally reliable updates frequently rather than large, failure prone updates infrequently
- although rare, i have run into the wall once or twice on slow release distros, where a program i want to use needs a newer version of a package than my distro supported
- i like pacman, it's a nice package manager
This...is not accurate. Not being pedantic, just correcting the misunderstanding so you know the difference.
LTS releases are built to be stable on pinned versions of point release kernel and packages. This ensures that a team can expect to not have to worry about major changes or updates for X years.
Rolling Releases are simply updating new packages to whatever versions become available when released. Pretty much the opposite of an expected stable release for any period of time.
Doesn't have anything to with "forced reinstall" of anything. If you've been having to fully reinstall your OS every time a new LTS is released, you are kind of doing extra unnecessary work.
What exactly is the point of stable release? I don't need everything pinned to specific versions—I'm not running a major corporate web service that needs a 99.9999% uptime guarantee—and Internet security is a moving target that requires constant updates.
Security and bug fixes—especially bug fixes, in my experience—are a good enough reason to go rolling-release even if you don't usually need bleeding-edge features in your software.
That's a very odd example to choose given how trivially interchangable kernels are.
At NixOS, we ship the same set of kernels on stable and rolling; the only potential difference being the default choice.
I'm pretty sure most other stable distros optionally ship newer kernels too. There isn't really a technical reason why they couldn't.
Most “stable” distros offer kernel version that update more frequently to accommodate new hardware.
Most “rolling” distros offer LTS kernels that remain essentially unchanged for long periods.
The kernel is one of the smallest differences between the two models.
To be able to predict when something you depend on breaks.
This "something" could be as "insignificant" as a UI change that breaks your workflow.
For instance, GNOME desktop threw out X11 session support with the latest release (good riddance!) but you might for example depend on GNOME's X11 session for a workflow you've used for many years.
With rolling, those breaking changes happen unpredictably at any time.
It is absolutely possible for that update to come out while you're in a stressful phase of the year where you need to finish some work to hit a deadline. Needing to re-adjust your workflow during that time would be awful and could potentially have you miss the deadline. You could simply not update but that would also make you miss out on security/bug fixes.
With stable, you accumulate all those breaking changes and have them applied at a pre-determined time, while still receiving security/bug fixes in the mean time.
In our example that could mean that the update might even be in a newer point release immediately but, because your point release is still supported for some time, you can hold on on changing any workflows and focus on hitting your deadline.
You need to adjust your workflow in either case (change is inevitable) but with stable/point releases, you have more options to choose when you need to do that and not every point in time is equally convenient as any other.
So far I've encountered the smoothest OS experience with Arch-based EndeavourOS. Perhaps twice a year something breaks for which the forum or Arch Wiki usually provided the fix within a day. The other 363 days I simply update in the morning/evening and all is well—sudo pacman -Syu --noconfirm and yay --noconfirm.
Conversely, on Debian, it drives me nuts that one is prevented from updating even if one public key from one unimportant repository is missing or something. This troubleshooting is way harder for beginners than most things I've needed to do to fix my EndeavourOS install.
I've got a complete Linux beginner to start off with EndeavourOS without problems. She's even troubleshooting and fixing suddenly non-working Steam games by herself.
In any case, any Linux is better than Windoze. Try different distributions if you've got a spare PC to test with and see what fits you. For the greatest peace of mind, always have two or more hard drives or have a directory that instantly syncs to a cloud to separate the OS from crucial data one cannot lose in case something goes awry.
As for desktop environments (DE), I started off with Xfce about ten years ago, used that most of the time. Then fell for the KDE Plasma hype for about year—they're doing great stuff, but a bit too bloated and buggy for my liking, as well as trying to have a KDE app for everything instead of acknowledging some other software is simply better. One can't be the best at everything. Anyway, then I tested multiple DEs because all of them have exclusively useful features, and the perfect mix between the most prominent ones (Xfce, Plasma, Gnome) I've found to be Cinnamon, the default on Linux Mint. For me that's the perfect beginner friendly DE that also remains highly configurable/extensible to suit experienced users, without being overwhelming/bloated to anyone.
Have fun and build whatever you want in your new awesome sandbox. Screw M$ without restraint nor compassion.
Minimal delay between a program releasing new features or bugfixes and you getting to use them. Even as an avid Debian user, sometimes I get bummed out when they freeze a package for release right before a feature I would have really liked makes it in.
As for security, there's not a huge difference I'm aware of. On Debian, features stay where they are, but maintainers will backport just the security fixes of each package to the current stable release.
This is admittedly anecdotal, but my experience with point releases is that things still break, and when they do, you're often stuck with the broken thing until a new release comes out. For this reason, among others, dist-upgrades tend to be extremely nervewracking.
With a rolling release, not only are fixes for broken things likely to release faster - if something does break, you can pin that package, and only that package, to an older version in the meantime. Then again, I've been using Arch almost exclusively on my desktop for about 7 years and I've never had to do this. I don't doubt that things have broken for people, but as far as I'm concerned, Arch just works.
As far as security goes, I don't think there's much, if any, advantage. Debian, the stablest of them all, still gets security updates in a timely fashion.
I used arch a lot, and I do like the idea of rolling releases, but at this point for the couple programs I need new features in, I just build them from source.
Rolling vs. point release is not about whether a breaking change happens or not but when.
With rolling, breaking changes could happen at any time (even when inconvenient) but are smaller and spread out.
With point release, you get a big chunk of breaking changes all at once but at predictable points in time, usually with migration windows.
I use a rolling release for mainly 3 reasons.
- Faster access to new (shiny) software/applications. Flatpak and the like could solve this for LTS distros.
- Security updates come faster and smoother.
- Less chance of an update breaking things. Lots of small and frequent updates, instead of rare and large update packs/stacks.
Less chance of an update breaking things. Lots of small and frequent updates, instead of rare and large update packs/stacks.
I would say a rolling distro update has a higher chance of it breaking something. Each one might bring in a new major version of something that has breaking changes in it. But that breakage is typically easier to fix and less of a problem.
Point release distros tend to bundle up all their breakages between major versions so breaks loads of things at once. And that IMO can be more of a hassle then dealing with them one at a time as they come out.
I tended to find I needed to reinstall point release distros instead of upgrading them as it was less hassle. Which is still more disruptive then fixing small issues over time as the crop up.
Although, the years I've run my rolling release system, I've had it break maybe one of two times. Easily fixed. Both of those was because there was a change that needed a manual intervention, which I did not read about until after, so those were my own fault.
I would say
Is this based on experience? Or are you guessing?
I ask because my lived experience is that rolling releases break less in practice
Before I used rolling releases, I spent more time dealing with bugs in old versions than I do fixing breakages in my rolling disto.
And non-rolling “upgrades” were always fraught with peril whereas I update my rolling release without any concern at all.
Upgrades is any security or big fix as well. Those tend to be quite safe in point release distros. Upgrading to a new point release version is has all the same problems the rolling release had over the same period all bundle in one messy upgrade (which makes them a huge pain to deal with as they often compound). But between those, the patch upgrades tend to be quite smooth.
I would say the over a longer time period rolling release break in bigger way less often. But they tend to have more but smaller breakages that are easy to trivial to fix.
You'll need to update to a point release sooner or later.
Are you the kind of person who lives to peel off the band-aid or pull it off in one go?
I prefer to peel mine. I've learned from pulling stitches by ripping it off.
On a more serious note: btrfs and timeshift are 👌. If there ever is a botched package, I'll just roll back to this morning and keep working. It'll probably be fixed by tomorrow.
They are cool cos you get to say "btw I use ".
Also, one big advantage is the end of big disruptive updates - e.g. the one from Win10 to Win11.
You don't have to live on the edge either. Arch for example has an LTS version.
For me its security patches. I frequently lock app versions manually.
I do have an old laptop that uses a fixed release, because it sees infrequent use.
One needs to adjust whats needed per usecase. For me that means daily drivers get semi-rolling or rolling. Where stability is neede/older systems, fixed releases.
I have a relatively new PC and eventually I decided at Debian Stable.
Granted, I was already somewhat familiar with APT and Debian based systems, but I also was thinking to choose something different or even a rolling release distribution...
...but at the end of the day, I wanted a stable, useable, tested and functional system that I can't easily fuck up or can restore if needed, because, well, it won't be a first time I bork a Linux system with misconfiguring stuff or doing something straight out stupid. But this is irrelevant this case.
I ain't that super familiar with Linux world, so I deliberately chose the safe way. My hardwares are working fine, I have the drivers that work for everything, games running amazingly well... in the past 2 years I use Linux as main OS, I had no problems not being bleeding edge. I kinda had some minor FOMO when Plasma 6 came out and I was "stuck" on 5 with Debian 12, but didn't had to wait too much for Debian 13 that has Plasma 6 by default. Though, I reinstalled everything when 13 came out - but only because I wanted some changes on my partition table, I added a new disk and... I wasn't quite happy how I managed some things with it so I wanted a fresh start - so wasn't upgrading to 13, but I assume it wouldn't be a problem either, not too long ago I upgraded my server from Debian 10 to 12, without issues. (From 10 to 11 and to 12. First I tried from 10 to 12, that was a disaster though. However, the documentation explicitly said not to do such thing, so it was on me.)
I was tinkering with my tech stuff all my life, I now really just want a stable, working OS. But it's just personal preference, I have nothing against rolling release and I can imagine that there are scenarios where rolling release is the better choice.
It is funny. You and I landed in different places but for almost the same reasons.
I use a rolling release because I want my system to work. “Tinkering with my tech stuff” is an activity I want to do when I want and not something I want thrust upon me.
On “stable” distros, I was always working around gaps in the repo or dealing with issues that others had already fixed. And everything I did myself was something I had to maintain and, since I did not really, my systems became less and less stable and more bloated over time.
With a rolling distro, I leave everything to the package manager. When I run my software, most of the issues I read other people complaining about have already been fixed.
And updates on “stable” distros are stressful because they are fragile. On my rolling distro, I can update every day and never have to tinker with anything beyond the update command itself. On the rare occasion that something additional needs to be done, it is localized to a few packages at most and easy to understand.
Anyway, there is no right or wrong as long as it works for you.
What exactly is the point of rolling release?
Newer features. At the cost of a higher risk of stuff breaking.
Or is it for security?
No, point release OSs do have security updates. It's feature updates that they avoid.
I use ancient hardware (as old as 2008 iMacs) and I greatly prefer rolling releases.
Open Source software is always improving and I like to have the best available as it makes my life easier.
In my experience, things just work better. I have spent years now reading complaints online about how Wayland does not work, the bugs in certain software, and features that are missing. Almost always I wonder what versions they are running because I have none of those problems. Lots of Wayland complaints from people using systems that freeze software versions for years. They have no idea what they are missing. This is just an example of software that is rapidly evolving. There are many more.
Next is performance. Performance improvements can really be felt on old hardware. Improvements in scheduling, network, and memory handling really stand out. It is surprising how often improvements appear for even very old hardware. Old Intel GPUs get updates for example. Webcams get better support, etc.
Some kinds of software see dramatic improvements. I work with the AV1 video codec. New releases can bring 20% speed improvements that translate to saving many minutes or even hours on certain jobs. I want those on the next job I run.
I work on my computer every day and, on any given day, I may want or enjoy a feature that was just added. This has happened to me many times with software like GIMP where a job is dramatically easier (for example text improvements tag appeared in GIMP 3).
If you do software development, it is common to need or want some recently developed component. It is common for these to require support from fairly recent libraries. Doing dev on distros like Debian or RHEL was always a nightmare of the installed versions being too old.
And that brings me to stability.
On systems that update infrequently, I find myself working against the software repos. I may install third-party repos. I may build things myself. I may use Flatpak or AppImage. And all of that makes my system a house of cards that is LESS stable. Over time, stuff my distro does not maintain gets strewn everywhere. Eventually, it makes sense to just wipe it all and start fresh. From what I see online, a lot of people have this experience.
On of the biggest reasons I prefer rolling releases with large repos is because, in my experience, they result in much more stable systems in practice. And if everything comes from the repo, everything stays much more manageable and sustainable.
I use Debian Stable on servers and in containers all the time. But, to single it out, I find that actually using it as a desktop is a disaster for all of the above reasons but especially that it becomes an unstable mess of software cobbled together from dozens of sources. Rolling releases are easier to manage. This is the opposite of what some others say, I realize.
In fact, if I do have to use a “more stable” distro, I usually install an Arch Linux Distrobox and use that to get access to a larger repo of more frequently updated packages.
Where did the idea come from that rolling releases are about hardware?
Hardware support is almost entirely about the kernel.
Many distros, even non-rolling ones like Mint and Ubuntu, offer alternative kernels with support for newer hardware. These are often updated frequently. Even incredibly “stable” distros like Red Hat Enterprise Linux regularly release kernels with updated hardware support.
And you can compile the kernel yourself to whatever version you want or even use a kernel from a different distro.
Rolling releases are more about the other 80,000 packages that are not the kernel.
For software developers, it is better to have frequent tiny changes that can break things, than a big mess of breakage.
Do you hate distractions? Do you love steady improvements? This will affect your preference and judgement about rolling release.
The same can be true for desktop users. It also depends on how stable your software is. If you use mainly vim, dwm, and LaTeX, very few changes will break your flow.
Sam Altman’s Dirty DRAM Deal
TLDR:
OpenAI made a deal to secure 40% of the global supply of wafers from both SK Hynix and Samsung (2 of the 3 large providers of RAM) ostensibly for project Stargate server farms. But it gets so much worse, they made both deals on the same day without advising the other company, and have not provisioned any way to actually use (make chips from) the wafers. It looks more like they’re just trying to keep RAM out of the hands of their competitors.
From there the laws of supply and demand and panic buying by everyone else took over, RAM prices are going to the moon, and Micron (the third big provider) dropped out of the consumer market because they’re gonna make bank in the server market as the only unencumbered company. Consumer general purpose computer customers are royally boned. This will flow through into the SSD market as well.
In short, Fsck the AI industry in general and Fsck ‘OpenAI’ and Sam Altman in particular. If you pray, pray that this deal gets a legal injunction in South Korea, coz you know the US will just applaud this fsckery.
like this
Robaque, Nobilmantis e LievitoPadre like this.
en.wikipedia.org/wiki/Stonewal…
It resulted in the liberation and elevation of an entire segment of society from the darkness of repression.
What violence has actually sprung from leftist internet memes? You give them way too much credit.
You know that claims of a rising tide of “far-left violence” are fake news, yeah? This bullshit narrative is pumped out by the far-right and by corporate media (otherwise known as the bourgeois press) and by NGOs who get their funding from the bourgeoisie.
Also: en.wikipedia.org/wiki/Bad-jack…
Bad-jacketing is a term for planting doubt on the authenticity of an individual's bona fides or identity. An example would be creating suspicion through spreading false rumors, manufacturing evidence, etc., that falsely portray someone in a community organization as an informant, or member of law enforcement, or guilty of malfeasance such as skimming organization funds.Fed-jacketing, and Snitch-jacketing are variants of bad-jacketing that specifically aim to present the target as an informer.
Edit to add: It seems you’re seeing feds at every turn.
- sh.itjust.works/comment/216783…
- sh.itjust.works/comment/201743…
- sh.itjust.works/comment/201705…
- lemmy.ml/post/33325225/1992540…
- lemmy.ml/post/32371812/1954712…
- lemmy.ml/post/32371812/1954024…
- lemmy.ml/post/32371812/1953240…
Bullshit. Show me one admin who claims Lemmy has a “troll farm” problem. Only non-admins make such claims, usually ones suffering Russiagate derangement syndrome.
The closest thing to a troll farm I’ve seen so far is these several user accounts that only post news articles disparaging the US’s enemies.
3½ years of anti-China & anti-Russia news posts by several similar Lemmy accounts
What they seem to have in common is:
- Way more posts than comments.
- Almost exclusively posting news articles.
- The vast majority of the articles are critical of Russia or China.
- Virtually always posting to the same few communities. Often there’s overlap in the communities the accounts target.
- Consistent weekly output.
Username Start End tardigrada@beehaw.org May 2022 Dec. 2024 0x815@feddit.de Apr. 2023 Jun. 2024 thelucky8@beehaw.org Apr. 2024 Jan. 2025 0x815@feddit.org Jun. 2024 Dec. 2024 Anyone@slrpnk.net Jan. 2025 Apr. 2025 @randomname@scribe.disroot.org Jan. 2025 – @Hotznplotzn@lemmy.sdf.org Jan. 2025 – @Scotty@scribe.disroot.org Aug. 2025 – @Sepia@mander.xyz Nov. 2025 – FYI, @haui@lemmygrad.ml, you had this to say back in June on !europe@lemmy.dbzer0.com, before the post was removed by a mod:
OP is one of their propagandists from the looks of it. Please look at the post history and report if you see a pattern.[Edited to update links for thelucky8@beehaw.org and and the archived post]
Who threw the first brick at Stonewall? A final and definitive answer to the internet’s favourite question
Who threw the first brick at Stonewall? Depending on who you ask, the answers range from Stonewall trailblazer Marsha P Johnson to Lady Gaga's ponytail.Reiss Smith (PinkNews | Latest lesbian, gay, bi and trans news | LGBTQ+ news)
Man this is lemmy whiplash. One thread judging Americans for not starting a rebellion and the next saying we shouldn't throw bricks at cops.
What do you people think rebellion is?
Rebellion involves guns. Until we're ready for that, inflatable chicken suits are the meta.
The current battlefield is in the minds of the non-radicalized. Bricks only hurt us in that battle. Watching inflatable chickens being shot with rubber bullets helps us win.
Not very familiar with the lead up to the American Revolution are we?
Lots of things being thrown
I feel like in America you should be able to do better than a brick. Cars and guns everywhere.
Throw a car full of guns.
Leaders≠organization
Often counter to it. Terrible structure. Does not fix this problem.
Without leaders? Without central points of failure? Without cults of personality?
That's like saying how would you make pizza without Elmer's glue, because clearly we don't have pizza here yet.
Were Pallets of Bricks Strategically Placed at US Protest Sites?
Government officials, law enforcement, billionaires, or antifa groups nefariously placed pallets of bricks at protest sites in U.S. cities to stoke violence during June 2020 demonstrations against police brutality.Jessica Lee (Snopes.com)
Most of the claims against that are tweets by police. And the police have never been caught lying, right?
"Mostly false" should be turned into "insufficient evidence" because there doesn't seem to be convincing evidence on both arguments.
Which is more likely?
(a) The police ordered seven tons of bricks to be delivered to a location where a protest might occur sometime in the near future, in the hopes that they would be thrown at them by protestors, so that they could arrest them.
(b) Construction site brick piles are a common occurrence in urban areas.
Reporter: [REDACTED]
Reason: Inciting violence. Explicitly saying to mutilate another human being by throwing an actual brick at them
*Clutches pearls*
Inciting violence. Explicitly saying to mutilate another human being by sniping them out of their Merkava with an actual Ghoul rifle
Here in Italy they hit someone so hard he died of internal injuries. Cops aren't innocent.
Will game studios care about the Steam Machine?
Some gamers have graphics cards that cost probably two or three times as much as the whole Steam Machine.
Will studios focus on the RTX 6090 or give slower machines a chance?
Are the Steam Machine's components good enough to run PS5 ports?
Why ‘Death, Death to the IDF’ is Trending — And Who They Really Are ['Paint it Black' montage of Israeli atrocities] - originally on reddit
Why ‘Death, Death to the IDF’ is Trending — And Who They Really Are
https://www.reddit.com/r/Israeli_Violence/comments/1lpsxjz/why_death_death_to_the_idf_is_trending_and_who/TankieTube
like this
Che's Motorcycle, AF_R [he/him], cfgaussian, rainpizza, MusclesMarinara, Lowleekun [comrade/them, he/him], Ashes2ashes, BassedWarrior, PeeOnYou [he/him], psycocan, ComradZoid, stink, Maeve, durduramayacaklar, TheTux, Malkhodr, atomkarinca e Zaalbar22 like this.
Short Demo: Project Wingman + Opentrack with Neuralnet Tracker
cross-posted from: discuss.tchncs.de/post/5009673…
Got a new disk and reinstalled my system (Fedora 43). Followed my own guide how to compile Opentrack with the Neuralnet tracker plugin: simpit.dev/systems/opentrack/Worked fine but needs some build dependency updates meanwhile, like qt6 instead of qt5. Still amazed how good the Neuralnet tracker with ONNX runtime is.
Short demo video: makertube.net/w/bC93YNXQ4aE4ha…
Opentrack - The Simulated Cockpit On A Linux PC For More Immersion In Space Pew Pew
Strategies to get head tracking working via Proton or Winesimpit.dev
Gentoo experience?
Hi, i am thinking of switching to gentoo, and wanted to ask if its a good idea. Anything i should look out for?
Btw im coming Form arch
Thx :3
like this
eshep likes this.
I loved how tailored to me was Gentoo. But as time passes and your hardware gets older, the compilation times get longer and longer. That's what made me to do the hop
I've heard some time ago that now Gentoo is offering more pre-compiled packages. But I don't know the extent. libstd, gcc and libreoffice were the worst offenders in my time
If you're going to be compiling your own kernel (or now Gentoo ships with pre-compiled ones too?) my word of advice would be "don't forget to compile in the filesystem support"
if you have the time for it, then go for it.
Keep in mind and i'm sure you already know this but you have to compile everything yourself so it WILL take time. I have it on a sort of hobby machine and I remember just getting Firefox to compile/install took awhile. The benefit of this is you get an extremely custom tailored system for yourself. But like I said it's going to take you awhile to get to that point. If you want something immediate to daily drive and want more of a custom system as opposed to Arch then maybe give NixOS a shot. I switched from Arch to NixOS on my main machine and I love it, won't use anything else. But if you're patient and have the time to dedicate to Gentoo then go for it, it's fun to play around with on a Saturday afternoon.
If you want something immediate to daily drive and want more of a custom system as opposed to Arch then maybe give NixOS a shot
IMO the main customization part of Gentoo is that you can compile the world without the libs you don't want to have. With NixOS (AFAIK) being also package-based, how can it offer more custom system than Arch?
Im not, arch is a nightmare for me. I try to installiert something over pacman: ERROR. I try to fix the error, doesnt work because it needs certain shared library files... That i can not find.
But thats not the only thing, somehow the Servers are allways down and its not a nice little challange anymore. More like a piece of code designed to make me miserable.
I hope thats different in gentoo 😀
Well, to be honest, you're choosing the two most difficult distros to manage.
It sounds like you're kind of new to the area...why not just use Fedora?
That's...an opinion that is not backed by any facts at all. What in the world are you talking about with "bloat" 🤣
So you're a newbie, and making lots of wild claims and taking awfully opinionated positions in this thread all over the place. I don't think you want help, so just be on your way 👍
Why do i need bluetooth compatibility if i dont usw it, why wifi?
If i dont want help, why would i ask?
Because they occupy so small disk size that they don't matter and it's easier to have it and not need it than need it and not have it. I wouldn't call hardware support bloat ware.
Also, just so you know, Arch has Bluetooth and wifi compatibility even if you don't install the packages, Gentoo does not. You would need to recompile your kernel with the correct configuration to enable those for your specific card.
Arch is just as bloated as Fedora, Mint or Bazzite. Hell, my Arch is a lot more bloated than any of those. This is Linux, the system is as bloated as you want it to be, but also having stuff installed doesn't necessarily causes your computer to be slow, programs only execute when you tell them to.
Bluetooth is a fucking security risk, wifi too.
I dont care how bloated your os is. Also BLAOT IS WHY IM SWITCHING
Do you know about limited disk space? Cuz that doesnt seem to be a problem for you, maybe it is for tho? Who knows?
Bluetooth is a fucking security risk, wifi too.
Sure pal, big security risks. You should learn about cyber security before regurgitating information. Having the chip is not a security risk, having the open source driver isn't either, the security risk is 99% between the screen and the chair.
I dont care how bloated your os is. Also BLAOT IS WHY IM SWITCHING
My point is that Arch is not inherently unbloated, any distro can be bloated, any distro can be unbloated, you decide what's bloat and what's not.
Do you know about limited disk space? Cuz that doesnt seem to be a problem for you, maybe it is for tho? Who knows?
We're talking less than 100MB here, if your disk space is that limited you should really consider upgrading. Especially if you're going to try Gentoo, because not only it requires more disk space but if you can't afford a cheap 1TB drive chances are your CPU will take a week to install Gentoo since you need to compile everything.
I'm sorry for being blunt, but Arch is very easy and plug-and-play like, if you're having these sorts of issues my guess is that you're not familiar with Linux and are doing stuff "wrong" (e.g. installing drivers from a website). Gentoo is a LOT more complicated and will hold your hand a lot less than Arch, I recommend you try something more beginning friendly like Mint, Fedora or Bazzite, learn the basics, learn the "Linux way" of doing stuff, then try Arch again, then, when you have a better reason than because I broke it, you can try Gentoo.
This is not a "you're too dumb to do it" answer, but imagine someone who's having issues driving a shift stick car asking how it's like to rebuild the engine. You're capable of rebuilding the engine yourself, you're able to use Gentoo, just not now, learn to walk before you try to bungee jump.
Why do you think Mint/Ubuntu/Fedora/Bazzite are not that though? It seems you don't know how to ask your system to do stuff because otherwise your Arch install wouldn't break. Plus I bet that the default installation of any of those distros occupies around the same disk space than what you have now.
Honestly you read like an angsty teen who read Arch is advanced and wants to be 1337 by using it, a few years back you would have been using Kali. Let me tell you a secret, Arch is not advanced, it's a very easy straightforward distro, it just starts from a mostly clean slate, but if you're using gnome/kde/cinnamon or any DE that distros come prepacked with its just as bloated with extra steps.
I know, that arch isnt hard, its too easy. I installed Linux to challenge myself. Arch WAS a callange. Now i want something New. And harder.
Btw. You can choose what bloat you want to have in your system (only DE vor goodies too)
It's easy but at the same time your system is always broke? Either you were lying there or are now.
Btw. You can choose what bloat you want to have in your system (only DE vor goodies too)
Precisely my point, you keep mentioning Arch as being Bloat free and complaining that Fedora or others are bloated.
I used Gentoo for a few years. I don't recommend it at all!
first off, there are no tangible advantages. it's not faster. it is more customizable (by use flags), but the only tangible advantage of those is bragging rights saying you kept a certain library off your system and saved 100kb. just enabling all features is more practical.
there are tangible disadvantages. a big system upgrade can take days. and often fails. and, the manual time you spend merging config files with dispatch-config is large.
I switched from Gentoo to debian after 3y of using Gentoo. i switched from debian to arch after about 10y later. been on arch for about 6y now. would not recommend Gentoo
I mean, you can cross-compile to generate a Gentoo rootfs for the embedded system.
I worked on embedded systems for audio devices. I of course endorsed Alpine as well, but with musl as the C library I got weird bugs of stuttering audio output.
With Gentoo I get the option to build my entire system with musl as well, but I would rather have that bug not in my system. That's what Gentoo offers: options.
By "LFS", I think you mean Buildroot, practically. Buildroot is also highly customisable, but Buildroot isn't a distro. Like LFS, there is no way yo update a system, only rebuilding with latest packages. It also does not have flags for the whole system, so you're on your own if you want to disable, say IPv6, in the whole system.
Only if you need fine tuning compilation flags.
But if think it's easier to do with Arch's custom PKGBUILDs.
Otherwise too much work to keep it stable, waiting for a compilation to finish.
All Gentoo users remember the pain of compiling QtWebEngine ;)
I used to run Gentoo on my old computer. Installing it was quite the experience. That was where I learnt about most of how Linux works thanks to the wiki.
I heard compiling your own packages with use flags can improve performance, but honestly it was not worth it for the compile time.
When I switched to my new PC, the Nvidia GPU doesn't work and I could not figure out why. I also don't have the time at that moment so I installed Endeavour instead, which I'm still using.
Its fun to learn how the system works, but after the 4-5th time trying to install something real quick, and there's an error in your package.use or something, it gets a lot less fun.
If you have the time and patience, its really cool. But I just want a web browser without having to edit 3+ text files to allow it to work.
Comments complaining how everything takes time to compile in Gentoo are kind of funny, do you really need everything to be installed asap?
That being said, Gentoo indeed is not for everyone. I've been using it for +15 years and am really happy with it - almost zero maintenance and it's super stable. The crux is the time it takes to be installed and people hold a weird grudge against it just for that.
But at the same time there are more distros oferring pretty much the same, i.e. your own arch.
It's thanks to Gentoo that I've been a Linux sysadmin for over 20 years.
That being said, I've since moved to Arch and then Debian.
Some points:
On modern systems you won't really notice any speed improvements from custom compiling the packages. Apart from maybe some numbers in articial benchmarks.
On old systems with very limited resources, you can eke out a bit of more performance.
Back when I was still using Gentoo, my proudest moment was getting a Pentium 1 with 96MB Ram (Yes, MB!), which was a gift of a colleague to his broke brother, into quite a useable little machine. Browsing, listening to MP3s, email, some simple games.
I also noticed a noticable improvment in performance in a 400mhz Athlon I had setup for my mom.
That being said, I was only able to do this, because I was using distCC to distribute compiling across several machines to keep compile times to a somewhat sane level. Also, I was doing a unpaid internship at the time, so I basically had all the time in the world, so compile times didn't really bother me.
I had tried to use linux before. After Windows XP crashed one too many times. I decided to see how things work on Linux. I initially chose a "easy to use" desktop distro. (Mandrake Linux). Got everything setup. Even 3D Accelaration worked. Everything was really nice and fun. Then I tried to tinker under the hood and I broke something that I couldn't figure out how to fix. So I thought, maybe I need to find something even easier, so I chose Suse Linux.
Same story. Set everything up. Desktop working, 3D working, etc... start to tinker, break something, back to square zero.
Then I decided to change my approach and choose the hardest distro. The choice was between Linux from Scratch and Gentoo. Linux from Scratch sounded waay to painful, so I chose Gentoo.
It took me 3 days until I had a somewhat working system without a desktop. Then another 3 days until I had a desktop running Fluxbox.
But the learning experience was invaluable. Being forced to use the CLI and not only that, but more or less configure everything by hand. It takes aways the fear of the CLI and you get a feel for where everything is located in the filesystem, which config files do what, etc... It demystifies the whole thing substantially.
You suddenly realize that nothing is hidden from you. You are not prevented from accessing anything or tinkering with it.
The downside is that Gentoo takes a lot of time and effort to maintain. But the learning potential is invaluable. Especially if you use it to also start doing little projects in linux. e.g. File server, router, firewall, etc...
Me knowing Gentoo, got my first real job as Linux Sysadmin and before long I was training rookie Admins. And the first thing I always did with them was to run them through the Gentoo bootcamp.
Once they go to grips with that, everything else wasn't that difficult.
Take your time with the install process. It's possible that you may breeze through it. It's also possible that you may discover that, say, there's something wrong with the EFI implementation of the system you're installing to that you need to do some research to resolve. I've had both experiences.
Once installed, Gentoo is pretty much rock-solid, and almost any issue you have can be fixed if you're willing to put the effort in. Portage is a remarkably capable piece of software and it's worth learning about its more esoteric abilities, like automatic user patch application.
Do take the time to set up a binary package host. This will allow you to install precompiled versions of packages where you've kept the default USE flags. Do everything you possibly can to avoid changing the flags on webkit-gtk, because it is quite possibly the worst monster compile in the tree at the moment and will take hours even on a capable eight-core processor. (Seriously, it takes an order of magnitude more time than compiling the kernel does.)
Install the gentoolkit package—equery is a very useful command. If you find config file management with etc-update difficult to deal with, install and configure cfg-update—it's more friendly.
If you're not gung-ho about Free Software, setting ACCEPT_LICENSE="* -@EULA" (which used to be the default up until a few years ago) in make.conf may make your life easier. Currently, the default is to accept only explicitly certified Free Software licenses (@FREE); the version I've given accepts everything except corporate EULAs. It's really a matter of taste and convenience.
Lastly, it's often worthwhile to run major system upgrades overnight (make sure you --pretend first to sort out any potential issues). If you do want to run updates while you're at the computer, reduce the value of -j and other relevant compiler and linker options to leave a core free—it'll slow down the compile a bit, but it'll also vastly improve your experience in using the computer.
(I've been a happy Gentoo user for ~20 years.)
like this
eshep likes this.
Gentoo is very much like an manual transmission. If you ask anybody that drives manual they will say 1 of 2 things "i like it because it gives me control" or "i use manual because i always have"
I love gentoo as playing around and trying stuff out. My personal recommendation is use ZFS or btrfs for a file system and have subvolumes. So if you get so lost in the rabbit hole you can climb back up.
If your philosophy is" stable and mine!"
Gentoo is for you.
You can build a distro, with all the packages you want and once your done if you decide to update every month and dont care a whole lot about bleeding edge. It will work really well, it you want bleeding edge, you can have portage use ustable packages with a stable system. But you really must know what your doing or you WILL BREAK STUFF.
I ran gentoo for 6 months then went to debian, its a great learning tool for understanding how linux works under the hood. I would also recommended systemd over openrc.
Its not that openrc is bad, its just alot of extra work for simple things to work.
Gentoo to me is more a messing around on a spare computer distro, than a production computer. Not that it cant be production, but im personally very lazy when i just want to use my personal pc.
Gentoo user since forever.
The most consistent and long time solid distro, IMHO.
I use it everywhere I can, from servers to laptops. It's so flexible and predictable that I simply love it.
Nowadays emerging stuff is so fast that I wonder why bother with binary packages at all. Once, when compiling Firefox took DAYS well.... But in today's hardware, meh.
;)
If I could give only one reason to use Gentoo, it would be the community.
Anyway, if you choose this route, read the handbook through like a book first. Get an idea what you want your endpoint to be, then start.
like this
eshep likes this.
/etc/portage/make.conf, setup /etc/portage/repos.conf/gentoo.conf with sync-type = git, and use /etc/portage/package.{use,mask,unmask,accept_keywords} as directories for individual packages. I tend to keep a /etc/portage/package.mask/failed file for upgrade blockages fer me to unfuck after a emerge -avuDUN @world succeeds.
Sanctioned spyware maker Intellexa had direct access to government espionage victims, researchers say
Based on a leaked video, security researchers alleged that Intellexa staffers have remote live access to their customers' surveillance systems, allowing them to see hacking targets’ personal data.
Total War: Medieval III announced as "the rebirth of historical Total War"
Creative Assembly is celebrating 25 years of Total War by bringing the series back to its roots. Total War: Medieval III is being built on a freshly upgraded engine as well.
https://www.neowin.net/news/total-war-medieval-iii-announced-as-the-rebirth-of-historical-total-war/
German broadcaster backs Israel in Eurovision debate
Berlin (AFP) – The public broadcaster organising Germany's entry for Eurovision said Thursday that Israel was entitled to compete in the contest, as European broadcasters debate whether to exclude the country over its conduct in Gaza.The broadcaster SWR said in a statement sent to AFP that "the Israeli broadcaster KAN fulfils all the requirements for participation" in the contest.
German Chancellor Friedrich Merz, a strong supporter of Israel, said in October that the prospect of Israel being excluded was "scandalous" and that he would advocate Germany boycotting the contest in that case.
The European Broadcasting Union (EBU) is currently holding a two-day meeting in Geneva to discuss the issue, with several countries threatening to pull out if Israel is allowed to take part.
SWR said that the Eurovision Song Contest has for decades been "connecting people in Europe and beyond -- through diversity, respect and openness, regardless of origin, religion or worldview.
"It is a competition organised by EBU broadcasters, not by governments."
It added that "we are confident a solution can be found in keeping with the principles of the EBU the competition".
"There can be no Eurovision without Israel," Culture Minister Wolfram Weimer said Wednesday in comments sent to AFP on Thursday, adding that the EBU should reflect "European values" in its decision.
Germany has traditionally been a steadfast supporter of Israel although Merz has criticised its campaign in Gaza, which has killed at least 70,000 people, according to figures from the health ministry in the Hamas-run territory that the UN considers reliable.
Past editions of the competition have also become embroiled in politics.
Russia was excluded after its 2022 full-scale invasion of Ukraine, and Belarus was shut out a year earlier after the contested re-election of President Alexander Lukashenko.
At the time of Russia's exclusion, Germany's public broadcasters ARD and ZDF welcomed the move.
"If a participant country of the ESC is attacked by another, we stand in solidarity within the European ESC family," they said then.
"Therefore, the decision against Russia's participation... is correct."
"There can be no Eurovision without Israel," Culture Minister Wolfram Weimer said Wednesday in comments sent to AFP on Thursday, adding that the EBU should reflect "European values" in its decision.
Per this moron anything apart from exclusion would mean "European values" are support for war crimes, crimes against humanity and genocide.
ORbituary
in reply to NightOwl • • •