Copying is not theft. Letting only massive and notoriously untransparent corporations control an emerging technology is.
Copying is not theft. Letting only massive and notoriously untransparent corporations control an emerging technology is.
Accessing printers? Resolving hostnames of internal hosts? I can’t imagine having a lan without mDNS
I don’t think it’s quite as simple as someone just forking it. Realistically, a browser is an extremely complex piece of software that requires a lot of organizational effort to maintain, deal with security issues, etc. Pretty much every other piece of software on a similar scale I can think of (the kernel, KDE, Blender, Libreoffice) has some sort of organization behind it with at least some amount of officially paid work. All the major forks of Firefox or chromium follow quite closely to upstream for this reason (which is also why I’m skeptical of Brave’s ability to maintain manifest v2 long term, despite their probably genuine best efforts to do so).
I do wish that Firefox were developed and funded by an organization specifically dedicated to developing it. This could of course happen if Mozilla dies. But that’s going to require someone starting it, which is not at all a small or cheap task.
I could also see a future where Oracle or IBM buys it 😂🤡
It is based on the assumption that every piece of code in the entire stack from the UEFI firmware to the operating system userspace is free of vulnerabilities
Whenever I want to pirate something I just go straight to btdig. And if there’s no torrent and I really need to search the web, I’ve had much better luck with Yandex. I figure they’re more resistant to takedowns from western corporations
This one is already in the default uBlock filters - Badware risks
I also strongly suggest adding https://big.oisd.nl/ as a filter list. It’s a large and well maintained domain blocklist (sourced from combining lots of other blocklists) that usually adds lots of these sorts of domains quickly and has very few false positives.
If you want to take it even further, check out the Pro list and Thread Intelligence Feeds list here https://github.com/hagezi/dns-blocklists
These can all be added to a pihole too if you use one.
This is why ublock origin is an essential security tool.
This is a forum for general discussion, not a question and answer board.
Companies cry the same way about the bills to ban end to end encryption, and they’re still bad for consumers too
It’s useful for security researchers to collect and analyze what the newest attack bots are trying to do, in order to learn how to defend against it and study the malware they drop. There are some cool videos on YouTube about decompiling malware dropped by the bots.
Maybe try Stash, it has gallery support too https://github.com/stashapp/stash
Also, what about jellyfin itself? It also supports photos
Did you… watch the video? You act as if he’s bashing the fediverse or isn’t a strong supporter of it
Do you realize that you are fighting against an open Internet?
Lots of malware gets hosted using dynamic DNS domains, so they (or more likely some bot) probably saw the domain frequently showing up in malicious activity and blocked it without understanding that it itself isn’t the source of the malicious activity.
You can use cryptsetup-reencrypt to encrypt an existing disk in place with LUKS. Then you just have to modify the initramfs/bootloader/fstab to point to the new configuration. See https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Encrypt_an_existing_unencrypted_file_system
Agreed, although I preferred fmhy due to its far less strict defederation policy
Framework