

"the defendant and many others have used screen recording to copy content. "
Ah, the defense pointed out this exact same thing. This isn’t a final ruling, we’ll see what the judge thinks about screen recording.
05c9cf37854b6cdcfeeddff6d7f849e46d949f915fcc1931fcf2ce66303d47c553


"the defendant and many others have used screen recording to copy content. "
Ah, the defense pointed out this exact same thing. This isn’t a final ruling, we’ll see what the judge thinks about screen recording.


Does screen recording count as circumvention with 3rd party tools? It make take a while longer, especially for high quality videos that chop up the content, but YouTube reactors could be safe.
And how do they prove that it was ripped, and not just screen recorded? It wouldn’t look different, right?


It’s not user-oriented the way the distros based on it are. apt is mediocre and slow compared to a lot of other distros package managers.
The out of date software is really important for new users for one big reason, and that’s hardware compatibility. Arch Linux, especially with AUR DKMS, can work with basically anything supported by Linux. Debian will struggle with anything sorta new. Having on old kernel, like Debian does, is one of the worst things a distro can do, for performance, for compatibility, and more.
Their software is also actually super duper out of date, too. To the point where KDE on Debian and Kubuntu is several versions out of being supported. A lot of software developers are sick of people reporting fixed issues because the user is using Debian, so they tell them to use a more up to date distro.


Very interesting that he points out that a guy is Jewish, does not give good vibes. Ofc most of the things he’s done don’t give me good vibes either.
Anyway, I can’t remember the last time I’ve used Mega, for anything. None of the cool sites use them, afaik. There’s like a million better sites now, and the best stuff is in Russia, since they barely touch piracy sites. it’s so often in a piracy sites lifecycle for them to start on a normal tld, get banned, move to a weird tld, get banned, then move to a cool foreign countries tld.


I mean, that’s why full disk encryption (FDE) is more important than a normal user password, so when someone successfully has access they can’t get your data. The US government can’t force you to decrypt data, since passwords are considered protected by the 5th amendment.
Most crimes are crimes of opportunity, it’s unlikely that someone is robbing a house specifically for whats in your computer, so if they can’t mess around with your computer they’ll just try to steal anything else valuable in a home. If they do just take the whole computer, with full disk encryption I wouldn’t have to worry about them looking through my files, or impersonating me on the internet, or whatever.
I guess with your threat model having no user password just isn’t a big deal for you, it’s probably fine. FDE though…


I use run0 and pkexec in the Terminal! Only sometimes though.


PolicyKit
Technically polkit now, after the breaking change. It’s really not equivalent to UAC, because UAC does this “secure desktop” thing. Y’know how it becomes just the UAC prompt and a background sometimes? With no taskbar or other programs? It does that to restrict access to UAC.
With polkit prompts, there’s nothing stopping a mouse automation tool from accepting the polkit elevation request, so passwordless would be a guaranteed escalation attack, I tested software clicking the polkit buttons. A tool can’t do that now only because it doesn’t now your password. Implementing a “secure desktop” in polkit would be a big change in the architecture of security for Linux.


What if someone guesses your password?
It’s randomly generated, brute forcing it should take years.
Why don’t you keep your computer in a custom built safe bolted to the floor?
I mean, I do keep it locked to stuff with a Kensington lock.
Sometimes I mistype, wasting 10+ seconds
Fair, sometimes caps lock will do that to me.
I’m not saying you have to use a password, I’m just curious. I don’t think I know anyone IRL that doesn’t use a password with their computer.


Nobody lives with you? Or visits you? You don’t use a laptop ever? What if someone does get through your locks?
You can set empty password up pretty easily, so you’ll just press enter to get through password prompts, just like how you’d click through password-less UAC prompts. Richard Stallman used to recommend that way back in the 80’s, on the big shared University machines.
I highly recommend a full-disk-encryption password even if you don’t have a traditional computer password, it’ll keep your data extra safe. Imagine the feds raid your house because Hexbear got designated a Foreign Terrorist Organization, the feds couldn’t get any Hexbear data off of the disk if it’s locked.
But it really feels like even if a password doesn’t add much security-wise, there’s basically no downside to it. My password is pretty long by conventional standards, but it takes a small fraction of a second to type it all out and login.


The idea of not having a password at all is just so foreign to me, did you at least use biometrics or something?
It seems like not having a password would make some UAC bypasses easier, too.


Physical access isn’t game over, it’s only game over to a determined hacker. The vast majority of people aren’t competent enough for it to be an issue. It’s just like how a determined thief can get through almost any lock or door, but it takes effort and time, and skill which many casuals just won’t have.
Full-disk encryption passwords are the most important password, they can prevent physical access from being game-over.
Unix was originally designed to be multi-user, so different passwords protect different users from each other.
Linux doesn’t have a UAC-without-passwords equivalent really, programs can interact with the Linux UAC equivalents just as much as you can, so the password makes sure it’s really you, and not a malicious program or person. UAC on Linux would require an almost fundamental architecture change, in a way contrary to most of how Linux is used now.
Did you really never use a password with Windows? That seems wild to me.


But did they survive fine?


I was never a Reddit poster, and I didn’t find Lemmy from Reddit (chapotraphouse was long gone when I joined), so it really wasn’t that hard.
I use Redlib occasionally to read Reddit posts, sometimes I need to find obscure things real humans have talked about. You could try setting up Libredirect so you can only see the Redlib version of Reddit (no posting, less algorithm, no interactions, and sometimes it goes down so you’re forced to take a break).


Happy to be of help!
Second Thought even did at least one AMA on Lemmy, through Hexbear. JT’s read words I’ve written, and he’s written words in reply!


He used to be one of those guys that breadtube dunked on a lot, but he wasn’t as big as Shapiro or Crowder. People used to edit his face small, and make fun of him. He had a few million youtuber subscribers, but a few million less than the other big names on conservative youtube. For context, the largest communist channel on youtube is Second Thought with 1.8 million subscribers, he had more than double that.


youtube pfp to clippy ?
That would require having a YouTube/Google account, so no


Well, Ubuntu uses Snap, which is a rather poor packaging solution that basically no other distro has adopted. By default it’s a little bloated, it’s made some controversial decisions (rust coreutils), and other distros just do what Ubuntu does better (like Mint)
r2modan?
Go to the piracy Wiki, there’s a bunch of websites where you can do direct downloads. That way you won’t have to torrent, and therefore don’t have to worry about your ISP looking and complaining about that unencrypted torrent traffic.