• 12 Posts
  • 460 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2024

help-circle


  • Agreed. But he’s also an abrasive know-it-all. A modicum of social skills and respect goes a long way towards making others accept your pet projects.

    This isn’t what I get when reading bug reports he interacts in. Yeah, sometimes he asks if something can’t be done another way – but he seems also very open to new ideas. I rather think that this opinion of him is very selective, there are cases where he comes off as smug, but I never got the impression this is the majority of cases.

    I wasn’t talking about the protocol, I was talking about the implementation: PulseAudio is a crashy, unstable POS. I can’t count the number of hours this turd made me waste, until PipeWire came along.

    PipeWire for audio couldn’t exist nowadays without PulseAudio though, in fact it was originally created as “PulseAudio for Video”; Pulse exposed a lot of bugs in the lower levels of the Linux audio stack. And I do agree that PipeWire is better than PulseAudio. But it’s important to see it in the context of the time it was created in, and Linux audio back then was certainly different. OSS was actually something a significant amount of people used…


  • Prohibition and the war on drugs sure worked out well when they were implemented. Surely this time …

    This isn’t about making it legal, but about requiring age verification. To bring it closer to your example: stores shouldn’t check your she when buying booze, selling to everyone because if minors don’t get it there, they’ll get moonshine somewhere else, which is worse.





  • This is an issue with these half-baked security solutions.

    Don’t get me wrong: the setup protects against some very common threats (i.e. device gets stolen). But they’re unsuited for evil maid attacks.

    Secure Boot isn’t flawless, but it can improve system security if used correctly; unfortunately, most distributions don’t go all the way as demonstrated here. I guess this can be solved via UKIs, but anything built on the users machine like an initramfs can’t be signed properly if no user TPM keys are enrolled and available during generation.

    The issue I have with all this is that these distributions don’t really tell you that the security they provide is ultimately limited. Personally, I have custom TPM keys, the initramfs is signed, I unlock via TPM PIN and the emergency mode is disabled. Also UEFI needs to be password protected so that an attached can’t modify your booting parameters, though this couldn’t be done undetected because it’d break TPM supported boot.




  • With administrative, I meant that IT is a about information flow - defining rules how data is consumed, transformed and ultimately output. These by definition of a classic business I’d see as administrative.

    I agree the wording isn’t good, and I didn’t mean it as in “anyone working in IT is just performing administrative tasks”, but rather that the field of IT is traditionally more of an enabler of other businesses.

    The mechanic is usually the actual worker - you run a repair shop - but his spare parts management is an administrative task, and nowadays usually implemented by an IT solution.


  • At least in some cases, it might just be wholesome advice. The fact that you have “a job” and a whole different persona from that and they’re two separate things that sometimes intertwine probably brings you closer to us in administrative tasks (in the end, IT is by definition always something administrative rather than actually productive) than me as in an IT guy with an influencer. Because ultimately, your actual identity is your job, and by conclusion, your whole life is performative, which sounds REALLY exhausting