If you just want to browse, use a redlib instance.
- 19 Posts
- 732 Comments
My favourite unusual one is sichuan pepper powder on garlic bread. Originated in me rummaging through my spices for stuff to add to my garlic bread and I really liked this. I now add it to garlic bread, pizzas, that sort of thing.
Cumin is also a great all purpose spice I put on many things. Cumin+turmeric for curry-flavoured things, but also cumin+salt+pepper+rosemary+garlic granules for anything roasted.
My mostly-vanilla (ie mods don’t hugely change gameplay/add anything crazy) Rimworld runs fine on my probably what’s considered mid-range PC. I second the other commenter; you probably need to cut back on the mods.
You’re shadowboxing with a nonexistent Linux user. People do that kind of stuff as a hobby, not for status. Most people who are into that sort of thing are too asocial to use any social capital they might have anyway.
This isn’t gen Z slang. It’s largely butchered AAVE (which is an entirely valid dialect with its own internally consistent grammar and vocabulary). Many such cases.
communism@lemmy.mlto
Privacy@lemmy.ml•Leak confirms GrapheneOS & Motorola partnership for non-Pixel hardware - PiunikaWeb
131·14 days agoIt’s great to see a mainstream OEM work with GOS. I really hope Motorola will make phones with an actual headphone jack. That’s my no. 1 complaint about modern Pixel hardware.
communism@lemmy.mlto
Asklemmy@lemmy.ml•The hammer and sickle symbolized the biggest groups of proletarians, manual laborers and farmers. What would today's symbol be?
36·22 days agoIt didn’t symbolise that. It symbolises the unity between the industrial proletariat and the peasantry. It’s not about different proletarian occupations; it’s about a class alliance between two working classes.
The peasantry doesn’t exist anymore in most parts of the world, but imo most people understand the hammer and sickle to symbolise communism anyway so it still works.
It might not be autism, it might be just lacking context as to what they mean. The kid is likely very young so they might not know what alphabetical order means. It’s a reasonable guess given the lack of explanation in the worksheet.
communism@lemmy.mlto
Asklemmy@lemmy.ml•Would you be willing to finish a project or creation instantly, in exchange for losing any experience or materials you'd otherwise have doing it the long way?
5·1 month agoI don’t think the book and program examples are equivalent. You can edit a manuscript easily but it’d be a big headache to edit a binary program either through a hex editor or decompiling it and figuring out what it all does. I think an equivalent would be receiving the finished source code, as though someone else coded it for you.
Anyway, if it’s a personal project I want to do for the sake of it, then no, I like the process and the amount of control. If it’s something I’m only doing because I want the end product then maybe, but would have to decide on a case by case basis.
I don’t think any of those types of guns count as “non-violent”. None of the movements that have been the most effective have been strictly non-violent. You don’t have to be killing people at every action you do, but all the most effective movements have been willing to strategically use violence whenever the situation calls for it. Every strictly non-violent movement I’ve seen has simply been shooting themselves in the foot. When you’re shot at, shoot back, or you’re a coward obsessed with losing.
Shooting cops with guns.
communism@lemmy.mlto
Technology@lemmy.world•DuckDuckGo poll says 90% responders don't want AIEnglish
12·2 months agoOn duckduckgo.com it’s unfortunately enabled by default though. You have to go out of your way to set your search browser to noai.duckduckgo.com if you want default AI disabled (which you’ll want on e.g. private browsing windows/any browser that autodeletes cookies when you close it). It’s extra hassle because most privacy web browsers use DDG by default, not the noai subdomain.
communism@lemmy.mlto
Asklemmy@lemmy.ml•How can I ensure any videos I record on my phone aren't deleted by the cops?
33·2 months agoAuto upload to a remote location (e.g. VPS), ideally somewhere out of the country to really minimise chances of deletion. Could also have it auto upload to several places. You’ll need good enough internet connection to upload it though, so if they’re using signal jammers at a protest that could be a problem.
In terms of preventing deletion on the phone itself, you can’t really stop them from “losing” your phone, even if they can’t get into it.
communism@lemmy.mlto
Asklemmy@lemmy.ml•A maga person has just threatened my family, what's to do next?
11·2 months agoI didn’t say it categorically wouldn’t happen, just that if that was the person’s real intentions then they’ve been very stupid about it. If you’re going to commit a murder don’t create evidence pointing to you. Like the other commenter said, a gun and self defence skills will cover you in both cases.
communism@lemmy.mlto
Asklemmy@lemmy.ml•A maga person has just threatened my family, what's to do next?
6·2 months agoI’m a she. But yes, I think arming yourself is a good idea regardless of the likelihood you’ll need it.
communism@lemmy.mlto
Asklemmy@lemmy.ml•A maga person has just threatened my family, what's to do next?
602·2 months agoGet a gun and learn how to use it.
But as other commenters have said, if he was actually intending on killing you, it’d be real stupid to call you in advance to say so. Most likely just wants to scare you.
communism@lemmy.mlto
Asklemmy@lemmy.ml•How do you vet open source software if you don't know code well?
6·2 months agoIf you can’t feasibly vet the code yourself (I think it is feasible for things like scripts and other small projects) and the star count is low/it’s not already well known and trusted, probably try running in a VM first and look out for signs of it doing things it shouldn’t, e.g. if it’s sending HTTP requests to the internet despite it being a program that should be completely offline. Using things like AppArmor and SELinux to prevent programs from doing things they shouldn’t need to do is also good practice.
Also, the tool itself may be low star count, but is the developer known at all? Someone with any kind of a reputation wouldn’t risk putting malware on their profile.
I suppose you could also look at the list of dependencies of the program. Is it using any libraries that don’t make sense? e.g. with the above, is there some kind of HTTP request library being used for a program that shouldn’t need to access the internet at all?
I think generally the risk is quite low as the author would be hiding their malware in plain sight if the source code is available. They’d have to bet on literally nobody checking. Which is fine for very obscure projects, but if you want your malware to spread, you want a good number of people to use it, at which point someone would presumably look at the code and notice it’s malware.
The key was published in the files. It’s not suspicious to use the key given that it’s public info; it’s not illegal to read the released files.






Most people who build software from source do it for reasons other than trust. Could be for fun (I imagine the main reason why people do Linux From Scratch), could be for the same reason that compels some people to use Gentoo lol. OP didn’t say what their motivation was.
edit: nvm, in other comments OP has said they’re concerned about an xz style of backdoor. In any case, I would still be interested to read about someone trying what OP is suggesting.