Just some Internet guy

He/him/them 🏳️‍🌈

  • 0 Posts
  • 253 Comments
Joined 1 year ago
cake
Cake day: June 25th, 2023

help-circle






  • Ask your admin to turn it off, or if you’re the admin, turn it off.

    They really went with the worst possible way to implement this in that it mangles the post to rewrite all images to the image proxy, so it’s not giving you a choice. So if you want the original link you have to reprocess it to strip the proxy. It’s like when they thought it was a good idea to store the data as HTML encoded, so not-web clients had to try to undo all of it and it’s lossy. It should be up to the clients to add the proxy as needed and if desired. Never mangle user data for storage, always reprocess it as needed and cache it if the processing is expensive.

    Now you edit a post and your links are rewritten to the proxy, and if you save it again, now you proxy to the proxy. Just like when they applied the HTML processing on save, if you edited a post and saved it again it would become double encoded.

    Personally I leave it off, and let Tesseract do it instead when it renders the images. It’s the right way to do it. If the user wants a fresh copy because it’s a dynamic image, they can do so on demand instead of being forced into it. And it actually works retroactively compared to the Lemmy server only doing it for new posts.







  • I have one (FW 16 AMD), I don’t have any complaints so far. It comes mostly assembled but you put your RAM, SSD, screen bezel, keyboard, touchpad and all the port modules yourself. The machine is well built and genuinely very easy to work with. You can swap the keyboard and touchpad without touching a screw.

    For the most part it seems like they’re holding up to their promise, you can buy a new motherboard for a CPU upgrade, remove the old one, put the new one in, and you’re good to go with the rest of your existing stuff (as long as it’s compatible, if the new board needs DDR5 instead of DDR4 then you need new RAM too but that’s expected). So far everything I’ve disassembled as part of the firs assembly has been a breeze. It’s a very nice laptop to work on and swap parts that’s for sure. You get the assurance that you can swap the battery, input modules, IO modules for the foreseeable future.

    Where I’ve been disappointed is the third-party ecosystem for it is not what I was hoping it would be, there’s not a lot of third-party modules for it. But the designs are all open-sourced so you can 3D print parts for it. Maybe in the future we’ll have more modules. Overall though, it’s not like you could even think about that on any other laptop brands, you get the laptop and it’s what it’ll be for the rest of its life.

    Runs great on Linux, most of the company actually uses Linux so support for Linux is very good. All of the models will run Minecraft very well, Minecraft in particular has been known to run significantly better on Linux to begin with, especially on Intel graphics where the OpenGL drivers on Windows are terrible.


  • My feeling about that is that I should assume anyone who could monitor my traffic should be assumed to do so and I therefore should apply reasonable defenses regardless. Even if the government doesn’t do it, hackers around the world will. That means the moment it leaves my router, it’s assumed compromised.

    Same for smart Internet connected devices. The government might be listening, but I certainly don’t trust the manufacturer to not be listening for the purpose of advertising either.

    How many stories broke out recently of ISP router having been compromised by foreign hackers for years? Yeah. The Internet is the wild west.



  • Windows 95 and Macintosh LC, elementary school computer lab stuff. My grandpa had a Windows 3.1 IBM PS/2. Those were all pretty old and practically obsolete computers when I used those, 98SE was out and ME was right around the corner.

    My very first Linux distribution experience was Mandrake Linux I believe version 9 or something like that. Didn’t last that long though, I revisited Linux later with Ubuntu 7.04 which is when I actually switched to Linux full time.

    ArchLinux since 2011. Still running that install to this day!




  • And the authenticator is configurable and they can enforce some device security like not rooted, bootloader locked, storage encryption is on through the Intune work profile. If you work on a bank, you don’t want the 2FA to even live on a device where the user gives root access to random apps that could extract the keys (although at this point come on you can probably afford Yubikeys).

    As a user, not a fan, but as an IT department it makes complete sense.