I have been into open source software and privacy as well security issues on the Internet for more than 15 years.

Running two mastodon instances: https://ioc.exchange and https://sfba.social

  • 8 Posts
Joined vor 10 Monaten
Cake day: Nov. 19, 2021


I think any distributed power structure relies heavily on a “good” value system. But yes, if you somehow can ensure good values broadly, it probably works.

Those complex systems are trying to protect the standard of living for their citizens. Or at least that is what they think they do.

Great article! Also, thanks a lot for adding the additional arguments from this thread - Makes it much better.

All the things that have been said already.

  • that there is a very nice app on iOS (Remmel) for it

Do we trust a centralized app store based on Flatpak more than snapcraft, which is owned by Canonical? What is the difference between these two from a ideological perspective?

What is the nicest Linux Community you know?
I noticed that many Linux communities have a rather tough culture on their forums and community channels. Was wondering which Linux community does a better job on keeping a nice and friendly attitude.

I did not know that there is a Linux Mint community. Thank you for pointing that out to me.

The most secure OS is the OS you understand to properly configure and maintain. If you know how to properly configure and maintain Windows, you can be more secure than a Linux PC that is run without much thought about security.

If the question is which OS comes with the most secure default settings, MacOS surely beats Windows and a security focused and mature Linux distro likely beats them all. However, there are great variances in security based on the distro.

I started to do some security reviews on the most popular Linux distros a couple of days ago - You can read them here: https://decrypt.fail

MX Linux collected 10 out of 18 possible points – A good balance between UX and Security.

Yes. I’m saving for my wife’s and I retirement. I also want to make sure that our kids don’t have to support us when we are old.

I have been charging my phone wirelessly for the last 3 years. I put my phone on it over night and is fully charged in the morning. Much easier than trying to fiddle with a cable in the dark.

I second that! I run two mid-sized mastodon instances and definitely see the appeal of a fedi guild.

This problem seems similar to the discovery problem small Mastodon instances have.

On Mastodon some folks have created bots that follow new users on other instances automatically, which half of the mastodon fediverse found very annoying.

Nice article on the various types of cybersecurity roles and where to start when entering the field.

Android Apps on Linux
A container-based approach to boot a full Android system on a regular GNU/Linux system like Ubuntu.

This post tries to summarize the key steps to take for an effective Privilege Access Management program. Segmenting Privileges in an Active Directory based IT infrastructure is a key defense strategy against automated as well as human operated Ransomware attacks.

Definitely try Pop!_OS! It has a very usable and fast desktop environment and comes with a well maintained software manager.