• 1 Post
  • 67 Comments
Joined 2 years ago
cake
Cake day: September 15th, 2022

help-circle






  • That’s actually not true. When you cut/paste a file on your computer (for most computers), it’s much faster than copying the file. Deleting the file is also not instant, so copy and delete should be the slowest of the three operations.

    When you cut and paste a file, you’re just renaming the file or updating the file database. It’s different how that works depending on your file system, but it typically never involves rewriting much of the data of the file.

    Edit: Fixed typo.











  • The person who makes Hyperland was blacklisted by freedesktop (Linux stuff) over saying something transphobic as far as I understand from a glance.

    They made a post in response in which they said ‘This other person threatened to sexually assault people as revenge for something small. I’m not the only person deserving of shame’. I’m sure there’s more to this story, I don’t care.

    A hexbear user in response to this story wrote there’s a false equivalence between a trans person calling for violence in a hyperbolic tweet and this app developer using their platform to spread anti-trans hate. I think, again, I do not care about the actual story, Fictitiousexistence’s comment doesn’t need context to be bad.

    @fictitiousexistence@lemmy.ml replied with:

    This leads me to believe that anyone who disagrees with Lyude is a Transexual Nobeards shithead.


  • ITT people claim that a Google VPN is a bad product for all use cases because Google is not a privacy-respecting company. This ignores all non-privacy use cases for using a VPN.

    And even for privacy, this would’ve been a product where the vendors interest in protecting your privacy and your interest in protecting your privacy aligned in the case where you were not hiding from Google. For example if you used a Chromebook laptop, used the Google Chrome browser, or used Google services like Google Search and Google YouTube, then Google would already know everything about you. You can’t hide your activity from them, but they can help you hide it from others.

    Similar situations exist for other privacy disrespecting companies like Microsoft and Apple, where a user might reasonably want to hide from everyone other than their vendor of choice, whose product they consider good enough to allow them to see their computer activity as part of their payment. If you already subscribe to one privacy disrespecting vendor, it makes the most sense to go all-in.


  • If a device makes an encrypted connection to a server the device makers own, there’s nothing further you can gleam from studying the DNS lookups. They can route traffic through the first server, and they can resolve any IPs through the first server. And since you insist the person you’re replying to doesn’t know what DNS is because they said it’s encrypted, I feel you might also not know that DNS can be encrypted. In that case, the network owner can see that a device makes a connection to the nameserver, but they can’t see which addresses the nameserver was asked to resolve. And similarly, the device can refuse a connection to the wrong nameserver.