![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/8nN0qtLEOJ.png)
Overused comment that has almost nothing to do with the point.
Overused comment that has almost nothing to do with the point.
It’s not that I have something to hide. It’s that it’s none of your business!
Car making without the tracking bullshit!
I understood that. But I don’t see how you came down to this conclusion simply because someone put Linux inside Linux.
When you put matryoshka russian dolls one inside the other, do you also think “man, we live in a simulation”?
Technically, yes. But the article already mentioned the amount of effort for the brute force to succeed (that is, practically never, if the phrase is truly random.)
But anyway. With regular passwords, the attackers already have a list: the alphabet plus numbers and symbols. Not really that different.
Not that I don’t disagree with you, but how did you come down to this conclusion?
that just hurls meteor filled bugs randomly
I think you meant to say “bugs filled meteors”?
I have so much to learn. Last time I was tracking distros and having fun with distro hopping was with Slackware 7, I think.
What is ostree? What is bazzite? Time to google stuff.
Did you really have to use that stupid “fake news headline” phrase? Gross.
They kinda were for me. But then, I was young with plenty of time to spend.
So, this is only available for Fedora users?
What does rebasing mean in this context? I try to google it, but all I get is git rebase.
Any articles about it that are worth reading? Or if you can explain, that would be neat. Thanks!
even easier then fingerprinting.
than*
No, come to think of it, you’re right. I was thinking of communities that ban people in droves, but they still have a lot of members.
But the keyword in your comment is “enough.” So, yup, again in theory, if they ban 99% of the whole Fediverse, the won’t be the biggest community in it.
Thanks for the history lesson. I didn’t really know lemmy.ml was the first Lemmy instance.
lol!