

You might be referring to “Nonfree open source” (“source code that is open source but not free”) described at https://www.gnu.org/philosophy/categories.html
You might be referring to “Nonfree open source” (“source code that is open source but not free”) described at https://www.gnu.org/philosophy/categories.html
OpenSource is preferable whenever possible, but as in anything else, fanaticism is harmful when a good proprietary soft offers a better solution
I think an engineering perspective is useful: we want to solve problems, but different people have different problems, and each person cares about each of their problems to a different extent. If one person thinks their problem is that a relevant amount of their income depends on proprietary software, then the solution is substituting free software to replace proprietary software they depend upon. If another person doesn’t depend on proprietary software for their income, but thinks it’s a problem that their thermostat runs proprietary software, then the solution is still to substitute free software to replace proprietary software (or to replace the thermostat entirely). However, if someone wants to increase their income tenfold and using proprietary software will accomplish that (and using free software will not), then the solution is to use proprietary software.
It’s probably better to help people learn and understand how to use free software than to encourage them to use proprietary software, since free software is probably easier to maintain as someone’s situation changes, but there might be some situations where the best solution for someone involves using proprietary software.
I believe these are relevant: https://www.gnu.org/philosophy/open-source-misses-the-point.html https://www.gnu.org/philosophy/categories.html
Of particular relevance is “Resurrecting projects”: if you have access to “open source software” but are denied access to install or run modified versions of the software, the access is not particularly useful.
They might be trying to express that the Matrix protocol makes it easier for Israel to spy on someone using it. That idea came up somewhat often about 2 years ago, but I don’t know many relevant facts. It’s also common for people to say that the CIA and Israel cooperate, so that might be the connection to the CIA.
As for Signal, I am greatly annoyed that Signal requires your phone number for registration. Some people justify the centralization of Signal by saying that using a centralized network means that everyone using the network is using the same (good) security practices, and I’ve been told that the developers for Signal periodically express that they’re trying to remove that requirement, but I still try to avoid using Signal (or any networks that I can’t access without involving a phone number). The lack of progress on removing the requirement of your phone number from Signal (and the lack of information on where any centralized infrastructure is located) invites ideas about conspiring with the CIA.
Despite any uncertainty or discomfort, I defer to https://www.privacyguides.org/en/real-time-communication/ and https://soatok.blog/2024/07/31/what-does-it-mean-to-be-a-signal-competitor/ to determine what methods of communication might be suitable for me to use.
I definitely recognized “Huskvarna” for some reason, but didn’t know its location or why I would have recognized it before reading your comment. I haven’t lived in Sweden or a place that would have been very easy for me to get to Sweden from.
Typo: s/FOUR\/FOR\/s/s\/FOUR\/FOR\//
To “substitute”, the editing command is s/RE/replacement/
which has a s
character before any <slash>
(/
) character: https://pubs.opengroup.org/onlinepubs/9799919799/utilities/sed.html#tag_20_109_13_03
I care about many things related to encrypted real-time communication, including what security engineers recommend (since their judgements probably incorporate things I probably don’t even know about or understand), so I don’t think XMPP is the best option for me.
https://soatok.blog/2024/08/04/against-xmppomemo/ https://soatok.blog/2024/07/31/what-does-it-mean-to-be-a-signal-competitor/
Did something supercede Socialism in Russia around the years 1988 to 1991?
This might be relevant:
https://youtu.be/J_fZ9o6P0-A?si=-fl7rLryYZBDVgTN&t=194
Conditions here were deplorable by any objective measure. And if you’ll recall, one of the hallmarks of early Russian industrialization was: the workforce was often transient. People moved back and forth between their home villages and jobs in the cities, and this flux meant that the places people lived and where they ate and bathed and got medical attention were only ever temporary expedients. It was a bit like you were going off to some particularly crappy summer camp. It was only meant to be temporarily endured, not lived in full time, and so conditions just never got better. People were not just renting rooms; they were renting corners of rooms. You could rent not just a bed, but part of a bed. Sanitation was, of course, practically non-existent, and the food was disgusting. The work itself, meanwhile, was long and grueling. There were no safety standards in the factories. There were hardly any rights for anybody at all. And pay was literally inadequate. The ministry of finance itself surveyed conditions and concluded that a family of four needed about fifty rubles a month to purchase basic necessities (that is, food and shelter and heat) and then they found that 75% of the workers were making less than 30 rubles a month. The economic and moral math was just not adding up.
https://youtu.be/J_fZ9o6P0-A?si=FtaiY47HVyXXBeAP&t=340
The lower skilled, less educated, and still mentally “peasant” workers tended to remain culturally conservative. They were orthodox christian and believed strongly in the divine benevolence of the czar. And indeed one of the things reported by both social democrats and SRs back to their respective central committees was that they struggled to recruit among these workers because they were out there pitching “overthrowing the czar” and everyone was like “What? We… we love the czar, and he loves us too!”
To them, the czar was not a villain, but a hero. Not the devil, but their savior. It understandably made recruiting for a political revolution to overthrow their “hero and savior” very difficult.
https://thehistoryofrome.typepad.com/revolutions_podcast/2020/02/1033-bloody-sunday.html
*(char*)0 = 0; - What Does the C++ Programmer Intend With This Code? - JF Bastien - C++ on Sea 2023
You should probably discuss boundary setting with someone you trust. This situation might be only one part of a broader issue with your relationship with your parents, and you can probably make that relationship more beneficial and less detrimental.
Once you are legally and financially able to, you could move out (or take action to improve your financial situation to make it more likely you’ll be able to do so in the future). Distance can allow a relationship to change to your benefit. It seems that the majority of adults in the wealthiest countries don’t live with their parents: http://static3.businessinsider.com/image/5908feb9fcd8eb1e008b4681-1200/young-adults-living-at-home.png https://64.media.tumblr.com/42facc68776260a335473a2553bb7f59/410ac9df6d9c28a0-9f/s1280x1920/8be58d13087dc686c9edcab713f63fc4c538e99a.jpg
Note that, unless you have another reason to not want to be around your parents, I doubt that involving a state institution (like child protective services, a police department, a prosecutor’s office) in your relationship with your parents will be helpful. Knowing relevant laws is more useful to better understand what is socially accepted behavior, and to be able to know what public institutions are available to help you if you find yourself in a situation where they’re likely to be helpful.
Also, consider whether it’s appropriate to tell other people you know about this situation. If you do choose to discuss this with other people, I would follow an escalation procedure so that information doesn’t need to spread farther than necessary (for example, tell friends first, then if you don’t see improvement tell adults that live near you, then if you don’t see improvement tell adults in positions of responsibility (like teachers), and so on).
You could inform your parents that state institutions might become involved if they cause you to be recorded while in your bedroom without your consent:
These quotes are discussing cameras, but I expect the same laws and principles apply to audio recordings.
If you receive mail to an address and are an adult, I expect you have rights similar to that of a tenant.
You may want to ensure you have deposited any money you have acquired into a bank account you own (so there is a record of how long you had it, so it would be more questionable if they tried to claim it isn’t yours). It might also be useful to use a separate bank account to receive and account for wages (since it seems there are special exceptions for wages, so keeping clear records of what money is wages and what is not might be useful), and it might be useful to have a UTMA custodial account (like one described at https://www.fidelity.com/learning-center/personal-finance/custodial-account-for-kids) (to enable making it even more clear what property has been transferred to you) (note that this does allow a custodian to use the property, but only for your benefit) (note you probably can’t “transfer” money to yourself, so any money you already acquired should probably be managed without using a UTMA or UGMA account).
Note that many versions of macOS adhere to these standards: https://www.opengroup.org/openbrand/register/ https://www.opengroup.org/openbrand/register/brand3700.htm https://www.opengroup.org/openbrand/register/brand3705.htm
If people were more resistant to “grandfathered” features I think we would not have as much software as we do today: https://www.jwz.org/doc/worse-is-better.html https://en.wikipedia.org/wiki/Worse_is_better
provide about 50%–80% of what you want from an operating system
one expects that if the 50% functionality Unix and C support is satisfactory, they will start to appear everywhere.
Unix and C are the ultimate computer viruses.
users have already been conditioned to accept worse than the right thing.
It’s probably possible to make several programs with “50% functionality” in the time it takes to make one program with 100% functionality. Having more programs that are suitable for a majority of relevant applications is probably better than having one program that is suitable for all relevant applications, since having more programs will probably enable a larger variety of problems to be solved, and people often have to solve many different types of problems in their life.
https://refspecs.linuxfoundation.org/fhs.shtml https://refspecs.linuxfoundation.org/FHS_3.0/fhs/ch04.html
Some operating systems may handle long path or file names in a surprising way, so having short paths and names is useful: https://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap04.html#tag_04_13
If any pathname component is longer than {NAME_MAX}, the implementation shall consider this an error.
if the combined length exceeds {PATH_MAX}, and the implementation considers this to be an error, pathname resolution shall fail
{NAME_MAX}
and {PATH_MAX}
are described in more detail at https://pubs.opengroup.org/onlinepubs/9699919799/basedefs/limits.h.html#tag_13_23_03_02 and used in the context of https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pathchk.html
The resources I linked are descriptive and not prescriptive, but in my experience they are suitable to depend upon as a reliable baseline, which makes meeting client requirements with software engineering easier.
You surely need to explicitly cause systemd
to process changes after writing to a file. I would be very surprised if it reacted to file system changes automatically.
For example, I recall that I need to execute a command like systemctl daemon-reload
after editing a service
file: https://unix.stackexchange.com/questions/364782/what-does-systemctl-daemon-reload-do
You might get more useful information from resources like https://www.man7.org/linux/man-pages/man1/systemctl.1.html
Historically, pattern matching notation is related to, but slightly different from, the regular expression notation
https://pubs.opengroup.org/onlinepubs/9699919799/utilities/V3_chap02.html#tag_18_13
https://80000hours.org/ probably has information relevant to you, and they do have specific comments about IT roles, and many careers they talk about are related to computers in some way.
Please share what you’ve learned by suggesting changes to https://github.com/privacyguides/privacyguides.org/blob/HEAD/docs/desktop.md
Are you referring to https://en.wikipedia.org/wiki/Time_Cube
I believe Skiff would automatically start using end to end encryption when it was available, without any user needing to enable it for any specific email, using the Web Key Directory standard: https://github.com/privacyguides/privacyguides.org/blob/1634bea9d2a66ef5804b68d18d4218e0b7a8b806/docs/email.md#openpgp-compatible-services
It’s not good for me that an email provider that supports that is undergoing dramatic changes, as an open standard that protects my privacy is more useful when it is used with more services.
https://github.com/privacyguides/privacyguides.org/blob/HEAD/docs/email.md and https://www.privacytools.io/privacy-email document services you’ll probably find interesting.
I think this is relevant: https://news.cs.washington.edu/2013/08/14/chicken-chicken-chicken-chicken-chicken/