• 4 Posts
  • 483 Comments
Joined 4 years ago
cake
Cake day: January 21st, 2021

help-circle



  • kevincox@lemmy.mlMtoOpen Source@lemmy.mlGIMP 3.0 Released
    link
    fedilink
    arrow-up
    23
    arrow-down
    2
    ·
    6 days ago

    Actually I would pick GIMP.

    1. Says what it is, an image editor.
    2. No popups and random interruptions.
    3. Not only AI editing examples which makes me thing the tool is AI only.
    4. An overview of the variety of major features it has rather than just AI editing.
    5. Links to helpful documentation rather than endless marketing pages that say nothing.

    Really think only thing I would like to see is some screenshots and examples of using the tool, rather than just info on what it does. But the Photoshop page barely has this, just a few examples of the AI tools.



  • I still recommend it. I’m not fully happy with the situation but for now I consider it my best option.

    1. I consider Chromium-based browsers out of the question as they give too much power to Google. This is already showing to be a problem with new APIs and “features” that Google is pushing into the web platform and the bigger the market share gets the more control they have.
    2. Web browsers are the biggest attack surface that most people have. Displaying untrusted webpages and running untrusted code is incredibly difficult and vulnerabilities are regularly discovered. I don’t yet know a Firefox fork that I trust enough to reliably respond to security vulnerabilities quickly and correctly.

    So for now I am staying with raw Firefox. Not to mention that as a disto-built Firefox I have some insulation from Mozilla’s ToS. But I am very much considering some of the forks, especially the ones that are very light with patches and are mostly configuration tweaks.




  • For .config it isn’t as important to me, but putting things that can be re-created in .cache (well the proper environment variable that defaults to .cache) is very nice because I don’t need to back up all of that junk.

    But it wouldn’t be unreasonable to put something like .config in a git repo, and storing full history for large and frequently changing files is a waste of space if they aren’t really “config”.



  • It’s definitely an option. It will do the things that you want (as long as your phone is online, but that is the same for any other solution).

    sending Signal messages with it would be less secure

    Yes, this is because Beeper converts the Signal protocol to the Matrix protocol and vice versa. In order to do this it needs to access the messages. So it needs to decrypt the messages, then re-encrypt them on the other side. This means that the bridge (in this case operated by Beeper) has access to your messages. This is often referred to as “end-to-bridge” encryption, as it isn’t end-to-end anymore.

    This is going to be true of any bridge you use that is hosted by a third party. You are always adding one additional trusted party into your communication.

    the recommended bridge instructions sends me over to Beeper, since I don’t have my own server

    Yes, to practically operate a bridge you need your own Matrix server. This is because the bridge will create a new Matrix user for every remote participant (every phone number you communicate with in this case). Doing this with regular mechanisms would be difficult (as signup is likely restricted in some ways) and inefficient (as each account would need to be checked for new messages separately). Beeper runs their own homeserver so that they can operate their bridges. However Beeper’s bridges are only available to users on the same homeserver (this is not a protocol limitation, just their choice). So in order to use their bridges you need to make an account with them (which you can, it is free IIUC). Beeper also offers custom clients which have special features for interacting with their bridges (for example making it easier to start a conversation with a new phone number).

    The alternative would be to run your own server and bridge (or hire someone to it on your behalf).








  • The most likely situation is that the torrent isn’t good. I would also force a recheck of the torrent to double-check that the files on your disk haven’t been corrupted. But if that file is still saying “0 B” remaining (don’t just look at 100% as it may be rounded) after the recheck then I would bet pretty good money on a broken torrent. If this is a public tracker it is fairly common.

    However even if it is broken you may be able to play by using a different players. Different apps can skip over different forms of corruption, so you may get lucky.