@Caleb Thanks for describing bootloaders on Qualcomm chips in your article!
Do you have any insight how locked down (or not) Mediatek SoCs are? They are appearing in Chromebooks now, like https://wiki.postmarketos.org/wiki/MediaTek_MT8183 or the newer https://store.acer.com/en-us/acer-chromebook-spin-513-cp513-2h-k62y
#Xscreensaver is an awesome collection of digital art. It doesn't get enough credit: it's still getting new patterns, and it's also in your repos!
Install it and go through the list. Which ones do you like the most?
Me, I spent way too much time staring at Galaxies and Substrate.
Important announcement: end-to-end encryption concerns USERS, and not APPLICATIONS. The ends are the AGENTS, not the CODE they run.
If your communication application processes your messages on behalf of someone other than you or your recipient, then it's NOT #E2EE.
I'm surprised how many people seem to accept that applications exchange messages rather than people. Nope. If the application censors you or leaks contents to someone else, then your communication is not E2EE by definition.
This is what happens when you apply demosaicing to your build log. That's what image processing work for #libcamera looks like.
A long time ago, I was the most active translator for Cataclysm: Dark Days Ahead for #German. This was a big deal, because the amount of text is HUGE.
But I was no longer active as a translator since years. The main reason is that I have started to hate Transifex (where the #translations are stored). #Transifex' website is proprietary and I no longer want to associate with it.
There are good sides to using a 10 years old laptop.
It's so slow that moving to an ARM laptop would be an upgrade.
And what's possible on ARM? That's right, not having any Intel Management Engine nor AMD Platform Security Processor blobs!
Linus Torvalds: Rust will go into Linux 6.1
#git pro tip:
you can push to normal (not bare) repos, like one on your other computer.
You just can't push to the branch that is currently checked out.
The wave function collapse algorithm kinda sound like a form of Carcassonne board game. Its a cool board game based on tilemaps creating random medieval country side kinda the same way.
"Carcassonne - How To Play"
Once you've figured it out, next up is Alice and Bob. I don't know what they're saying but it must be juicy because it's always encrypted.
@CyborgZeta Kinda? Mostly. It depends.
Lists of ingredients are fair to use, but if it has substantial literary substance such as a blog or cookbook, the work as a whole can be copyrighted.
Additionally, recipes can be patented . They have to pass multiple criteria such as being unique, non-obvious, useful, and novel.
Also, if you are unauthorized to access the recipe (EX: stealing it from a vault) you could be in violation of other laws.
Fosstodon is an English speaking Mastodon instance that is open to anyone who is interested in technology; particularly free & open source software.