How’s it compare to greenshot?
How’s it compare to greenshot?
After several years of using Linux for work and school, I made the leap to daily driving linux on my personal computer. I stuck with it for two years. Hundreds of hours I sunk into an endless stream of inane troubleshooting. Linux preys on my desire to fix stuff and my insane belief that just one more change, suggested by just one more obscure forum post will fix the issue.
… the lack of an increment operation, no “continue” instruction, and array indices starting from 1 instead of 0. These differences can be jarring
Understatement
Something I often see missing from discussion on privacy is that it’s not always about you, the listener. Sometimes it’s about protecting the most vulnerable people around you. For example, someone escaping from domestic violence might have a different view on how their information is protected. People struggle to see the value in privacy because it’s not been a big problem for them personally or because they think it’s hopeless. An introduction to privacy in my view is all about teaching empathy, hope, and advocating for others.
Once they have that goal in mind, you can tie in how open source helps empower people to take back their privacy
Containers are a really cool part of security. The security provided will depend on how the container is configured. For example if you give the container bridged networking permissions (or whatever equivalent term is used by your solution) then you’re giving the container access to communicate with other devices on your local network. This would be the opposite of what you want to do to prevent an attacker from pivoting through your LAN.
Other threats just aren’t within the set of protections that can be provided by a container. For example if you wish to protect your Minecraft world from being griefed the container won’t have any affect on this. Another example is hiding your IP.
Basically what I’m saying is that whenever you are looking at a security technology think about what guarantees it provides and realize that no single security measure provides protection against all threats.
You’re basically relying on the security of minecraft, and your ability to quickly patch. The Log4j exploit is one good example of the kind of threats you might face.
Another is just that revealing your ip can open an opportunity for various forms of harassment. Lots of us skate by on obscurity and luck without to many issues, but that’s not a very robust solution.
Which comment?