Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)T
Posts
0
Comments
29
Joined
3 yr. ago

  • 💀

  • The most widely used operating systems in the world are based on unix/linux. Android (the most used OS in the world), MacOS, iOS, ESXi (as well as most hypervisors that aren't hyper-v) are all based on Linux/Unix. That's not even mentioning routers, switches, load balancers, and other high performance networking equipment. Other critical internet infrastructure (like root DNS servers) are all based on Unix or Unix-derivitives.

    Just because it's not a widely used desktop OS doesn't mean that Linux/unix aren't relevant.

    Not sure if you're being serious or not, but I've personally had very little issue with gaming on Linux. To the Unix/Linux folks, windows 11 feels like a trash heap of bugs and blue screen crashes that suck.

    To be fair though: Desktop Linux isn't for everyone. Making generalized statements about Linux is silly when you aren't a Linux user. Feel free to keep doing it, though. And if this was bait: 10/10

  • I work in I.T. on servers all day. I'm not always the best with endpoints/printers/home computers/etc.

  • Deleted

    Permanently Deleted

    Jump
  • The song is "Time" by Pink Floyd for anyone that doesn't get the reference. If you like that song, Dark Side of the Moon is definitely worth a listen

  • I think TLA means "Three Letter Acronym" in some circles. So like, DBA would be a TLA meaning "database administrator" for example. Didn't read the article to get the context though, so not sure if it fits

  • Deleted

    Permanently Deleted

    Jump
  • You forgot "hired by Joe Biden"

  • Drowsy Don...Sad!

  • I don't have much experience in the realm of gpg. My experience is mostly with TLS. From what I know, if you're doing client authentication, you encrypt your message with your private key, and then the public key on a cert is used for validating that the message actually came from you.

    I think code signing is similar to client auth, but not positive. Again, I use TLS, but I'm not a professional

    https://about.signpath.io/code-signing/theory#%3A%7E%3Atext=Software+publishers+use+a+secret%2Cpart+of+the+distribution+package.

    Edit:

    What I found from Wikipedia:

    The client sends a CertificateVerify message, which is a signature over the previous handshake messages using the client's certificate's private key. This signature can be verified by using the client's certificate's public key. This lets the server know that the client has access to the private key of the certificate and thus owns the certificate.

    https://en.m.wikipedia.org/wiki/Transport_Layer_Security#Client-authenticated_TLS_handshake

  • I think encrypting with a public key is mostly used in client -> server traffic (client encrypts with server's public key, server decrypts with private), and not code signing. However, I'm no TLS/asymmetric crypto savant.

  • Is it Clive?

  • Seriously. Hearing about recall was the last straw for me. I switched to Linux for gaming, and it's working great. I don't use windows in a personal capacity at all anymore

  • At this rate, my next system might be a mac

  • I feel like I remember this quote coming from Hasan. The first time I heard him say it, it hit me like a ton of bricks

  • Deleted

    Permanently Deleted

    Jump
  • "I have no mouth and I must Meme"

  • I ate the onion too 🤦😂

  • STAR voting system

  • I know some people in real life that thought Colbert's "Republican" character was genuine and not satire. It's sad

  • Should be a nottheonion article