

Absolutely! Thanks for the followup. Good luck with the procedure


Absolutely! Thanks for the followup. Good luck with the procedure


Fair concerns. I share the skepticism, but am still always happy to see projects like this attempting to swim against the current, late or not


Sure, but any competition to Chromium is good


Ideally you’d have a better place to work with that data than a UI that is displaying relative dates. Internal reporting data you can query for instance


Sorry, I misread your original comment as an actual question about whether or not one should fudge dates


I wouldn’t lie about dates. If they end up speaking to that company, it wouldn’t be surprising for them to be mentioned. The second they find you lying about information, they’ll pass on you as a candidate


Those who abstained from voting and helped Trump get elected have done far more harm to the people in Gaza than those who voted Democrat. That’s the harm reduction aspect you’re missing. No one is saying the Democratic party’s stance on Gaza is good


Age of Mythology has Greek, Norse, Egyptian, and Chinese after the recent update


If this topic interests you and you are into gaming, I highly recommend SOMA


Ghostcharm. Casual video game analysis


Interesting. Thanks, would love to hear


Wow, same. How was the treatment? Would you recommend?


It’s not victimless. It normalizes the sexualization of children.


The owner of the platform blatantly and openly supporting one side is new. We used to call that election interference
I have one that takes d cell batteries and works great. Have used others that barely function, though


Fair enough. Every service I run depends on encrypted data, so starting the machine without decrypting isn’t worthwhile in my case. I have to decrypt to get everything back up after power loss anyway.
Main advantages I’m aware of for full disc encryption are encrypted swap and system config. Overkill for some use cases so YMMV, but wanting to point out that decrypting at boot can be done.


I may be missing something in your use case. As long as you have the port forwarded you can decrypt from anywhere. Use pub key auth and you’re good to go


You can decrypt via ssh at boot. I used dropbear to accomplish that on my machine


not reading all that…tldr?
\s
I would say the reverse but I think we’re expressing the same sentiment