

Fair concerns. I share the skepticism, but am still always happy to see projects like this attempting to swim against the current, late or not
Fair concerns. I share the skepticism, but am still always happy to see projects like this attempting to swim against the current, late or not
Sure, but any competition to Chromium is good
Ideally you’d have a better place to work with that data than a UI that is displaying relative dates. Internal reporting data you can query for instance
Sorry, I misread your original comment as an actual question about whether or not one should fudge dates
I wouldn’t lie about dates. If they end up speaking to that company, it wouldn’t be surprising for them to be mentioned. The second they find you lying about information, they’ll pass on you as a candidate
Those who abstained from voting and helped Trump get elected have done far more harm to the people in Gaza than those who voted Democrat. That’s the harm reduction aspect you’re missing. No one is saying the Democratic party’s stance on Gaza is good
Age of Mythology has Greek, Norse, Egyptian, and Chinese after the recent update
If this topic interests you and you are into gaming, I highly recommend SOMA
Ghostcharm. Casual video game analysis
Interesting. Thanks, would love to hear
Wow, same. How was the treatment? Would you recommend?
It’s not victimless. It normalizes the sexualization of children.
The owner of the platform blatantly and openly supporting one side is new. We used to call that election interference
I have one that takes d cell batteries and works great. Have used others that barely function, though
Fair enough. Every service I run depends on encrypted data, so starting the machine without decrypting isn’t worthwhile in my case. I have to decrypt to get everything back up after power loss anyway.
Main advantages I’m aware of for full disc encryption are encrypted swap and system config. Overkill for some use cases so YMMV, but wanting to point out that decrypting at boot can be done.
I may be missing something in your use case. As long as you have the port forwarded you can decrypt from anywhere. Use pub key auth and you’re good to go
You can decrypt via ssh at boot. I used dropbear to accomplish that on my machine
not reading all that…tldr?
\s
Cataclysm: Dark Days Ahead
Absolutely! Thanks for the followup. Good luck with the procedure